Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attac...
Saved in:
Published in | International journal of robust and nonlinear control Vol. 33; no. 4; pp. 2861 - 2878 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Bognor Regis
Wiley Subscription Services, Inc
10.03.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 1049-8923 1099-1239 |
DOI | 10.1002/rnc.6551 |
Cover
Loading…
Abstract | This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H∞$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H∞$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H∞$$ {H}_{\infty } $$ estimator, respectively. |
---|---|
AbstractList | This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient estimator, respectively. This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H∞$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H∞$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H∞$$ {H}_{\infty } $$ estimator, respectively. |
Author | Tian, Engang Liu, Jinliang Wang, Xun Wei, Bin |
Author_xml | – sequence: 1 givenname: Xun surname: Wang fullname: Wang, Xun organization: University of Shanghai for Science and Technology – sequence: 2 givenname: Engang orcidid: 0000-0002-8169-5347 surname: Tian fullname: Tian, Engang email: tianengang@163.com organization: University of Shanghai for Science and Technology – sequence: 3 givenname: Bin surname: Wei fullname: Wei, Bin organization: University of Shanghai for Science and Technology – sequence: 4 givenname: Jinliang orcidid: 0000-0001-5489-0246 surname: Liu fullname: Liu, Jinliang organization: Nanjing University of Finance and Economics |
BookMark | eNp1kM1KAzEUhYNUsK2CjxBw42ZqMpm_uCvFPygVRNfDncwdnHYmqUlq7c5H8Bl9EmesK9HVuXC_cw6cERloo5GQU84mnLHwwmo1SeKYH5AhZ1IGPBRy0N-RDDIZiiMycm7JWPcLoyFRC_OKDQXvQa0-3z9KrFA7pJWFFrfGrmhlLO06mlojWKpMu27wjWr0_ddd0qmmdbs21oP2fQB46KQAhyVt0T-b8pgcVtA4PPnRMXm6vnqc3Qbz-5u72XQeqFAKHqAEJTlkihdpCSnIimUySeIkRIRIZgUUgmdFmUZYRCmvJJZChSrO4jIWmUQxJmf73LU1Lxt0Pl-ajdVdZR6mqZBpIkXUUed7SlnjnMUqX9u6BbvLOcv7CfNuwryfsEMnv1BVe_C10d5C3fxlCPaGbd3g7t_g_GEx--a_AGcpiKA |
CitedBy_id | crossref_primary_10_1002_rnc_6729 crossref_primary_10_1016_j_jfranklin_2023_04_033 crossref_primary_10_1109_JSYST_2024_3357901 crossref_primary_10_1002_oca_3033 crossref_primary_10_1109_TASE_2024_3360718 crossref_primary_10_1016_j_jfranklin_2023_08_033 crossref_primary_10_1109_TCNS_2023_3336594 crossref_primary_10_1109_TCNS_2024_3378450 crossref_primary_10_1002_rnc_6928 crossref_primary_10_1109_TNSE_2024_3354913 crossref_primary_10_1007_s11071_023_09086_2 crossref_primary_10_1109_TCSI_2023_3324256 crossref_primary_10_1016_j_isatra_2024_01_015 crossref_primary_10_1016_j_jfranklin_2023_11_025 crossref_primary_10_1002_rnc_7226 crossref_primary_10_1016_j_neucom_2024_129297 crossref_primary_10_1002_rnc_7103 crossref_primary_10_1109_TCYB_2024_3365608 crossref_primary_10_1109_TCSI_2023_3336730 crossref_primary_10_1016_j_conengprac_2024_106082 crossref_primary_10_1109_TFUZZ_2023_3319662 crossref_primary_10_1002_rnc_7669 crossref_primary_10_1007_s00034_024_02608_2 crossref_primary_10_1109_TFUZZ_2023_3262686 crossref_primary_10_1109_TSMC_2023_3312520 crossref_primary_10_1109_TCSII_2023_3329802 crossref_primary_10_1109_TSMC_2024_3378773 crossref_primary_10_1109_ACCESS_2023_3296785 crossref_primary_10_1109_TCSI_2024_3381334 crossref_primary_10_1002_rnc_7274 crossref_primary_10_1002_rnc_7373 crossref_primary_10_1016_j_sysconle_2024_106001 crossref_primary_10_1109_TSMC_2024_3370221 crossref_primary_10_1109_TASE_2023_3321748 crossref_primary_10_1002_rnc_7332 crossref_primary_10_1002_rnc_7232 crossref_primary_10_1002_rnc_7594 |
Cites_doi | 10.1080/00207721.2021.1872118 10.1109/TSMC.2017.2697450 10.1109/TNNLS.2017.2740400 10.1002/rnc.5957 10.1109/TCYB.2021.3125851 10.1109/TCYB.2020.2969320 10.1002/rnc.5899 10.1080/00207721.2020.1814898 10.1016/j.automatica.2019.108545 10.1109/TCYB.2019.2915124 10.1109/TSG.2022.3202811 10.1109/TAC.2017.2756259 10.1109/TAC.2020.2991957 10.1016/j.jfranklin.2018.01.020 10.1109/TNNLS.2021.3137426 10.1109/TAC.2012.2206694 10.1016/j.automatica.2019.108557 10.1016/j.neucom.2020.01.075 10.1002/rnc.5674 10.1109/TNNLS.2012.2187926 10.1080/00207721.2021.1995528 10.1109/TCYB.2018.2818941 10.1109/TSMC.2021.3090024 10.1109/TAC.2022.3171422 10.1109/JAS.2022.105845 10.1109/TFUZZ.2020.3033851 10.1109/TCYB.2022.3215015 10.1016/j.ins.2020.06.074 10.1016/j.ins.2022.08.085 10.1109/TSMC.2019.2945067 10.1016/j.ins.2020.09.046 10.1016/j.automatica.2019.05.039 10.1109/TCYB.2022.3155755 10.1016/j.neucom.2018.07.085 10.1109/TII.2022.3202949 10.1109/TCSII.2021.3073724 10.1109/TAC.2020.3004326 10.1109/TAC.2020.3033710 10.1016/j.automatica.2021.110151 10.1109/CDC.2013.6760746 10.1016/j.automatica.2021.109517 10.3934/math.2022158 |
ContentType | Journal Article |
Copyright | 2022 John Wiley & Sons Ltd. 2023 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2022 John Wiley & Sons Ltd. – notice: 2023 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
DOI | 10.1002/rnc.6551 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1099-1239 |
EndPage | 2878 |
ExternalDocumentID | 10_1002_rnc_6551 RNC6551 |
Genre | article |
GrantInformation_xml | – fundername: Natural Science Foundation of Shanghai funderid: 21ZR1444900 – fundername: Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning – fundername: National Natural Science Foundation of China funderid: 62173231 |
GroupedDBID | .3N .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AAXRX AAYCA AAZKR ABCQN ABCUV ABIJN ABJNI ACAHQ ACCFJ ACCZN ACGFO ACGFS ACIWK ACPOU ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AIAGR AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS F00 F01 F04 G-S G.N GNP GODZA H.T H.X HGLYW HHY HHZ HZ~ IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- P2P P2W P2X P4D Q.N Q11 QB0 QRW R.K ROL RWI RX1 RYL SUPJJ TUS UB1 V2E W8V W99 WBKPD WH7 WIH WIK WJL WLBEL WOHZO WQJ WRC WWI WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT AAYXX AEYWJ AGHNM AGYGG AMVHM CITATION 7SC 7SP 7TB 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2931-e9ac91a8c1b7da7a9f08966562eea498bab318bd74eb471f9ed3c2c585d5389e3 |
IEDL.DBID | DR2 |
ISSN | 1049-8923 |
IngestDate | Fri Jul 25 12:24:39 EDT 2025 Thu Apr 24 23:05:49 EDT 2025 Tue Jul 01 01:03:12 EDT 2025 Wed Jan 22 16:24:09 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2931-e9ac91a8c1b7da7a9f08966562eea498bab318bd74eb471f9ed3c2c585d5389e3 |
Notes | Funding information National Natural Science Foundation of China, Grant/Award Number: 62173231; Natural Science Foundation of Shanghai, Grant/Award Number: 21ZR1444900; Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-5489-0246 0000-0002-8169-5347 |
PQID | 2773976934 |
PQPubID | 1026344 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2773976934 crossref_primary_10_1002_rnc_6551 crossref_citationtrail_10_1002_rnc_6551 wiley_primary_10_1002_rnc_6551_RNC6551 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 10 March 2023 |
PublicationDateYYYYMMDD | 2023-03-10 |
PublicationDate_xml | – month: 03 year: 2023 text: 10 March 2023 day: 10 |
PublicationDecade | 2020 |
PublicationPlace | Bognor Regis |
PublicationPlace_xml | – name: Bognor Regis |
PublicationTitle | International journal of robust and nonlinear control |
PublicationYear | 2023 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2018; 29 2017; 63 2021; 66 2019; 50 2017; 49 2021; 546 2021; 127 2021; 548 2019; 346 2022; 69 2019; 109 2022; 616 2019; 107 2012; 58 2021; 52 2021; 51 2022; 138 2023 2022 2020; 30 2021 2020; 390 2018; 355 2022; 7 2019; 49 2022; 52 2022; 32 2020; 66 2013 2020; 65 2012; 23 e_1_2_9_30_1 e_1_2_9_31_1 e_1_2_9_11_1 e_1_2_9_34_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_12_1 e_1_2_9_33_1 e_1_2_9_15_1 e_1_2_9_38_1 e_1_2_9_14_1 e_1_2_9_39_1 e_1_2_9_17_1 e_1_2_9_36_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_19_1 e_1_2_9_18_1 e_1_2_9_41_1 e_1_2_9_42_1 e_1_2_9_20_1 e_1_2_9_40_1 e_1_2_9_22_1 e_1_2_9_21_1 e_1_2_9_24_1 e_1_2_9_43_1 e_1_2_9_23_1 e_1_2_9_44_1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_5_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_25_1 e_1_2_9_28_1 Hu S (e_1_2_9_29_1) 2021; 51 e_1_2_9_27_1 |
References_xml | – volume: 32 start-page: 1633 issue: 3 year: 2022 end-page: 1653 article-title: Decentralized event‐triggered synchronization control for complex networks with nonperiodic DoS attacks publication-title: Int J Robust Nonlinear Control – volume: 65 start-page: 3832 issue: 9 year: 2020 end-page: 3846 article-title: Optimizing attack schedules based on energy dispatch over two‐hop relay networks publication-title: IEEE Trans Automat Contr – volume: 23 start-page: 725 issue: 5 year: 2012 end-page: 736 article-title: state estimation for discrete‐time complex networks with randomly occurring sensor saturations and randomly varying sensor delays publication-title: IEEE Trans Neural Netw Learn Syst – volume: 49 start-page: 1979 issue: 5 year: 2019 end-page: 1986 article-title: Synchronization control for a class of discrete time‐delay complex dynamical networks: a dynamic event‐triggered approach publication-title: IEEE Trans Cybern – volume: 30 start-page: 190 issue: 1 year: 2020 end-page: 204 article-title: Attack‐resilient event‐triggered fuzzy interval type‐2 filter design for networked nonlinear systems under sporadic denial‐of‐service jamming attacks publication-title: IEEE Trans Fuzzy Syst – volume: 109 year: 2019 article-title: Attack and estimator design for multi‐sensor systems with undetectable adversary publication-title: Automatica – volume: 29 start-page: 3906 issue: 8 year: 2018 end-page: 3912 article-title: Partial‐nodes‐based state estimation for complex networks with unbounded distributed delays publication-title: IEEE Trans Neural Netw Learn Syst – year: 2022 article-title: Watermarking‐based protection strategy against stealthy integrity attack on distributed state estimation publication-title: IEEE Trans Automat Contr – volume: 32 start-page: 2536 issue: 5 year: 2022 end-page: 2550 article-title: Observer‐based adaptive event‐triggered PID control for networked systems under aperiodic DoS attacks publication-title: Int J Robust Nonlinear Control – volume: 52 start-page: 1192 issue: 6 year: 2021 end-page: 1205 article-title: Distributed non‐fragile set‐membership filtering for nonlinear systems under fading channels and bias injection attacks publication-title: Int J Syst Sci – volume: 32 start-page: 3425 issue: 6 year: 2022 end-page: 3441 article-title: An adaptive torus‐event‐based controller design for networked T‐S fuzzy systems under deception attacks publication-title: Int J Robust Nonlinear Control – volume: 51 start-page: 6179 issue: 12 year: 2021 end-page: 6187 article-title: Data‐driven false data‐injection attack design and detection in cyber‐physical systems publication-title: IEEE Trans Cybern – volume: 548 start-page: 69 year: 2021 end-page: 84 article-title: Hybrid‐triggered‐based security controller design for networked control system under multiple cyber attacks publication-title: Inf Sci – volume: 51 start-page: 1392 issue: 3 year: 2021 end-page: 1403 article-title: Resilient filtering for event‐triggered networked systems under nonperiodic DoS jamming attacks publication-title: IEEE Trans Syst Man Cybern Syst – year: 2022 article-title: Measurement outliers diagnosis and state of charge estimation for lithium‐ion batteries publication-title: IEEE Trans Ind Inform – volume: 52 start-page: 4200 issue: 7 year: 2022 end-page: 4210 article-title: Stochastic event‐triggered control for networked systems under denial of service attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 138 year: 2022 article-title: Security analysis and defense strategy of distributed filtering under false data injection attacks publication-title: Automatica – volume: 49 start-page: 455 issue: 2 year: 2017 end-page: 468 article-title: Distributed dimensionality reduction fusion estimation for cyber‐physical systems under DoS attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 51 start-page: 4825 issue: 8 year: 2021 end-page: 4835 article-title: Optimal switching attacks and countermeasures in cyber‐physical systems publication-title: IEEE Trans Syst Man Cybern Syst – volume: 616 start-page: 306 year: 2022 end-page: 321 article-title: Event‐based security tracking control for networked control systems against stochastic cyber‐attacks publication-title: Inf Sci – volume: 58 start-page: 475 issue: 2 year: 2012 end-page: 481 article-title: A delay system method for designing event‐triggered controllers of networked control systems publication-title: IEEE Trans Automat Contr – year: 2021 article-title: Dynamic event‐triggered output feedback control for networked systems subject to multiple cyber‐attacks publication-title: IEEE Trans Cybern – volume: 66 start-page: 2332 issue: 5 year: 2020 end-page: 2338 article-title: Setpoint attack detection in cyber‐physical systems publication-title: IEEE Trans Automat Contr – year: 2022 article-title: Memory‐event‐triggered fault detection of networked IT2 T‐S fuzzy systems publication-title: IEEE Trans Cybern – volume: 390 start-page: 69 issue: 21 year: 2020 end-page: 77 article-title: Optimal periodic DoS attack with energy harvester in cyber‐physical systems publication-title: Neurocomputing – year: 2022 article-title: Chance‐constrained state estimation for recursive neural networks under deception attacks and energy constraints: the finite‐horizon case publication-title: IEEE Trans Neural Netw Learn Syst – volume: 127 year: 2021 article-title: Optimal DoS attack schedules on remote state estimation under multi‐sensor round‐robin protocol publication-title: Automatica – volume: 52 start-page: 3351 issue: 16 year: 2021 end-page: 3367 article-title: A survey on state estimation of complex dynamical networks publication-title: Int J Syst Sci – volume: 546 start-page: 192 year: 2021 end-page: 205 article-title: Detection of stealthy false data injection attacks against networked control systems via active data modification publication-title: Inf Sci – volume: 109 year: 2019 article-title: Distributed Krein space‐based attack detection over sensor networks under deception attacks publication-title: Automatica – volume: 69 start-page: 149 issue: 1 year: 2022 end-page: 153 article-title: False data injection attacks against partial sensor measurements of networked control systems publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs – volume: 107 start-page: 296 year: 2019 end-page: 305 article-title: Chance‐constrained control for a class of time‐varying systems with stochastic nonlinearities: the finite‐horizon case publication-title: Automatica – year: 2022 article-title: Security‐ensured state of charge estimation of lithiumion batteries subject to malicious attacks publication-title: IEEE Trans Smart Grid – volume: 7 start-page: 2858 issue: 2 year: 2022 end-page: 2877 article-title: Adaptive event‐triggered state estimation for complex networks with nonlinearities against hybrid attacks publication-title: AIMS Math – volume: 346 start-page: 38 year: 2019 end-page: 47 article-title: Resilient state estimation for nonlinear complex networks with time‐delay under stochastic communication protocol publication-title: Neurocomputing – year: 2023 article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial‐of‐service attacks publication-title: IEEE/CAA J Automat Sin – year: 2022 article-title: Segment‐weighted information‐based event‐triggered mechanism for networked control systems publication-title: IEEE Trans Cybern – volume: 66 start-page: 4214 issue: 9 year: 2021 end-page: 4221 article-title: Resilient actuator fault estimation for discrete‐time complex networks: a distributed approach publication-title: IEEE Trans Automat Contr – volume: 51 start-page: 3364 issue: 16 year: 2021 end-page: 3377 article-title: Set‐membership filtering for time‐varying complex networks with uniform quantisations over randomly delayed redundant channels publication-title: Int J Syst Sci – volume: 355 start-page: 2874 issue: 5 year: 2018 end-page: 2891 article-title: Event‐triggered state estimation for state‐saturated complex networks subject to quantization effects and distributed delays publication-title: J Franklin Inst – volume: 50 start-page: 2338 issue: 6 year: 2019 end-page: 2345 article-title: Summation detector for false data‐injection attack in cyber‐physical systems publication-title: IEEE Trans Cybern – year: 2013 – volume: 63 start-page: 1648 issue: 6 year: 2017 end-page: 1663 article-title: Optimal denial‐of‐service attack scheduling with energy constraint over packet‐dropping networks publication-title: IEEE Trans Automat Contr – ident: e_1_2_9_16_1 doi: 10.1080/00207721.2021.1872118 – ident: e_1_2_9_33_1 doi: 10.1109/TSMC.2017.2697450 – ident: e_1_2_9_8_1 doi: 10.1109/TNNLS.2017.2740400 – ident: e_1_2_9_18_1 doi: 10.1002/rnc.5957 – ident: e_1_2_9_42_1 doi: 10.1109/TCYB.2021.3125851 – ident: e_1_2_9_32_1 doi: 10.1109/TCYB.2020.2969320 – ident: e_1_2_9_5_1 doi: 10.1002/rnc.5899 – ident: e_1_2_9_3_1 doi: 10.1080/00207721.2020.1814898 – ident: e_1_2_9_30_1 doi: 10.1016/j.automatica.2019.108545 – ident: e_1_2_9_40_1 doi: 10.1109/TCYB.2019.2915124 – ident: e_1_2_9_12_1 doi: 10.1109/TSG.2022.3202811 – ident: e_1_2_9_23_1 doi: 10.1109/TAC.2017.2756259 – ident: e_1_2_9_24_1 doi: 10.1109/TAC.2020.2991957 – ident: e_1_2_9_43_1 doi: 10.1016/j.jfranklin.2018.01.020 – ident: e_1_2_9_13_1 doi: 10.1109/TNNLS.2021.3137426 – ident: e_1_2_9_37_1 doi: 10.1109/TAC.2012.2206694 – ident: e_1_2_9_17_1 doi: 10.1016/j.automatica.2019.108557 – ident: e_1_2_9_26_1 doi: 10.1016/j.neucom.2020.01.075 – ident: e_1_2_9_39_1 doi: 10.1002/rnc.5674 – ident: e_1_2_9_11_1 doi: 10.1109/TNNLS.2012.2187926 – ident: e_1_2_9_2_1 doi: 10.1080/00207721.2021.1995528 – ident: e_1_2_9_4_1 doi: 10.1109/TCYB.2018.2818941 – ident: e_1_2_9_14_1 doi: 10.1109/TSMC.2021.3090024 – volume: 51 start-page: 1392 issue: 3 year: 2021 ident: e_1_2_9_29_1 article-title: Resilient H∞$$ {H}_{\infty } $$ filtering for event‐triggered networked systems under nonperiodic DoS jamming attacks publication-title: IEEE Trans Syst Man Cybern Syst – ident: e_1_2_9_35_1 doi: 10.1109/TAC.2022.3171422 – ident: e_1_2_9_21_1 doi: 10.1109/JAS.2022.105845 – ident: e_1_2_9_27_1 doi: 10.1109/TFUZZ.2020.3033851 – ident: e_1_2_9_38_1 doi: 10.1109/TCYB.2022.3215015 – ident: e_1_2_9_15_1 doi: 10.1016/j.ins.2020.06.074 – ident: e_1_2_9_28_1 doi: 10.1016/j.ins.2022.08.085 – ident: e_1_2_9_34_1 doi: 10.1109/TSMC.2019.2945067 – ident: e_1_2_9_41_1 doi: 10.1016/j.ins.2020.09.046 – ident: e_1_2_9_7_1 doi: 10.1016/j.automatica.2019.05.039 – ident: e_1_2_9_36_1 doi: 10.1109/TCYB.2022.3155755 – ident: e_1_2_9_9_1 doi: 10.1016/j.neucom.2018.07.085 – ident: e_1_2_9_10_1 doi: 10.1109/TII.2022.3202949 – ident: e_1_2_9_20_1 doi: 10.1109/TCSII.2021.3073724 – ident: e_1_2_9_31_1 doi: 10.1109/TAC.2020.3004326 – ident: e_1_2_9_6_1 doi: 10.1109/TAC.2020.3033710 – ident: e_1_2_9_19_1 doi: 10.1016/j.automatica.2021.110151 – ident: e_1_2_9_22_1 doi: 10.1109/CDC.2013.6760746 – ident: e_1_2_9_25_1 doi: 10.1016/j.automatica.2021.109517 – ident: e_1_2_9_44_1 doi: 10.3934/math.2022158 |
SSID | ssj0009924 |
Score | 2.5274258 |
Snippet | This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB)... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2861 |
SubjectTerms | Algorithms Eavesdropping H infinity IDB attack strategy nonlinear complex networks (CNs) Parameters Performance degradation resilient H∞$$ {H}_{\infty } $$ estimator State estimation |
Title | Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.6551 https://www.proquest.com/docview/2773976934 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA6yJ33wLl6mRBB9yrZ2bdP4NoZjCO5hOBj4UHIryGaVrRPxyZ_gb_SXeJK02xQF8akvSZPm5JzzpXz5DkJnmgdUKeYRqphPAhkLEkcsJZIx2C5aUBGau8M3vag7CK6H4bBgVZq7ME4fYv7DzXiGjdfGwbmY1heioRPwnyi0t6cNVcvgof5COYoxV88WADCJAcSUurMNv152_JqJFvByGaTaLNPZQHfl_By5ZFSb5aImX79JN_7vAzbRegE-ccvtli20orNttLYkSbiDZO_xWY8xz3MuRx9v70qncNDVOC1JXBhQLs7c-HyCLSVdv-DM0cmnl7iV4fsHi-qz3LyA5xweJlsq7OpV76JB5-q23SVFIQYiAQ14RDMumcdj6QmqOOUsbcRwTALopMHWLBZcQGgQigZaQLJLmVZN6Us4iSiIp0w391AFJqb3EWbcE2GUstBomPoqijWE40CpQDa5ln5wgC5KoySyUCk3xTLGidNX9hNYtsQs2wE6nbd8csocP7SplnZNCt-cJj6lBoSxJgx2bg30a_-k32ub5-FfGx6hVVOPnljCXxVV8slMHwNqycWJ3Z-fpjjukA |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA4yD-rB3-J0agTRU-batU2jpzEdU-cOouBBCPlVELXK1ol48k_wb_Qv8aVZnYqCeOoladO8vPe-hJfvQ2jLiIBqzTxCNfNJoGJJ4oglRDEGy8VIKkN7d_i0G7UvguPL8HIM7Rd3YRw_xMeBm_WMPF5bB7cH0rsj1tAeOFAU2uvT41bQ28oXHJyNuKMYc4q2AIFJDDCmYJ6t-btFz6-5aAQwP8PUPM-0ZtBVMUJXXnJTHWSyqp6_kTf-8xdm0fQQf-KGWzBzaMyk82jqEyvhAlLd-0dzi0WWCXXz9vKqTQJ7XYOToo4LA9DFqRuA6OG8Kt084dRVlPf3cCPF13c5sE8z-wKRCXjYhKmxk6xeRBetw_Nmmwy1GIgCQOARw4RinoiVJ6kWVLCkFsNOCdCTAXOzWAoJ0UFqGhgJ-S5hRteVr2AzoiGkMlNfQiUYmFlGmAlPhlHCQktj6usoNhCRA60DVRdG-UEZ7RRW4WpIVG71Mm65o1j2OUwbt9NWRpsfLR8cOccPbSqFYfnQPfvcp9TiMFaHj23nFvq1Pz_rNu1z5a8NN9BE-_y0wztH3ZNVNGnl6Ule_1dBpaw3MGsAYjK5ni_Wd3YV8qo |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6ygujBt7g-I4iesrvtpk3jTdTF5yKisOCh5FUQtS67XRFP_gR_o7_ESdO6KgriKZdJk2YyM1_C5BuENo2gTGvuEaa5T6iKJIlCnhDFOWwXI5kM7Nvhs3Z4eEWPO0GnyKq0b2EcP8THhZu1jNxfWwPv6qQ-JA3tgf2EgX09PUpDsBULiC6G1FGcu4K2gIBJBCimJJ5t-PWy59dQNMSXn1FqHmZaU-i6nKDLLrmtDTJZU8_fuBv_9wfTaLJAn3jXbZcZNGLSWTTxiZNwDqn2w6O5wyLLhLp9e3nVJoGTrsFJmcWFAebi1I0vejjPSTdPOHX55P0dvJvim_sc1qeZ_YDIBDQ2XGrsClbPo6vWweXeISkqMRAFcMAjhgvFPREpTzItmOBJI4JzEmAnA8rmkRQSfIPUjBoJ0S7hRjeVr-AoosGhctNcQBWYmFlEmAtPBmHCA0ti6uswMuCPqdZUNYVRPq2i7VIpsSpoym21jLvYESz7MSxbbJetijY-JLuOmuMHmZVSr3FhnP3YZ8yiMN6EwbZyBf3aP75o79l26a-C62jsfL8Vnx61T5bRuK1NT_LkvxVUyXoDswoIJpNr-VZ9B9cN8WI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Novel+attack%E2%80%90defense+framework+for+nonlinear+complex+networks%3A+An+important%E2%80%90data%E2%80%90based+method&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Wang%2C+Xun&rft.au=Tian%2C+Engang&rft.au=Wei%2C+Bin&rft.au=Liu%2C+Jinliang&rft.date=2023-03-10&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=33&rft.issue=4&rft.spage=2861&rft.epage=2878&rft_id=info:doi/10.1002%2Frnc.6551&rft.externalDBID=10.1002%252Frnc.6551&rft.externalDocID=RNC6551 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon |