Pages that link to "Item:Q2059390"
From MaRDI portal
The following pages link to Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks (Q2059390):
Displayed 26 items.
- Secure state estimation for event-triggered cyber-physical systems against deception attacks (Q2109209) (← links)
- Stochastic admissibility and \(H_\infty\) output feedback control for singular Markov jump systems under dynamic measurement output event-triggered strategy (Q2680040) (← links)
- Asynchronous finite-time \(H_\infty\) filtering for linear neutral semi-Markovian jumping systems under hybrid cyber attacks (Q2684599) (← links)
- Adaptive consensus control of second-order nonlinear multi-agent systems with event-dependent intermittent communications (Q2684650) (← links)
- Distributed multi-step subgradient projection algorithm with adaptive event-triggering protocols: a framework of multiagent systems (Q5046850) (← links)
- Finite-time distributed resilient state estimation subject to hybrid cyber-attacks: a new dynamic event-triggered case (Q5046857) (← links)
- Distributed filtering for nonlinear systems under Dempster–Shafer theory subject to malicious cyber attacks (Q6063755) (← links)
- Cooperative fault-tolerant tracking control for multi-agent systems: a multiple description encoding scheme (Q6068185) (← links)
- Finite-time consensus control for multi-agent systems with full-state constraints and actuator failures (Q6077709) (← links)
- State and fault estimation for nonlinear systems subject to censored measurements: A dynamic event‐triggered case (Q6085470) (← links)
- Actuator fault and Bernoulli random delay-based \(H_\infty\) reliable fuzzy control of singular hybrid vehicle suspension systems with impulsive perturbations (Q6095642) (← links)
- Security of networked control systems subject to deception attacks: a survey (Q6099319) (← links)
- Detection and defense of time‐varying formation for unmanned aerial vehicles against false data injection attacks and external disturbance (Q6117629) (← links)
- Remote state estimator design under the round‐Robin protocol (Q6117638) (← links)
- Novel adaptive filter design for complex‐valued network systems under hybrid cyber attacks (Q6125686) (← links)
- Event‐driven intermittent control for vehicle platooning over vehicular ad‐hoc networks (Q6141948) (← links)
- Designing a stabilizing controller for discrete‐time nonlinear feedforward systems with unknown input saturation (Q6149774) (← links)
- Non-iterative Cauchy kernel-based maximum correntropy cubature Kalman filter for non-Gaussian systems (Q6158946) (← links)
- Window-type detector for stealthy false data injection attack in cyber-physical systems (Q6164484) (← links)
- Secure state estimation for complex networks with multi-channel oriented round robin protocol (Q6171360) (← links)
- Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach (Q6179971) (← links)
- Distributed estimation for multi‐agent systems with relative measurements and quantized communication: A feedback quadratic framework (Q6190346) (← links)
- Finite‐time dissipative control of fuzzy distributed parameter CPSs with quantization under cyber attacks (Q6194853) (← links)
- Anti-saturation resilient control of cyber-physical systems under actuator attacks (Q6195458) (← links)
- A class of stealthy attacks on remote state estimation with intermittent observation (Q6196484) (← links)
- Event‐triggered adaptive tracking control for nonlinear systems with input saturation and unknown control directions (Q6197936) (← links)