Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method

This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attac...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of robust and nonlinear control Vol. 33; no. 4; pp. 2861 - 2878
Main Authors Wang, Xun, Tian, Engang, Wei, Bin, Liu, Jinliang
Format Journal Article
LanguageEnglish
Published Bognor Regis Wiley Subscription Services, Inc 10.03.2023
Subjects
Online AccessGet full text
ISSN1049-8923
1099-1239
DOI10.1002/rnc.6551

Cover

Loading…
Abstract This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H∞$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H∞$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H∞$$ {H}_{\infty } $$ estimator, respectively.
AbstractList This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient estimator, respectively.
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H∞$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack‐defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H∞$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H∞$$ {H}_{\infty } $$ estimator, respectively.
Author Tian, Engang
Liu, Jinliang
Wang, Xun
Wei, Bin
Author_xml – sequence: 1
  givenname: Xun
  surname: Wang
  fullname: Wang, Xun
  organization: University of Shanghai for Science and Technology
– sequence: 2
  givenname: Engang
  orcidid: 0000-0002-8169-5347
  surname: Tian
  fullname: Tian, Engang
  email: tianengang@163.com
  organization: University of Shanghai for Science and Technology
– sequence: 3
  givenname: Bin
  surname: Wei
  fullname: Wei, Bin
  organization: University of Shanghai for Science and Technology
– sequence: 4
  givenname: Jinliang
  orcidid: 0000-0001-5489-0246
  surname: Liu
  fullname: Liu, Jinliang
  organization: Nanjing University of Finance and Economics
BookMark eNp1kM1KAzEUhYNUsK2CjxBw42ZqMpm_uCvFPygVRNfDncwdnHYmqUlq7c5H8Bl9EmesK9HVuXC_cw6cERloo5GQU84mnLHwwmo1SeKYH5AhZ1IGPBRy0N-RDDIZiiMycm7JWPcLoyFRC_OKDQXvQa0-3z9KrFA7pJWFFrfGrmhlLO06mlojWKpMu27wjWr0_ddd0qmmdbs21oP2fQB46KQAhyVt0T-b8pgcVtA4PPnRMXm6vnqc3Qbz-5u72XQeqFAKHqAEJTlkihdpCSnIimUySeIkRIRIZgUUgmdFmUZYRCmvJJZChSrO4jIWmUQxJmf73LU1Lxt0Pl-ajdVdZR6mqZBpIkXUUed7SlnjnMUqX9u6BbvLOcv7CfNuwryfsEMnv1BVe_C10d5C3fxlCPaGbd3g7t_g_GEx--a_AGcpiKA
CitedBy_id crossref_primary_10_1002_rnc_6729
crossref_primary_10_1016_j_jfranklin_2023_04_033
crossref_primary_10_1109_JSYST_2024_3357901
crossref_primary_10_1002_oca_3033
crossref_primary_10_1109_TASE_2024_3360718
crossref_primary_10_1016_j_jfranklin_2023_08_033
crossref_primary_10_1109_TCNS_2023_3336594
crossref_primary_10_1109_TCNS_2024_3378450
crossref_primary_10_1002_rnc_6928
crossref_primary_10_1109_TNSE_2024_3354913
crossref_primary_10_1007_s11071_023_09086_2
crossref_primary_10_1109_TCSI_2023_3324256
crossref_primary_10_1016_j_isatra_2024_01_015
crossref_primary_10_1016_j_jfranklin_2023_11_025
crossref_primary_10_1002_rnc_7226
crossref_primary_10_1016_j_neucom_2024_129297
crossref_primary_10_1002_rnc_7103
crossref_primary_10_1109_TCYB_2024_3365608
crossref_primary_10_1109_TCSI_2023_3336730
crossref_primary_10_1016_j_conengprac_2024_106082
crossref_primary_10_1109_TFUZZ_2023_3319662
crossref_primary_10_1002_rnc_7669
crossref_primary_10_1007_s00034_024_02608_2
crossref_primary_10_1109_TFUZZ_2023_3262686
crossref_primary_10_1109_TSMC_2023_3312520
crossref_primary_10_1109_TCSII_2023_3329802
crossref_primary_10_1109_TSMC_2024_3378773
crossref_primary_10_1109_ACCESS_2023_3296785
crossref_primary_10_1109_TCSI_2024_3381334
crossref_primary_10_1002_rnc_7274
crossref_primary_10_1002_rnc_7373
crossref_primary_10_1016_j_sysconle_2024_106001
crossref_primary_10_1109_TSMC_2024_3370221
crossref_primary_10_1109_TASE_2023_3321748
crossref_primary_10_1002_rnc_7332
crossref_primary_10_1002_rnc_7232
crossref_primary_10_1002_rnc_7594
Cites_doi 10.1080/00207721.2021.1872118
10.1109/TSMC.2017.2697450
10.1109/TNNLS.2017.2740400
10.1002/rnc.5957
10.1109/TCYB.2021.3125851
10.1109/TCYB.2020.2969320
10.1002/rnc.5899
10.1080/00207721.2020.1814898
10.1016/j.automatica.2019.108545
10.1109/TCYB.2019.2915124
10.1109/TSG.2022.3202811
10.1109/TAC.2017.2756259
10.1109/TAC.2020.2991957
10.1016/j.jfranklin.2018.01.020
10.1109/TNNLS.2021.3137426
10.1109/TAC.2012.2206694
10.1016/j.automatica.2019.108557
10.1016/j.neucom.2020.01.075
10.1002/rnc.5674
10.1109/TNNLS.2012.2187926
10.1080/00207721.2021.1995528
10.1109/TCYB.2018.2818941
10.1109/TSMC.2021.3090024
10.1109/TAC.2022.3171422
10.1109/JAS.2022.105845
10.1109/TFUZZ.2020.3033851
10.1109/TCYB.2022.3215015
10.1016/j.ins.2020.06.074
10.1016/j.ins.2022.08.085
10.1109/TSMC.2019.2945067
10.1016/j.ins.2020.09.046
10.1016/j.automatica.2019.05.039
10.1109/TCYB.2022.3155755
10.1016/j.neucom.2018.07.085
10.1109/TII.2022.3202949
10.1109/TCSII.2021.3073724
10.1109/TAC.2020.3004326
10.1109/TAC.2020.3033710
10.1016/j.automatica.2021.110151
10.1109/CDC.2013.6760746
10.1016/j.automatica.2021.109517
10.3934/math.2022158
ContentType Journal Article
Copyright 2022 John Wiley & Sons Ltd.
2023 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2022 John Wiley & Sons Ltd.
– notice: 2023 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1002/rnc.6551
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1099-1239
EndPage 2878
ExternalDocumentID 10_1002_rnc_6551
RNC6551
Genre article
GrantInformation_xml – fundername: Natural Science Foundation of Shanghai
  funderid: 21ZR1444900
– fundername: Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning
– fundername: National Natural Science Foundation of China
  funderid: 62173231
GroupedDBID .3N
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABIJN
ABJNI
ACAHQ
ACCFJ
ACCZN
ACGFO
ACGFS
ACIWK
ACPOU
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AIAGR
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
F00
F01
F04
G-S
G.N
GNP
GODZA
H.T
H.X
HGLYW
HHY
HHZ
HZ~
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
NNB
O66
O9-
P2P
P2W
P2X
P4D
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
RYL
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WH7
WIH
WIK
WJL
WLBEL
WOHZO
WQJ
WRC
WWI
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAYXX
AEYWJ
AGHNM
AGYGG
AMVHM
CITATION
7SC
7SP
7TB
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2931-e9ac91a8c1b7da7a9f08966562eea498bab318bd74eb471f9ed3c2c585d5389e3
IEDL.DBID DR2
ISSN 1049-8923
IngestDate Fri Jul 25 12:24:39 EDT 2025
Thu Apr 24 23:05:49 EDT 2025
Tue Jul 01 01:03:12 EDT 2025
Wed Jan 22 16:24:09 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2931-e9ac91a8c1b7da7a9f08966562eea498bab318bd74eb471f9ed3c2c585d5389e3
Notes Funding information
National Natural Science Foundation of China, Grant/Award Number: 62173231; Natural Science Foundation of Shanghai, Grant/Award Number: 21ZR1444900; Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5489-0246
0000-0002-8169-5347
PQID 2773976934
PQPubID 1026344
PageCount 18
ParticipantIDs proquest_journals_2773976934
crossref_primary_10_1002_rnc_6551
crossref_citationtrail_10_1002_rnc_6551
wiley_primary_10_1002_rnc_6551_RNC6551
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 10 March 2023
PublicationDateYYYYMMDD 2023-03-10
PublicationDate_xml – month: 03
  year: 2023
  text: 10 March 2023
  day: 10
PublicationDecade 2020
PublicationPlace Bognor Regis
PublicationPlace_xml – name: Bognor Regis
PublicationTitle International journal of robust and nonlinear control
PublicationYear 2023
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2018; 29
2017; 63
2021; 66
2019; 50
2017; 49
2021; 546
2021; 127
2021; 548
2019; 346
2022; 69
2019; 109
2022; 616
2019; 107
2012; 58
2021; 52
2021; 51
2022; 138
2023
2022
2020; 30
2021
2020; 390
2018; 355
2022; 7
2019; 49
2022; 52
2022; 32
2020; 66
2013
2020; 65
2012; 23
e_1_2_9_30_1
e_1_2_9_31_1
e_1_2_9_11_1
e_1_2_9_34_1
e_1_2_9_10_1
e_1_2_9_35_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_12_1
e_1_2_9_33_1
e_1_2_9_15_1
e_1_2_9_38_1
e_1_2_9_14_1
e_1_2_9_39_1
e_1_2_9_17_1
e_1_2_9_36_1
e_1_2_9_16_1
e_1_2_9_37_1
e_1_2_9_19_1
e_1_2_9_18_1
e_1_2_9_41_1
e_1_2_9_42_1
e_1_2_9_20_1
e_1_2_9_40_1
e_1_2_9_22_1
e_1_2_9_21_1
e_1_2_9_24_1
e_1_2_9_43_1
e_1_2_9_23_1
e_1_2_9_44_1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_5_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
Hu S (e_1_2_9_29_1) 2021; 51
e_1_2_9_27_1
References_xml – volume: 32
  start-page: 1633
  issue: 3
  year: 2022
  end-page: 1653
  article-title: Decentralized event‐triggered synchronization control for complex networks with nonperiodic DoS attacks
  publication-title: Int J Robust Nonlinear Control
– volume: 65
  start-page: 3832
  issue: 9
  year: 2020
  end-page: 3846
  article-title: Optimizing attack schedules based on energy dispatch over two‐hop relay networks
  publication-title: IEEE Trans Automat Contr
– volume: 23
  start-page: 725
  issue: 5
  year: 2012
  end-page: 736
  article-title: state estimation for discrete‐time complex networks with randomly occurring sensor saturations and randomly varying sensor delays
  publication-title: IEEE Trans Neural Netw Learn Syst
– volume: 49
  start-page: 1979
  issue: 5
  year: 2019
  end-page: 1986
  article-title: Synchronization control for a class of discrete time‐delay complex dynamical networks: a dynamic event‐triggered approach
  publication-title: IEEE Trans Cybern
– volume: 30
  start-page: 190
  issue: 1
  year: 2020
  end-page: 204
  article-title: Attack‐resilient event‐triggered fuzzy interval type‐2 filter design for networked nonlinear systems under sporadic denial‐of‐service jamming attacks
  publication-title: IEEE Trans Fuzzy Syst
– volume: 109
  year: 2019
  article-title: Attack and estimator design for multi‐sensor systems with undetectable adversary
  publication-title: Automatica
– volume: 29
  start-page: 3906
  issue: 8
  year: 2018
  end-page: 3912
  article-title: Partial‐nodes‐based state estimation for complex networks with unbounded distributed delays
  publication-title: IEEE Trans Neural Netw Learn Syst
– year: 2022
  article-title: Watermarking‐based protection strategy against stealthy integrity attack on distributed state estimation
  publication-title: IEEE Trans Automat Contr
– volume: 32
  start-page: 2536
  issue: 5
  year: 2022
  end-page: 2550
  article-title: Observer‐based adaptive event‐triggered PID control for networked systems under aperiodic DoS attacks
  publication-title: Int J Robust Nonlinear Control
– volume: 52
  start-page: 1192
  issue: 6
  year: 2021
  end-page: 1205
  article-title: Distributed non‐fragile set‐membership filtering for nonlinear systems under fading channels and bias injection attacks
  publication-title: Int J Syst Sci
– volume: 32
  start-page: 3425
  issue: 6
  year: 2022
  end-page: 3441
  article-title: An adaptive torus‐event‐based controller design for networked T‐S fuzzy systems under deception attacks
  publication-title: Int J Robust Nonlinear Control
– volume: 51
  start-page: 6179
  issue: 12
  year: 2021
  end-page: 6187
  article-title: Data‐driven false data‐injection attack design and detection in cyber‐physical systems
  publication-title: IEEE Trans Cybern
– volume: 548
  start-page: 69
  year: 2021
  end-page: 84
  article-title: Hybrid‐triggered‐based security controller design for networked control system under multiple cyber attacks
  publication-title: Inf Sci
– volume: 51
  start-page: 1392
  issue: 3
  year: 2021
  end-page: 1403
  article-title: Resilient filtering for event‐triggered networked systems under nonperiodic DoS jamming attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– year: 2022
  article-title: Measurement outliers diagnosis and state of charge estimation for lithium‐ion batteries
  publication-title: IEEE Trans Ind Inform
– volume: 52
  start-page: 4200
  issue: 7
  year: 2022
  end-page: 4210
  article-title: Stochastic event‐triggered control for networked systems under denial of service attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 138
  year: 2022
  article-title: Security analysis and defense strategy of distributed filtering under false data injection attacks
  publication-title: Automatica
– volume: 49
  start-page: 455
  issue: 2
  year: 2017
  end-page: 468
  article-title: Distributed dimensionality reduction fusion estimation for cyber‐physical systems under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 51
  start-page: 4825
  issue: 8
  year: 2021
  end-page: 4835
  article-title: Optimal switching attacks and countermeasures in cyber‐physical systems
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 616
  start-page: 306
  year: 2022
  end-page: 321
  article-title: Event‐based security tracking control for networked control systems against stochastic cyber‐attacks
  publication-title: Inf Sci
– volume: 58
  start-page: 475
  issue: 2
  year: 2012
  end-page: 481
  article-title: A delay system method for designing event‐triggered controllers of networked control systems
  publication-title: IEEE Trans Automat Contr
– year: 2021
  article-title: Dynamic event‐triggered output feedback control for networked systems subject to multiple cyber‐attacks
  publication-title: IEEE Trans Cybern
– volume: 66
  start-page: 2332
  issue: 5
  year: 2020
  end-page: 2338
  article-title: Setpoint attack detection in cyber‐physical systems
  publication-title: IEEE Trans Automat Contr
– year: 2022
  article-title: Memory‐event‐triggered fault detection of networked IT2 T‐S fuzzy systems
  publication-title: IEEE Trans Cybern
– volume: 390
  start-page: 69
  issue: 21
  year: 2020
  end-page: 77
  article-title: Optimal periodic DoS attack with energy harvester in cyber‐physical systems
  publication-title: Neurocomputing
– year: 2022
  article-title: Chance‐constrained state estimation for recursive neural networks under deception attacks and energy constraints: the finite‐horizon case
  publication-title: IEEE Trans Neural Netw Learn Syst
– volume: 127
  year: 2021
  article-title: Optimal DoS attack schedules on remote state estimation under multi‐sensor round‐robin protocol
  publication-title: Automatica
– volume: 52
  start-page: 3351
  issue: 16
  year: 2021
  end-page: 3367
  article-title: A survey on state estimation of complex dynamical networks
  publication-title: Int J Syst Sci
– volume: 546
  start-page: 192
  year: 2021
  end-page: 205
  article-title: Detection of stealthy false data injection attacks against networked control systems via active data modification
  publication-title: Inf Sci
– volume: 109
  year: 2019
  article-title: Distributed Krein space‐based attack detection over sensor networks under deception attacks
  publication-title: Automatica
– volume: 69
  start-page: 149
  issue: 1
  year: 2022
  end-page: 153
  article-title: False data injection attacks against partial sensor measurements of networked control systems
  publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs
– volume: 107
  start-page: 296
  year: 2019
  end-page: 305
  article-title: Chance‐constrained control for a class of time‐varying systems with stochastic nonlinearities: the finite‐horizon case
  publication-title: Automatica
– year: 2022
  article-title: Security‐ensured state of charge estimation of lithiumion batteries subject to malicious attacks
  publication-title: IEEE Trans Smart Grid
– volume: 7
  start-page: 2858
  issue: 2
  year: 2022
  end-page: 2877
  article-title: Adaptive event‐triggered state estimation for complex networks with nonlinearities against hybrid attacks
  publication-title: AIMS Math
– volume: 346
  start-page: 38
  year: 2019
  end-page: 47
  article-title: Resilient state estimation for nonlinear complex networks with time‐delay under stochastic communication protocol
  publication-title: Neurocomputing
– year: 2023
  article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial‐of‐service attacks
  publication-title: IEEE/CAA J Automat Sin
– year: 2022
  article-title: Segment‐weighted information‐based event‐triggered mechanism for networked control systems
  publication-title: IEEE Trans Cybern
– volume: 66
  start-page: 4214
  issue: 9
  year: 2021
  end-page: 4221
  article-title: Resilient actuator fault estimation for discrete‐time complex networks: a distributed approach
  publication-title: IEEE Trans Automat Contr
– volume: 51
  start-page: 3364
  issue: 16
  year: 2021
  end-page: 3377
  article-title: Set‐membership filtering for time‐varying complex networks with uniform quantisations over randomly delayed redundant channels
  publication-title: Int J Syst Sci
– volume: 355
  start-page: 2874
  issue: 5
  year: 2018
  end-page: 2891
  article-title: Event‐triggered state estimation for state‐saturated complex networks subject to quantization effects and distributed delays
  publication-title: J Franklin Inst
– volume: 50
  start-page: 2338
  issue: 6
  year: 2019
  end-page: 2345
  article-title: Summation detector for false data‐injection attack in cyber‐physical systems
  publication-title: IEEE Trans Cybern
– year: 2013
– volume: 63
  start-page: 1648
  issue: 6
  year: 2017
  end-page: 1663
  article-title: Optimal denial‐of‐service attack scheduling with energy constraint over packet‐dropping networks
  publication-title: IEEE Trans Automat Contr
– ident: e_1_2_9_16_1
  doi: 10.1080/00207721.2021.1872118
– ident: e_1_2_9_33_1
  doi: 10.1109/TSMC.2017.2697450
– ident: e_1_2_9_8_1
  doi: 10.1109/TNNLS.2017.2740400
– ident: e_1_2_9_18_1
  doi: 10.1002/rnc.5957
– ident: e_1_2_9_42_1
  doi: 10.1109/TCYB.2021.3125851
– ident: e_1_2_9_32_1
  doi: 10.1109/TCYB.2020.2969320
– ident: e_1_2_9_5_1
  doi: 10.1002/rnc.5899
– ident: e_1_2_9_3_1
  doi: 10.1080/00207721.2020.1814898
– ident: e_1_2_9_30_1
  doi: 10.1016/j.automatica.2019.108545
– ident: e_1_2_9_40_1
  doi: 10.1109/TCYB.2019.2915124
– ident: e_1_2_9_12_1
  doi: 10.1109/TSG.2022.3202811
– ident: e_1_2_9_23_1
  doi: 10.1109/TAC.2017.2756259
– ident: e_1_2_9_24_1
  doi: 10.1109/TAC.2020.2991957
– ident: e_1_2_9_43_1
  doi: 10.1016/j.jfranklin.2018.01.020
– ident: e_1_2_9_13_1
  doi: 10.1109/TNNLS.2021.3137426
– ident: e_1_2_9_37_1
  doi: 10.1109/TAC.2012.2206694
– ident: e_1_2_9_17_1
  doi: 10.1016/j.automatica.2019.108557
– ident: e_1_2_9_26_1
  doi: 10.1016/j.neucom.2020.01.075
– ident: e_1_2_9_39_1
  doi: 10.1002/rnc.5674
– ident: e_1_2_9_11_1
  doi: 10.1109/TNNLS.2012.2187926
– ident: e_1_2_9_2_1
  doi: 10.1080/00207721.2021.1995528
– ident: e_1_2_9_4_1
  doi: 10.1109/TCYB.2018.2818941
– ident: e_1_2_9_14_1
  doi: 10.1109/TSMC.2021.3090024
– volume: 51
  start-page: 1392
  issue: 3
  year: 2021
  ident: e_1_2_9_29_1
  article-title: Resilient H∞$$ {H}_{\infty } $$ filtering for event‐triggered networked systems under nonperiodic DoS jamming attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– ident: e_1_2_9_35_1
  doi: 10.1109/TAC.2022.3171422
– ident: e_1_2_9_21_1
  doi: 10.1109/JAS.2022.105845
– ident: e_1_2_9_27_1
  doi: 10.1109/TFUZZ.2020.3033851
– ident: e_1_2_9_38_1
  doi: 10.1109/TCYB.2022.3215015
– ident: e_1_2_9_15_1
  doi: 10.1016/j.ins.2020.06.074
– ident: e_1_2_9_28_1
  doi: 10.1016/j.ins.2022.08.085
– ident: e_1_2_9_34_1
  doi: 10.1109/TSMC.2019.2945067
– ident: e_1_2_9_41_1
  doi: 10.1016/j.ins.2020.09.046
– ident: e_1_2_9_7_1
  doi: 10.1016/j.automatica.2019.05.039
– ident: e_1_2_9_36_1
  doi: 10.1109/TCYB.2022.3155755
– ident: e_1_2_9_9_1
  doi: 10.1016/j.neucom.2018.07.085
– ident: e_1_2_9_10_1
  doi: 10.1109/TII.2022.3202949
– ident: e_1_2_9_20_1
  doi: 10.1109/TCSII.2021.3073724
– ident: e_1_2_9_31_1
  doi: 10.1109/TAC.2020.3004326
– ident: e_1_2_9_6_1
  doi: 10.1109/TAC.2020.3033710
– ident: e_1_2_9_19_1
  doi: 10.1016/j.automatica.2021.110151
– ident: e_1_2_9_22_1
  doi: 10.1109/CDC.2013.6760746
– ident: e_1_2_9_25_1
  doi: 10.1016/j.automatica.2021.109517
– ident: e_1_2_9_44_1
  doi: 10.3934/math.2022158
SSID ssj0009924
Score 2.5274258
Snippet This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important‐data‐based (IDB)...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2861
SubjectTerms Algorithms
Eavesdropping
H infinity
IDB attack strategy
nonlinear complex networks (CNs)
Parameters
Performance degradation
resilient H∞$$ {H}_{\infty } $$ estimator
State estimation
Title Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.6551
https://www.proquest.com/docview/2773976934
Volume 33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA6yJ33wLl6mRBB9yrZ2bdP4NoZjCO5hOBj4UHIryGaVrRPxyZ_gb_SXeJK02xQF8akvSZPm5JzzpXz5DkJnmgdUKeYRqphPAhkLEkcsJZIx2C5aUBGau8M3vag7CK6H4bBgVZq7ME4fYv7DzXiGjdfGwbmY1heioRPwnyi0t6cNVcvgof5COYoxV88WADCJAcSUurMNv152_JqJFvByGaTaLNPZQHfl_By5ZFSb5aImX79JN_7vAzbRegE-ccvtli20orNttLYkSbiDZO_xWY8xz3MuRx9v70qncNDVOC1JXBhQLs7c-HyCLSVdv-DM0cmnl7iV4fsHi-qz3LyA5xweJlsq7OpV76JB5-q23SVFIQYiAQ14RDMumcdj6QmqOOUsbcRwTALopMHWLBZcQGgQigZaQLJLmVZN6Us4iSiIp0w391AFJqb3EWbcE2GUstBomPoqijWE40CpQDa5ln5wgC5KoySyUCk3xTLGidNX9hNYtsQs2wE6nbd8csocP7SplnZNCt-cJj6lBoSxJgx2bg30a_-k32ub5-FfGx6hVVOPnljCXxVV8slMHwNqycWJ3Z-fpjjukA
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA4yD-rB3-J0agTRU-batU2jpzEdU-cOouBBCPlVELXK1ol48k_wb_Qv8aVZnYqCeOoladO8vPe-hJfvQ2jLiIBqzTxCNfNJoGJJ4oglRDEGy8VIKkN7d_i0G7UvguPL8HIM7Rd3YRw_xMeBm_WMPF5bB7cH0rsj1tAeOFAU2uvT41bQ28oXHJyNuKMYc4q2AIFJDDCmYJ6t-btFz6-5aAQwP8PUPM-0ZtBVMUJXXnJTHWSyqp6_kTf-8xdm0fQQf-KGWzBzaMyk82jqEyvhAlLd-0dzi0WWCXXz9vKqTQJ7XYOToo4LA9DFqRuA6OG8Kt084dRVlPf3cCPF13c5sE8z-wKRCXjYhKmxk6xeRBetw_Nmmwy1GIgCQOARw4RinoiVJ6kWVLCkFsNOCdCTAXOzWAoJ0UFqGhgJ-S5hRteVr2AzoiGkMlNfQiUYmFlGmAlPhlHCQktj6usoNhCRA60DVRdG-UEZ7RRW4WpIVG71Mm65o1j2OUwbt9NWRpsfLR8cOccPbSqFYfnQPfvcp9TiMFaHj23nFvq1Pz_rNu1z5a8NN9BE-_y0wztH3ZNVNGnl6Ule_1dBpaw3MGsAYjK5ni_Wd3YV8qo
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6ygujBt7g-I4iesrvtpk3jTdTF5yKisOCh5FUQtS67XRFP_gR_o7_ESdO6KgriKZdJk2YyM1_C5BuENo2gTGvuEaa5T6iKJIlCnhDFOWwXI5kM7Nvhs3Z4eEWPO0GnyKq0b2EcP8THhZu1jNxfWwPv6qQ-JA3tgf2EgX09PUpDsBULiC6G1FGcu4K2gIBJBCimJJ5t-PWy59dQNMSXn1FqHmZaU-i6nKDLLrmtDTJZU8_fuBv_9wfTaLJAn3jXbZcZNGLSWTTxiZNwDqn2w6O5wyLLhLp9e3nVJoGTrsFJmcWFAebi1I0vejjPSTdPOHX55P0dvJvim_sc1qeZ_YDIBDQ2XGrsClbPo6vWweXeISkqMRAFcMAjhgvFPREpTzItmOBJI4JzEmAnA8rmkRQSfIPUjBoJ0S7hRjeVr-AoosGhctNcQBWYmFlEmAtPBmHCA0ti6uswMuCPqdZUNYVRPq2i7VIpsSpoym21jLvYESz7MSxbbJetijY-JLuOmuMHmZVSr3FhnP3YZ8yiMN6EwbZyBf3aP75o79l26a-C62jsfL8Vnx61T5bRuK1NT_LkvxVUyXoDswoIJpNr-VZ9B9cN8WI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Novel+attack%E2%80%90defense+framework+for+nonlinear+complex+networks%3A+An+important%E2%80%90data%E2%80%90based+method&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Wang%2C+Xun&rft.au=Tian%2C+Engang&rft.au=Wei%2C+Bin&rft.au=Liu%2C+Jinliang&rft.date=2023-03-10&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=33&rft.issue=4&rft.spage=2861&rft.epage=2878&rft_id=info:doi/10.1002%2Frnc.6551&rft.externalDBID=10.1002%252Frnc.6551&rft.externalDocID=RNC6551
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon