K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks

In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of robust and nonlinear control Vol. 32; no. 6; pp. 3469 - 3484
Main Authors Gao, Rui, Huang, Jiangshuai, Su, Xiaojie, Zhao, Ling
Format Journal Article
LanguageEnglish
Published Bognor Regis Wiley Subscription Services, Inc 01.04.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters are applied to develop a novel observer to reveal the state information, and based on which an adaptive control law is designed. It is shown that asymptotic stability of nonlinear systems and boundedness of all the closed‐loop signals can be guaranteed using backstepping method even in presence of adversarial attacks. Simulations results illustrate the effectiveness of the proposed algorithms.
AbstractList In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are suffered from deceptive cyber‐attacks. By assuming that only the contaminated system output is available for feedback control, a set of K‐filters are applied to develop a novel observer to reveal the state information, and based on which an adaptive control law is designed. It is shown that asymptotic stability of nonlinear systems and boundedness of all the closed‐loop signals can be guaranteed using backstepping method even in presence of adversarial attacks. Simulations results illustrate the effectiveness of the proposed algorithms.
Author Gao, Rui
Su, Xiaojie
Huang, Jiangshuai
Zhao, Ling
Author_xml – sequence: 1
  givenname: Rui
  orcidid: 0000-0002-4924-1652
  surname: Gao
  fullname: Gao, Rui
  organization: Chongqing University
– sequence: 2
  givenname: Jiangshuai
  orcidid: 0000-0002-2590-3738
  surname: Huang
  fullname: Huang, Jiangshuai
  email: jshuang@cqu.edu.cn
  organization: Chongqing University
– sequence: 3
  givenname: Xiaojie
  orcidid: 0000-0003-1802-0264
  surname: Su
  fullname: Su, Xiaojie
  organization: Chongqing University
– sequence: 4
  givenname: Ling
  surname: Zhao
  fullname: Zhao, Ling
  organization: Chongqing Jiaotong University
BookMark eNp1kM1KAzEUhYNUsK2CjxBw42ZqJslMm6UU_7AoiK6HTObGpk4nY5JRuhB8BJ_RJzFjXYmu7oH7nXMvZ4QGjW0AocOUTFJC6Ilr1CQTOd1Bw5QIkaSUiUGvuUhmgrI9NPJ-RUjcUT5Eb9ef7x_a1AFcFKX0UGFZyTaYF8C2C20XsAaoSqmesLJNcLbG2jq8NI_L6LCuAofjD7VpQDrsNz7A2mPflStQAQeLpQqdDNEimwp7aHwvQ4iBfh_tall7OPiZY_RwfnY_v0wWtxdX89NFoqhgNIE8PjClUHLQhAOdZZzlMmNM5CSVqaaSKwF6WmVUC51PS5aWTFWlkjllipVsjI62ua2zzx34UKxs55p4sqA5J5TzGaWROt5SylnvHeiidWYt3aZISdGXW8Ryi77ciE5-ocoEGUxfkDT1X4Zka3g1NWz-DS7ububf_BeebZKh
CitedBy_id crossref_primary_10_1016_j_ins_2023_03_088
crossref_primary_10_1002_oca_3187
crossref_primary_10_1016_j_automatica_2024_111871
crossref_primary_10_1016_j_nahs_2023_101412
crossref_primary_10_1002_rnc_7107
crossref_primary_10_1109_TAC_2023_3287802
crossref_primary_10_1109_TICPS_2023_3298267
crossref_primary_10_1016_j_chaos_2024_115170
crossref_primary_10_1109_TCYB_2024_3373198
Cites_doi 10.1109/TCYB.2017.2716115
10.1016/j.automatica.2020.109242
10.1109/TAC.2017.2652127
10.1109/TCYB.2017.2737652
10.1016/j.ins.2018.12.091
10.1109/TNNLS.2019.2955132
10.1016/j.automatica.2019.03.013
10.2514/1.G004171
10.1109/TIE.2021.3065835
10.1016/j.automatica.2018.03.061
10.1080/00207179.2018.1450524
10.1016/j.automatica.2020.109021
10.1002/rnc.4749
10.1007/s11071-020-06085-5
10.1109/TCST.2011.2121907
10.1109/TNNLS.2021.3087796
10.1109/TAC.2019.2912517
10.1109/TCYB.2019.2915124
10.1109/TNNLS.2021.3069209
10.1016/j.automatica.2017.09.028
10.1016/j.ins.2020.07.022
10.1109/TCYB.2021.3069587
10.1016/j.automatica.2018.12.027
10.1109/TFUZZ.2020.2990772
10.1109/TAC.2002.800773
10.1002/rnc.5498
10.1109/TIE.2018.2793241
10.1016/j.ins.2019.12.016
10.1016/j.automatica.2019.108698
ContentType Journal Article
Copyright 2021 John Wiley & Sons Ltd.
2022 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2021 John Wiley & Sons Ltd.
– notice: 2022 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1002/rnc.5962
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1099-1239
EndPage 3484
ExternalDocumentID 10_1002_rnc_5962
RNC5962
Genre article
GrantInformation_xml – fundername: Basic Science and Frontier Technology Research Projects of Chongqing Science and Technology Program (General Projects)
  funderid: cstc2021jcyj‐msxmX1041
– fundername: Ningbo Major Project
  funderid: 2018B10067
– fundername: National Natural Science Foundation of China
  funderid: 62173052
– fundername: National Key Research and Development Program of China
  funderid: 2019YFB1312002
GroupedDBID .3N
.GA
.Y3
05W
0R~
10A
1L6
1OB
1OC
31~
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ABJNI
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFO
ACGFS
ACIWK
ACPOU
ACRPL
ACSCC
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AI.
AIAGR
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CMOOK
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
EJD
F00
F01
F04
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HF~
HGLYW
HHY
HHZ
HVGLF
HZ~
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
M59
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
NNB
O66
O9-
P2P
P2W
P2X
P4D
PALCI
Q.N
Q11
QB0
QRW
R.K
RIWAO
RJQFR
ROL
RWI
RX1
RYL
SAMSI
SUPJJ
TUS
UB1
V2E
VH1
W8V
W99
WBKPD
WH7
WIH
WIK
WJL
WLBEL
WOHZO
WQJ
WRC
WWI
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAYXX
AEYWJ
AGHNM
AGQPQ
AGYGG
AMVHM
CITATION
7SC
7SP
7TB
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2932-e6edb72eb4ef04e285436a5339601a1f2a4c9ef7d52f9f67b31b3cdbca623c3b3
IEDL.DBID DR2
ISSN 1049-8923
IngestDate Fri Jul 25 12:11:24 EDT 2025
Tue Jul 01 01:03:09 EDT 2025
Thu Apr 24 22:56:59 EDT 2025
Wed Jan 22 16:25:50 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2932-e6edb72eb4ef04e285436a5339601a1f2a4c9ef7d52f9f67b31b3cdbca623c3b3
Notes Funding information
National Key Research and Development Program of China, 2019YFB1312002; National Natural Science Foundation of China, 62173052; Basic Science and Frontier Technology Research Projects of Chongqing Science and Technology Program (General Projects), cstc2021jcyj‐msxmX1041; Ningbo Major Project, 2018B10067
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-4924-1652
0000-0002-2590-3738
0000-0003-1802-0264
PQID 2640244822
PQPubID 1026344
PageCount 16
ParticipantIDs proquest_journals_2640244822
crossref_primary_10_1002_rnc_5962
crossref_citationtrail_10_1002_rnc_5962
wiley_primary_10_1002_rnc_5962_RNC5962
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate April 2022
2022-04-00
20220401
PublicationDateYYYYMMDD 2022-04-01
PublicationDate_xml – month: 04
  year: 2022
  text: April 2022
PublicationDecade 2020
PublicationPlace Bognor Regis
PublicationPlace_xml – name: Bognor Regis
PublicationTitle International journal of robust and nonlinear control
PublicationYear 2022
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2017; 62
2021; 69
2019; 92
2021; 103
2021; 543
2021; 29
2019; 105
2019; 102
2020; 122
2019; 481
2018; 87
2018; 48
2002; 47
2021; 32
2021; 31
2020; 31
2020; 30
2019; 66
2021
2020; 50
2020; 118
2020; 112
2020; 43
2020; 65
2018; 93
2020; 515
2012; 20
e_1_2_9_30_1
e_1_2_9_11_1
e_1_2_9_10_1
e_1_2_9_13_1
e_1_2_9_12_1
e_1_2_9_15_1
e_1_2_9_14_1
e_1_2_9_17_1
e_1_2_9_16_1
e_1_2_9_19_1
e_1_2_9_18_1
e_1_2_9_20_1
e_1_2_9_22_1
e_1_2_9_21_1
e_1_2_9_24_1
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_5_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
e_1_2_9_27_1
e_1_2_9_29_1
References_xml – volume: 48
  start-page: 1862
  issue: 6
  year: 2018
  end-page: 1876
  article-title: Secure fusion estimation for bandwidth constrained cyber‐physical systems under replay attacks
  publication-title: IEEE Trans Cybern
– volume: 29
  start-page: 1978
  issue: 7
  year: 2021
  end-page: 1991
  article-title: An adaptive secure control scheme for T‐S fuzzy systems against simultaneous stealthy sensor and actuator attacks
  publication-title: IEEE Trans Fuzzy Syst
– year: 2021
  article-title: Observer‐based adaptive optimized control for stochastic nonlinear systems with input and state constraints
  publication-title: IEEE Trans Neural Netw Learn Syst
– volume: 92
  start-page: 2561
  issue: 11
  year: 2019
  end-page: 2570
  article-title: An adaptive control architecture for leader‐follower multi‐agent systems with stochastic disturbances and sensor and actuator attacks
  publication-title: Int J Control
– volume: 87
  start-page: 176
  year: 2018
  end-page: 183
  article-title: State estimation under false data injection attacks: security analysis and system protection
  publication-title: Automatica
– volume: 32
  start-page: 5512
  issue: 12
  year: 2021
  end-page: 5525
  article-title: Adaptive iterative learning control of multiple autonomous vehicles with a time‐varying reference under actuator faults
  publication-title: IEEE Trans Neural Netw Learn Syst
– volume: 102
  start-page: 34
  year: 2019
  end-page: 44
  article-title: Distributed filtering under false data injection attacks
  publication-title: Automatica
– volume: 112
  start-page: 1
  year: 2020
  end-page: 13
  article-title: Optimal periodic watermarking schedule for replay attack detection in cyber‐physical systems
  publication-title: Automatica
– volume: 43
  start-page: 15
  issue: 1
  year: 2020
  end-page: 29
  article-title: Adaptive control for multi‐agent systems with sensor‐actuator attacks and stochastic disturbances
  publication-title: J Guid Control Dyn
– volume: 118
  year: 2020
  article-title: Distributed adaptive leader‐follower and leaderless consensus control of a class of strict‐feedback nonlinear systems: a unified approach
  publication-title: Automatica
– volume: 69
  start-page: 2822
  issue: 3
  year: 2021
  end-page: 2832
  article-title: Adaptive control design for underactuated cranes with guaranteed transient performance: theoretical design and experimental verification
  publication-title: IEEE Trans Ind Electron
– volume: 30
  start-page: 65
  year: 2020
  end-page: 79
  article-title: Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks
  publication-title: Int J Robust Nonlinear Control
– volume: 543
  start-page: 398
  year: 2021
  end-page: 409
  article-title: Resilient adaptive control of switched nonlinear cyber‐physical systems under uncertain deception attacks
  publication-title: Inf Sci
– volume: 31
  start-page: 4689
  year: 2021
  end-page: 4704
  article-title: Finite‐time adaptive neural control for nonlinear systems under state‐dependent sensor attacks
  publication-title: Int J Robust Nonlinear Control
– volume: 31
  start-page: 4341
  issue: 10
  year: 2020
  end-page: 4353
  article-title: Neural‐network‐based adaptive resilient dynamic surface control against unknown deception attacks of uncertain nonlinear time‐delay cyber physical systems
  publication-title: IEEE Trans Neural Netw Learn Syst
– volume: 515
  start-page: 248
  year: 2020
  end-page: 262
  article-title: Secure distributed estimation against false data injection attack
  publication-title: Inf Sci
– volume: 20
  start-page: 566
  issue: 3
  year: 2012
  end-page: 580
  article-title: Command filtered adaptive backstepping
  publication-title: IEEE Trans Control Syst Technol
– volume: 66
  start-page: 1543
  issue: 2
  year: 2019
  end-page: 1551
  article-title: Distributed load sharing under false data injection attack in an inverter‐based microgrid
  publication-title: IEEE Ind Electron
– volume: 62
  start-page: 6058
  issue: 11
  year: 2017
  end-page: 6064
  article-title: An adaptive control architecture for mitigating sensor and actuator attacks in cyber‐physical systems
  publication-title: IEEE Trans Automat Contr
– volume: 103
  start-page: 1585
  year: 2021
  end-page: 1598
  article-title: Adaptive attack‐resilient control for Markov jump system with additive attacks
  publication-title: Nonlinear Dyn
– volume: 93
  start-page: 98
  year: 2018
  end-page: 105
  article-title: Adaptive control of a class of strict‐feedback time‐varying nonlinear systems with unknown control coefficients
  publication-title: Automatica
– volume: 47
  start-page: 1249
  year: 2002
  end-page: 1266
  article-title: Adaptive control of nonlinearly parameterized systems: the smooth feedback case
  publication-title: IEEE Trans Automat Contr
– volume: 105
  start-page: 186
  year: 2019
  end-page: 197
  article-title: A K‐filter‐based adaptive control for nonlinear systems with unknown parameters in state and output equations
  publication-title: Automatica
– volume: 65
  start-page: 318
  issue: 1
  year: 2020
  end-page: 324
  article-title: Adaptive event‐triggered control of nonlinear systems with controller and parameter estimator triggering
  publication-title: IEEE Trans Automat Contr
– volume: 122
  start-page: 1
  year: 2020
  end-page: 7
  article-title: Adaptive consensus for heterogeneous multi‐agent systems under sensor and actuator attacks
  publication-title: Automatica
– volume: 481
  start-page: 432
  year: 2019
  end-page: 444
  article-title: Stochastic coding detection scheme in cyber‐physical systems against replay attack
  publication-title: Inf Sci
– volume: 48
  start-page: 2349
  issue: 8
  year: 2018
  end-page: 2356
  article-title: Fully distributed adaptive consensus control of a class of high‐order nonlinear systems with a directed topology and unknown control directions
  publication-title: IEEE Trans Cybern
– volume: 50
  start-page: 2338
  issue: 6
  year: 2020
  end-page: 2345
  article-title: Summation detector for false data‐injection attack in cyber‐physical systems
  publication-title: IEEE Trans Cybern
– year: 2021
  article-title: Adaptive optimized backstepping control‐based RL algorithm for stochastic nonlinear systems with state constraints and its application
  publication-title: IEEE Trans Cybern
– ident: e_1_2_9_2_1
  doi: 10.1109/TCYB.2017.2716115
– ident: e_1_2_9_13_1
  doi: 10.1016/j.automatica.2020.109242
– ident: e_1_2_9_12_1
  doi: 10.1109/TAC.2017.2652127
– ident: e_1_2_9_28_1
  doi: 10.1109/TCYB.2017.2737652
– ident: e_1_2_9_4_1
  doi: 10.1016/j.ins.2018.12.091
– ident: e_1_2_9_18_1
  doi: 10.1109/TNNLS.2019.2955132
– ident: e_1_2_9_29_1
  doi: 10.1016/j.automatica.2019.03.013
– ident: e_1_2_9_7_1
  doi: 10.2514/1.G004171
– ident: e_1_2_9_24_1
  doi: 10.1109/TIE.2021.3065835
– ident: e_1_2_9_21_1
  doi: 10.1016/j.automatica.2018.03.061
– ident: e_1_2_9_8_1
  doi: 10.1080/00207179.2018.1450524
– ident: e_1_2_9_22_1
  doi: 10.1016/j.automatica.2020.109021
– ident: e_1_2_9_15_1
  doi: 10.1002/rnc.4749
– ident: e_1_2_9_14_1
  doi: 10.1007/s11071-020-06085-5
– ident: e_1_2_9_30_1
  doi: 10.1109/TCST.2011.2121907
– ident: e_1_2_9_25_1
  doi: 10.1109/TNNLS.2021.3087796
– ident: e_1_2_9_20_1
  doi: 10.1109/TAC.2019.2912517
– ident: e_1_2_9_9_1
  doi: 10.1109/TCYB.2019.2915124
– ident: e_1_2_9_23_1
  doi: 10.1109/TNNLS.2021.3069209
– ident: e_1_2_9_5_1
  doi: 10.1016/j.automatica.2017.09.028
– ident: e_1_2_9_19_1
  doi: 10.1016/j.ins.2020.07.022
– ident: e_1_2_9_26_1
  doi: 10.1109/TCYB.2021.3069587
– ident: e_1_2_9_10_1
  doi: 10.1016/j.automatica.2018.12.027
– ident: e_1_2_9_17_1
  doi: 10.1109/TFUZZ.2020.2990772
– ident: e_1_2_9_27_1
  doi: 10.1109/TAC.2002.800773
– ident: e_1_2_9_16_1
  doi: 10.1002/rnc.5498
– ident: e_1_2_9_11_1
  doi: 10.1109/TIE.2018.2793241
– ident: e_1_2_9_6_1
  doi: 10.1016/j.ins.2019.12.016
– ident: e_1_2_9_3_1
  doi: 10.1016/j.automatica.2019.108698
SSID ssj0009924
Score 2.404288
Snippet In this article, the security control problem of a class of high‐order nonlinear cyber‐physical systems is investigated where the actuator and sensor are...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3469
SubjectTerms actuator attacks
Actuators
Adaptive control
Algorithms
Control stability
Control theory
Feedback control
K‐filter
Nonlinear systems
Output feedback
output feedback control
sensor attacks
Title K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.5962
https://www.proquest.com/docview/2640244822
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NSsNAEF6kJz34L1arrCB6SjWbdJM9SlGKYg_FguAh7CS7IJW2NMlFEHwEn9EncSY_rYqCeEoOu2SyuzPzze7Mt4wdE4o22g0dT2vp-DK0DkjlOiHGzlooUElx0H7bl72hf33fua-yKqkWpuSHmG-4kWYU9poUXEN6tiANnaH-0NUxaH4pVYvw0GDBHKVUeZ8tyuKECGJq3tlzcVZ3_OqJFvDyM0gtvMzVGnuo5SuTS0btPIN2_PyNuvF_P7DOVivwyS_K1bLBlsx4k618oiTcYi83769v9pHO0PGFfFzCdaKnZBX5JM-mecYtejzQ8YhXee4cgS8n3mPsUVB58nEpn57xkik65WkOtOPDswnXVLOCoT7X44SnGEbTa5ZRsf82G15d3nV7TnVFgxMjThCOkfjBQBjwjT33DZVjelIjhMTAyNWuFdqPlbFB0hFWWRmA54IXJxBrhF2xB94Oa6BIZpdxC9YatA9GAIaoQaCV9aRVIEGoAFzRZKf1dEVxxV9O12g8RSXzsohwQCMa0CY7mreclpwdP7Rp1TMeVVqbRggOEbL4iJma7KSYul_7R4N-l557f224z5YFVU4UST8t1shmuTlAPJPBYbFyPwAJxPgo
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60HtSDb7FaNYLoaW03u2YbPIko9dEeioIHYUl2E5BKLe3uRRD8Cf5Gf4kz-7AqCuJpc0jIbJLJfJNkvgHYJRRtlNt0PKWE44umdbSQrtNE31lxqWWcXbS3O6J141_cHt5OwFEZC5PzQ3wcuJFmZPs1KTgdSNfHrKFDVCDKHTMJU5TQO_OnumPuKCnzjLYojdNEGFMyzzZ4vWz51RaNAeZnmJrZmbN5uCslzJ-X9A7SRB9ET9_IG__5CwswV-BPdpwvmEWYMP0lmP3ESrgMz5dvL6_2nq7RsUBmLmYqVgPaGNljmgzShFk0elpFPVY8dWeIfRlRH2OLjM2T9XMB1ZDlZNEjNko1Hfqw5JEpCltBb5-pfsxG6ElTMUko3n8Fbs5Or09aTpGlwYkQKnDHCOww4Eb7xjZ8QxGZnlCIItE3cpVrufIjaWwQH3IrrQi052ovinWkEHlFnvZWoYIimTVgVltrcIswXKOXGgRKWk9YqYXmMtAur8J-OV9hVFCYUyaNhzAnX-YhDmhIA1qFnY-ag5y244c6tXLKw0JxRyHiQ0QtPsKmKuxlc_dr-7DbOaHv-l8rbsN067p9FV6ddy43YIZTIEX2BqgGlWSYmk2EN4neypbxO2v8_EM
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB50BdGDb3F9RhA91d2m3bQ5irr4XEQUBA8laRMQZV1224sg-BP8jf4SZ_pwVRTEU3tI6DTJZL5JZr4B2CIUbZQbOp5SwvFFaB0tpOuE6DsrLrVM8ov28444uvZPblo3ZVQl5cIU_BAfB26kGfl-TQreS2xjSBraR_2h0jGjMOaLZkgr-uBySB0lZVHQFoVxQkQxFfFskzeqnl9N0RBffkapuZlpT8NtJWARXXK_m6V6N376xt34vz-YgakSfbK9YrnMwojpzsHkJ07CeXg-fXt5tXd0iY4vZOQSphLVo22RPWZpL0uZRZOnVXzPykB3hsiXEfEx9si5PFm3kE_1WUEVPWCDTNORD0sfmaKkFfT1meombIB-NL2mKWX7L8B1-_Bq_8gpazQ4MQIF7hiBHwy40b6xTd9QPqYnFGJI9Ixc5Vqu_FgaGyQtbqUVgfZc7cWJjhXirtjT3iLUUCSzBMxqaw1uEIZr9FGDQEnrCSu10FwG2uV12KmmK4pLAnOqo_EQFdTLPMIBjWhA67D50bJXkHb80Ga1mvGoVNtBhOgQMYuPoKkO2_nU_do_uuzs03P5rw03YPzioB2dHXdOV2CCUxZFHgC0CrW0n5k1xDapXs8X8TutBPr7
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=K%E2%80%90filter%E2%80%90based+adaptive+output+feedback+control+for+high%E2%80%90order+nonlinear+systems+subject+to+actuator+and+sensor+attacks&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Gao%2C+Rui&rft.au=Huang%2C+Jiangshuai&rft.au=Su%2C+Xiaojie&rft.au=Zhao%2C+Ling&rft.date=2022-04-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=32&rft.issue=6&rft.spage=3469&rft.epage=3484&rft_id=info:doi/10.1002%2Frnc.5962&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon