K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks
In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters...
Saved in:
Published in | International journal of robust and nonlinear control Vol. 32; no. 6; pp. 3469 - 3484 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Bognor Regis
Wiley Subscription Services, Inc
01.04.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters are applied to develop a novel observer to reveal the state information, and based on which an adaptive control law is designed. It is shown that asymptotic stability of nonlinear systems and boundedness of all the closed‐loop signals can be guaranteed using backstepping method even in presence of adversarial attacks. Simulations results illustrate the effectiveness of the proposed algorithms. |
---|---|
AbstractList | In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters are applied to develop a novel observer to reveal the state information, and based on which an adaptive control law is designed. It is shown that asymptotic stability of nonlinear systems and boundedness of all the closed‐loop signals can be guaranteed using backstepping method even in presence of adversarial attacks. Simulations results illustrate the effectiveness of the proposed algorithms. |
Author | Gao, Rui Su, Xiaojie Huang, Jiangshuai Zhao, Ling |
Author_xml | – sequence: 1 givenname: Rui orcidid: 0000-0002-4924-1652 surname: Gao fullname: Gao, Rui organization: Chongqing University – sequence: 2 givenname: Jiangshuai orcidid: 0000-0002-2590-3738 surname: Huang fullname: Huang, Jiangshuai email: jshuang@cqu.edu.cn organization: Chongqing University – sequence: 3 givenname: Xiaojie orcidid: 0000-0003-1802-0264 surname: Su fullname: Su, Xiaojie organization: Chongqing University – sequence: 4 givenname: Ling surname: Zhao fullname: Zhao, Ling organization: Chongqing Jiaotong University |
BookMark | eNp1kM1KAzEUhYNUsK2CjxBw42ZqJslMm6UU_7AoiK6HTObGpk4nY5JRuhB8BJ_RJzFjXYmu7oH7nXMvZ4QGjW0AocOUTFJC6Ilr1CQTOd1Bw5QIkaSUiUGvuUhmgrI9NPJ-RUjcUT5Eb9ef7x_a1AFcFKX0UGFZyTaYF8C2C20XsAaoSqmesLJNcLbG2jq8NI_L6LCuAofjD7VpQDrsNz7A2mPflStQAQeLpQqdDNEimwp7aHwvQ4iBfh_tall7OPiZY_RwfnY_v0wWtxdX89NFoqhgNIE8PjClUHLQhAOdZZzlMmNM5CSVqaaSKwF6WmVUC51PS5aWTFWlkjllipVsjI62ua2zzx34UKxs55p4sqA5J5TzGaWROt5SylnvHeiidWYt3aZISdGXW8Ryi77ciE5-ocoEGUxfkDT1X4Zka3g1NWz-DS7ububf_BeebZKh |
CitedBy_id | crossref_primary_10_1016_j_ins_2023_03_088 crossref_primary_10_1002_oca_3187 crossref_primary_10_1016_j_automatica_2024_111871 crossref_primary_10_1016_j_nahs_2023_101412 crossref_primary_10_1002_rnc_7107 crossref_primary_10_1109_TAC_2023_3287802 crossref_primary_10_1109_TICPS_2023_3298267 crossref_primary_10_1016_j_chaos_2024_115170 crossref_primary_10_1109_TCYB_2024_3373198 |
Cites_doi | 10.1109/TCYB.2017.2716115 10.1016/j.automatica.2020.109242 10.1109/TAC.2017.2652127 10.1109/TCYB.2017.2737652 10.1016/j.ins.2018.12.091 10.1109/TNNLS.2019.2955132 10.1016/j.automatica.2019.03.013 10.2514/1.G004171 10.1109/TIE.2021.3065835 10.1016/j.automatica.2018.03.061 10.1080/00207179.2018.1450524 10.1016/j.automatica.2020.109021 10.1002/rnc.4749 10.1007/s11071-020-06085-5 10.1109/TCST.2011.2121907 10.1109/TNNLS.2021.3087796 10.1109/TAC.2019.2912517 10.1109/TCYB.2019.2915124 10.1109/TNNLS.2021.3069209 10.1016/j.automatica.2017.09.028 10.1016/j.ins.2020.07.022 10.1109/TCYB.2021.3069587 10.1016/j.automatica.2018.12.027 10.1109/TFUZZ.2020.2990772 10.1109/TAC.2002.800773 10.1002/rnc.5498 10.1109/TIE.2018.2793241 10.1016/j.ins.2019.12.016 10.1016/j.automatica.2019.108698 |
ContentType | Journal Article |
Copyright | 2021 John Wiley & Sons Ltd. 2022 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2021 John Wiley & Sons Ltd. – notice: 2022 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
DOI | 10.1002/rnc.5962 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1099-1239 |
EndPage | 3484 |
ExternalDocumentID | 10_1002_rnc_5962 RNC5962 |
Genre | article |
GrantInformation_xml | – fundername: Basic Science and Frontier Technology Research Projects of Chongqing Science and Technology Program (General Projects) funderid: cstc2021jcyj‐msxmX1041 – fundername: Ningbo Major Project funderid: 2018B10067 – fundername: National Natural Science Foundation of China funderid: 62173052 – fundername: National Key Research and Development Program of China funderid: 2019YFB1312002 |
GroupedDBID | .3N .GA .Y3 05W 0R~ 10A 1L6 1OB 1OC 31~ 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ABJNI ACAHQ ACBWZ ACCFJ ACCZN ACGFO ACGFS ACIWK ACPOU ACRPL ACSCC ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AI. AIAGR AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CMOOK CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS EJD F00 F01 F04 FEDTE G-S G.N GNP GODZA H.T H.X HF~ HGLYW HHY HHZ HVGLF HZ~ IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES M59 MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- P2P P2W P2X P4D PALCI Q.N Q11 QB0 QRW R.K RIWAO RJQFR ROL RWI RX1 RYL SAMSI SUPJJ TUS UB1 V2E VH1 W8V W99 WBKPD WH7 WIH WIK WJL WLBEL WOHZO WQJ WRC WWI WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT AAYXX AEYWJ AGHNM AGQPQ AGYGG AMVHM CITATION 7SC 7SP 7TB 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2932-e6edb72eb4ef04e285436a5339601a1f2a4c9ef7d52f9f67b31b3cdbca623c3b3 |
IEDL.DBID | DR2 |
ISSN | 1049-8923 |
IngestDate | Fri Jul 25 12:11:24 EDT 2025 Tue Jul 01 01:03:09 EDT 2025 Thu Apr 24 22:56:59 EDT 2025 Wed Jan 22 16:25:50 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2932-e6edb72eb4ef04e285436a5339601a1f2a4c9ef7d52f9f67b31b3cdbca623c3b3 |
Notes | Funding information National Key Research and Development Program of China, 2019YFB1312002; National Natural Science Foundation of China, 62173052; Basic Science and Frontier Technology Research Projects of Chongqing Science and Technology Program (General Projects), cstc2021jcyj‐msxmX1041; Ningbo Major Project, 2018B10067 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-4924-1652 0000-0002-2590-3738 0000-0003-1802-0264 |
PQID | 2640244822 |
PQPubID | 1026344 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2640244822 crossref_primary_10_1002_rnc_5962 crossref_citationtrail_10_1002_rnc_5962 wiley_primary_10_1002_rnc_5962_RNC5962 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | April 2022 2022-04-00 20220401 |
PublicationDateYYYYMMDD | 2022-04-01 |
PublicationDate_xml | – month: 04 year: 2022 text: April 2022 |
PublicationDecade | 2020 |
PublicationPlace | Bognor Regis |
PublicationPlace_xml | – name: Bognor Regis |
PublicationTitle | International journal of robust and nonlinear control |
PublicationYear | 2022 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2017; 62 2021; 69 2019; 92 2021; 103 2021; 543 2021; 29 2019; 105 2019; 102 2020; 122 2019; 481 2018; 87 2018; 48 2002; 47 2021; 32 2021; 31 2020; 31 2020; 30 2019; 66 2021 2020; 50 2020; 118 2020; 112 2020; 43 2020; 65 2018; 93 2020; 515 2012; 20 e_1_2_9_30_1 e_1_2_9_11_1 e_1_2_9_10_1 e_1_2_9_13_1 e_1_2_9_12_1 e_1_2_9_15_1 e_1_2_9_14_1 e_1_2_9_17_1 e_1_2_9_16_1 e_1_2_9_19_1 e_1_2_9_18_1 e_1_2_9_20_1 e_1_2_9_22_1 e_1_2_9_21_1 e_1_2_9_24_1 e_1_2_9_23_1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_5_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_25_1 e_1_2_9_28_1 e_1_2_9_27_1 e_1_2_9_29_1 |
References_xml | – volume: 48 start-page: 1862 issue: 6 year: 2018 end-page: 1876 article-title: Secure fusion estimation for bandwidth constrained cyber‐physical systems under replay attacks publication-title: IEEE Trans Cybern – volume: 29 start-page: 1978 issue: 7 year: 2021 end-page: 1991 article-title: An adaptive secure control scheme for T‐S fuzzy systems against simultaneous stealthy sensor and actuator attacks publication-title: IEEE Trans Fuzzy Syst – year: 2021 article-title: Observer‐based adaptive optimized control for stochastic nonlinear systems with input and state constraints publication-title: IEEE Trans Neural Netw Learn Syst – volume: 92 start-page: 2561 issue: 11 year: 2019 end-page: 2570 article-title: An adaptive control architecture for leader‐follower multi‐agent systems with stochastic disturbances and sensor and actuator attacks publication-title: Int J Control – volume: 87 start-page: 176 year: 2018 end-page: 183 article-title: State estimation under false data injection attacks: security analysis and system protection publication-title: Automatica – volume: 32 start-page: 5512 issue: 12 year: 2021 end-page: 5525 article-title: Adaptive iterative learning control of multiple autonomous vehicles with a time‐varying reference under actuator faults publication-title: IEEE Trans Neural Netw Learn Syst – volume: 102 start-page: 34 year: 2019 end-page: 44 article-title: Distributed filtering under false data injection attacks publication-title: Automatica – volume: 112 start-page: 1 year: 2020 end-page: 13 article-title: Optimal periodic watermarking schedule for replay attack detection in cyber‐physical systems publication-title: Automatica – volume: 43 start-page: 15 issue: 1 year: 2020 end-page: 29 article-title: Adaptive control for multi‐agent systems with sensor‐actuator attacks and stochastic disturbances publication-title: J Guid Control Dyn – volume: 118 year: 2020 article-title: Distributed adaptive leader‐follower and leaderless consensus control of a class of strict‐feedback nonlinear systems: a unified approach publication-title: Automatica – volume: 69 start-page: 2822 issue: 3 year: 2021 end-page: 2832 article-title: Adaptive control design for underactuated cranes with guaranteed transient performance: theoretical design and experimental verification publication-title: IEEE Trans Ind Electron – volume: 30 start-page: 65 year: 2020 end-page: 79 article-title: Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks publication-title: Int J Robust Nonlinear Control – volume: 543 start-page: 398 year: 2021 end-page: 409 article-title: Resilient adaptive control of switched nonlinear cyber‐physical systems under uncertain deception attacks publication-title: Inf Sci – volume: 31 start-page: 4689 year: 2021 end-page: 4704 article-title: Finite‐time adaptive neural control for nonlinear systems under state‐dependent sensor attacks publication-title: Int J Robust Nonlinear Control – volume: 31 start-page: 4341 issue: 10 year: 2020 end-page: 4353 article-title: Neural‐network‐based adaptive resilient dynamic surface control against unknown deception attacks of uncertain nonlinear time‐delay cyber physical systems publication-title: IEEE Trans Neural Netw Learn Syst – volume: 515 start-page: 248 year: 2020 end-page: 262 article-title: Secure distributed estimation against false data injection attack publication-title: Inf Sci – volume: 20 start-page: 566 issue: 3 year: 2012 end-page: 580 article-title: Command filtered adaptive backstepping publication-title: IEEE Trans Control Syst Technol – volume: 66 start-page: 1543 issue: 2 year: 2019 end-page: 1551 article-title: Distributed load sharing under false data injection attack in an inverter‐based microgrid publication-title: IEEE Ind Electron – volume: 62 start-page: 6058 issue: 11 year: 2017 end-page: 6064 article-title: An adaptive control architecture for mitigating sensor and actuator attacks in cyber‐physical systems publication-title: IEEE Trans Automat Contr – volume: 103 start-page: 1585 year: 2021 end-page: 1598 article-title: Adaptive attack‐resilient control for Markov jump system with additive attacks publication-title: Nonlinear Dyn – volume: 93 start-page: 98 year: 2018 end-page: 105 article-title: Adaptive control of a class of strict‐feedback time‐varying nonlinear systems with unknown control coefficients publication-title: Automatica – volume: 47 start-page: 1249 year: 2002 end-page: 1266 article-title: Adaptive control of nonlinearly parameterized systems: the smooth feedback case publication-title: IEEE Trans Automat Contr – volume: 105 start-page: 186 year: 2019 end-page: 197 article-title: A K‐filter‐based adaptive control for nonlinear systems with unknown parameters in state and output equations publication-title: Automatica – volume: 65 start-page: 318 issue: 1 year: 2020 end-page: 324 article-title: Adaptive event‐triggered control of nonlinear systems with controller and parameter estimator triggering publication-title: IEEE Trans Automat Contr – volume: 122 start-page: 1 year: 2020 end-page: 7 article-title: Adaptive consensus for heterogeneous multi‐agent systems under sensor and actuator attacks publication-title: Automatica – volume: 481 start-page: 432 year: 2019 end-page: 444 article-title: Stochastic coding detection scheme in cyber‐physical systems against replay attack publication-title: Inf Sci – volume: 48 start-page: 2349 issue: 8 year: 2018 end-page: 2356 article-title: Fully distributed adaptive consensus control of a class of high‐order nonlinear systems with a directed topology and unknown control directions publication-title: IEEE Trans Cybern – volume: 50 start-page: 2338 issue: 6 year: 2020 end-page: 2345 article-title: Summation detector for false data‐injection attack in cyber‐physical systems publication-title: IEEE Trans Cybern – year: 2021 article-title: Adaptive optimized backstepping control‐based RL algorithm for stochastic nonlinear systems with state constraints and its application publication-title: IEEE Trans Cybern – ident: e_1_2_9_2_1 doi: 10.1109/TCYB.2017.2716115 – ident: e_1_2_9_13_1 doi: 10.1016/j.automatica.2020.109242 – ident: e_1_2_9_12_1 doi: 10.1109/TAC.2017.2652127 – ident: e_1_2_9_28_1 doi: 10.1109/TCYB.2017.2737652 – ident: e_1_2_9_4_1 doi: 10.1016/j.ins.2018.12.091 – ident: e_1_2_9_18_1 doi: 10.1109/TNNLS.2019.2955132 – ident: e_1_2_9_29_1 doi: 10.1016/j.automatica.2019.03.013 – ident: e_1_2_9_7_1 doi: 10.2514/1.G004171 – ident: e_1_2_9_24_1 doi: 10.1109/TIE.2021.3065835 – ident: e_1_2_9_21_1 doi: 10.1016/j.automatica.2018.03.061 – ident: e_1_2_9_8_1 doi: 10.1080/00207179.2018.1450524 – ident: e_1_2_9_22_1 doi: 10.1016/j.automatica.2020.109021 – ident: e_1_2_9_15_1 doi: 10.1002/rnc.4749 – ident: e_1_2_9_14_1 doi: 10.1007/s11071-020-06085-5 – ident: e_1_2_9_30_1 doi: 10.1109/TCST.2011.2121907 – ident: e_1_2_9_25_1 doi: 10.1109/TNNLS.2021.3087796 – ident: e_1_2_9_20_1 doi: 10.1109/TAC.2019.2912517 – ident: e_1_2_9_9_1 doi: 10.1109/TCYB.2019.2915124 – ident: e_1_2_9_23_1 doi: 10.1109/TNNLS.2021.3069209 – ident: e_1_2_9_5_1 doi: 10.1016/j.automatica.2017.09.028 – ident: e_1_2_9_19_1 doi: 10.1016/j.ins.2020.07.022 – ident: e_1_2_9_26_1 doi: 10.1109/TCYB.2021.3069587 – ident: e_1_2_9_10_1 doi: 10.1016/j.automatica.2018.12.027 – ident: e_1_2_9_17_1 doi: 10.1109/TFUZZ.2020.2990772 – ident: e_1_2_9_27_1 doi: 10.1109/TAC.2002.800773 – ident: e_1_2_9_16_1 doi: 10.1002/rnc.5498 – ident: e_1_2_9_11_1 doi: 10.1109/TIE.2018.2793241 – ident: e_1_2_9_6_1 doi: 10.1016/j.ins.2019.12.016 – ident: e_1_2_9_3_1 doi: 10.1016/j.automatica.2019.108698 |
SSID | ssj0009924 |
Score | 2.404288 |
Snippet | In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3469 |
SubjectTerms | actuator attacks Actuators Adaptive control Algorithms Control stability Control theory Feedback control K‐filter Nonlinear systems Output feedback output feedback control sensor attacks |
Title | K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.5962 https://www.proquest.com/docview/2640244822 |
Volume | 32 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NSsNAEF6kJz34L1arrCB6SjWbdJM9SlGKYg_FguAh7CS7IJW2NMlFEHwEn9EncSY_rYqCeEoOu2SyuzPzze7Mt4wdE4o22g0dT2vp-DK0DkjlOiHGzlooUElx0H7bl72hf33fua-yKqkWpuSHmG-4kWYU9poUXEN6tiANnaH-0NUxaH4pVYvw0GDBHKVUeZ8tyuKECGJq3tlzcVZ3_OqJFvDyM0gtvMzVGnuo5SuTS0btPIN2_PyNuvF_P7DOVivwyS_K1bLBlsx4k618oiTcYi83769v9pHO0PGFfFzCdaKnZBX5JM-mecYtejzQ8YhXee4cgS8n3mPsUVB58nEpn57xkik65WkOtOPDswnXVLOCoT7X44SnGEbTa5ZRsf82G15d3nV7TnVFgxMjThCOkfjBQBjwjT33DZVjelIjhMTAyNWuFdqPlbFB0hFWWRmA54IXJxBrhF2xB94Oa6BIZpdxC9YatA9GAIaoQaCV9aRVIEGoAFzRZKf1dEVxxV9O12g8RSXzsohwQCMa0CY7mreclpwdP7Rp1TMeVVqbRggOEbL4iJma7KSYul_7R4N-l557f224z5YFVU4UST8t1shmuTlAPJPBYbFyPwAJxPgo |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60HtSDb7FaNYLoaW03u2YbPIko9dEeioIHYUl2E5BKLe3uRRD8Cf5Gf4kz-7AqCuJpc0jIbJLJfJNkvgHYJRRtlNt0PKWE44umdbSQrtNE31lxqWWcXbS3O6J141_cHt5OwFEZC5PzQ3wcuJFmZPs1KTgdSNfHrKFDVCDKHTMJU5TQO_OnumPuKCnzjLYojdNEGFMyzzZ4vWz51RaNAeZnmJrZmbN5uCslzJ-X9A7SRB9ET9_IG__5CwswV-BPdpwvmEWYMP0lmP3ESrgMz5dvL6_2nq7RsUBmLmYqVgPaGNljmgzShFk0elpFPVY8dWeIfRlRH2OLjM2T9XMB1ZDlZNEjNko1Hfqw5JEpCltBb5-pfsxG6ElTMUko3n8Fbs5Or09aTpGlwYkQKnDHCOww4Eb7xjZ8QxGZnlCIItE3cpVrufIjaWwQH3IrrQi052ovinWkEHlFnvZWoYIimTVgVltrcIswXKOXGgRKWk9YqYXmMtAur8J-OV9hVFCYUyaNhzAnX-YhDmhIA1qFnY-ag5y244c6tXLKw0JxRyHiQ0QtPsKmKuxlc_dr-7DbOaHv-l8rbsN067p9FV6ddy43YIZTIEX2BqgGlWSYmk2EN4neypbxO2v8_EM |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB50BdGDb3F9RhA91d2m3bQ5irr4XEQUBA8laRMQZV1224sg-BP8jf4SZ_pwVRTEU3tI6DTJZL5JZr4B2CIUbZQbOp5SwvFFaB0tpOuE6DsrLrVM8ov28444uvZPblo3ZVQl5cIU_BAfB26kGfl-TQreS2xjSBraR_2h0jGjMOaLZkgr-uBySB0lZVHQFoVxQkQxFfFskzeqnl9N0RBffkapuZlpT8NtJWARXXK_m6V6N376xt34vz-YgakSfbK9YrnMwojpzsHkJ07CeXg-fXt5tXd0iY4vZOQSphLVo22RPWZpL0uZRZOnVXzPykB3hsiXEfEx9si5PFm3kE_1WUEVPWCDTNORD0sfmaKkFfT1meombIB-NL2mKWX7L8B1-_Bq_8gpazQ4MQIF7hiBHwy40b6xTd9QPqYnFGJI9Ixc5Vqu_FgaGyQtbqUVgfZc7cWJjhXirtjT3iLUUCSzBMxqaw1uEIZr9FGDQEnrCSu10FwG2uV12KmmK4pLAnOqo_EQFdTLPMIBjWhA67D50bJXkHb80Ga1mvGoVNtBhOgQMYuPoKkO2_nU_do_uuzs03P5rw03YPzioB2dHXdOV2CCUxZFHgC0CrW0n5k1xDapXs8X8TutBPr7 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=K%E2%80%90filter%E2%80%90based+adaptive+output+feedback+control+for+high%E2%80%90order+nonlinear+systems+subject+to+actuator+and+sensor+attacks&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Gao%2C+Rui&rft.au=Huang%2C+Jiangshuai&rft.au=Su%2C+Xiaojie&rft.au=Zhao%2C+Ling&rft.date=2022-04-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=32&rft.issue=6&rft.spage=3469&rft.epage=3484&rft_id=info:doi/10.1002%2Frnc.5962&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon |