Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal
The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject...
Saved in:
Published in | International journal of robust and nonlinear control Vol. 33; no. 14; pp. 8275 - 8289 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Bognor Regis
Wiley Subscription Services, Inc
25.09.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 1049-8923 1099-1239 |
DOI | 10.1002/rnc.6819 |
Cover
Loading…
Abstract | The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, H∞$$ {H}_{\infty } $$ control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme. |
---|---|
AbstractList | The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, H∞$$ {H}_{\infty } $$ control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme. The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme. |
Author | Sun, Hong‐Tao Zhang, Yajian Zhang, Pengfei Peng, Chen |
Author_xml | – sequence: 1 givenname: Hong‐Tao orcidid: 0000-0002-8454-806X surname: Sun fullname: Sun, Hong‐Tao organization: Shanghai University – sequence: 2 givenname: Pengfei surname: Zhang fullname: Zhang, Pengfei organization: Qufu Normal University – sequence: 3 givenname: Chen surname: Peng fullname: Peng, Chen organization: Shanghai University – sequence: 4 givenname: Yajian surname: Zhang fullname: Zhang, Yajian email: zhang_ya_jian@shu.edu.cn organization: Shanghai University |
BookMark | eNp1kM9uEzEQxi1UJNqCxCNY4sJlU9trJfYRRUCRqiIhOK_G3tmtg2MH_0mUWx-BCy_Ik-AQTghO883Mb0Yz3xW5CDEgIS85W3DGxE0KdrFUXD8hl5xp3XHR64uTlrpTWvTPyFXOG8ZaT8hL8uMeawL_8_F7wHKI6WtTBjKOFPcYSstKcvOMqVVghF1xe6QZbU2uHOkOygOdovfx4MJMbQwlRU_jRKGWGOI21kznFGsY6R4fnPWYaa5mg7bQEimYENMWPAVbKpSYaHZzAP-cPJ3AZ3zxJ16TL-_efl7fdncf339Yv7nrrNC97kZhLOuNXqqe99M0WaM1Cq6YlEYxNSLKUfVMgmJ8ZaUxlq9WjCsFTCI2M67Jq_PeXYrfKuYybGJN7YA8CCVXS6GXkjVqcaZsijknnAbrChR3-hacHzgbTtYPzfrhZH0beP3XwC65LaTjv9DujB6cx-N_ueHT_fo3_wsKMZvt |
CitedBy_id | crossref_primary_10_1109_ACCESS_2023_3321269 crossref_primary_10_1109_TFUZZ_2024_3407751 crossref_primary_10_1002_acs_3797 crossref_primary_10_1002_rnc_7695 |
Cites_doi | 10.1109/COMST.2016.2521642 10.1109/TAC.2012.2206694 10.1016/j.automatica.2013.01.038 10.1016/j.automatica.2010.10.014 10.1109/9.618250 10.1109/TNNLS.2021.3056764 10.1016/j.automatica.2019.108557 10.1109/TAC.2014.2366855 10.1016/j.neucom.2021.03.087 10.1109/TAC.2013.2256015 10.1109/MCS.2014.2364725 10.1109/TIE.2017.2726965 10.1109/TITS.2020.3000797 10.1109/TSMC.2019.2960115 10.1109/TCYB.2022.3207430 10.1016/j.neucom.2015.04.107 10.1109/TIE.2020.3009585 10.1002/rnc.1147 10.1109/TVT.2018.2834381 10.1016/j.compeleceng.2018.11.008 10.1016/j.ins.2018.04.055 10.1016/j.ins.2017.09.005 10.3390/pr10071326 10.1109/TVT.2023.3250709 10.1109/TCYB.2018.2861834 10.1109/TII.2017.2734686 10.1002/rnc.4837 10.1109/TAC.2007.902731 10.1109/TVT.2016.2555853 10.1109/9.384214 10.1109/TCYB.2023.3253701 10.1109/JIOT.2020.2966672 10.1109/TSG.2019.2949998 10.1002/rnc.6472 |
ContentType | Journal Article |
Copyright | 2023 John Wiley & Sons Ltd. 2023 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2023 John Wiley & Sons Ltd. – notice: 2023 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
DOI | 10.1002/rnc.6819 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1099-1239 |
EndPage | 8289 |
ExternalDocumentID | 10_1002_rnc_6819 RNC6819 |
Genre | article |
GrantInformation_xml | – fundername: China Postdoctoral Science Foundation funderid: 2021M692024 – fundername: National Natural Science Foundation of China funderid: 62173218; 61833011; 62103229 – fundername: Natural Science Foundation of Shandong Province funderid: ZR2021QF026 |
GroupedDBID | .3N .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AAXRX AAYCA AAZKR ABCQN ABCUV ABIJN ABJNI ACAHQ ACCFJ ACCZN ACGFO ACGFS ACIWK ACPOU ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AIAGR AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS F00 F01 F04 G-S G.N GNP GODZA H.T H.X HGLYW HHY HHZ HZ~ IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- P2P P2W P2X P4D Q.N Q11 QB0 QRW R.K ROL RWI RX1 RYL SUPJJ TUS UB1 V2E W8V W99 WBKPD WH7 WIH WIK WJL WLBEL WOHZO WQJ WRC WWI WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT AAYXX AEYWJ AGHNM AGYGG AMVHM CITATION 7SC 7SP 7TB 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2939-d2bc03b968313fffcb99e218044b808dee4d8304a8017c4bbc1770188a04ee923 |
IEDL.DBID | DR2 |
ISSN | 1049-8923 |
IngestDate | Fri Jul 25 12:10:09 EDT 2025 Tue Jul 01 01:03:13 EDT 2025 Thu Apr 24 22:58:50 EDT 2025 Wed Jan 22 16:20:53 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 14 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2939-d2bc03b968313fffcb99e218044b808dee4d8304a8017c4bbc1770188a04ee923 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8454-806X |
PQID | 2847629640 |
PQPubID | 1026344 |
PageCount | 15 |
ParticipantIDs | proquest_journals_2847629640 crossref_citationtrail_10_1002_rnc_6819 crossref_primary_10_1002_rnc_6819 wiley_primary_10_1002_rnc_6819_RNC6819 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 25 September 2023 |
PublicationDateYYYYMMDD | 2023-09-25 |
PublicationDate_xml | – month: 09 year: 2023 text: 25 September 2023 day: 25 |
PublicationDecade | 2020 |
PublicationPlace | Bognor Regis |
PublicationPlace_xml | – name: Bognor Regis |
PublicationTitle | International journal of robust and nonlinear control |
PublicationYear | 2023 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2007; 17 2015; 35 2021; 68 2023; 33 2019; 73 2021; 22 2013; 49 2019; 11 1997; 42 2017; 66 2018; 422 2021; 448 2019; 109 2007; 52 2018; 67 2016; 18 2018; 65 2014; 60 2021; 51 2020; 7 1995; 40 2021; 32 2013; 58 2023 2018; 457 2022 2020; 30 2019; 49 2021; 152 2022; 10 2011; 47 2016; 174 2018; 14 e_1_2_9_30_1 e_1_2_9_31_1 e_1_2_9_11_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_12_1 e_1_2_9_33_1 e_1_2_9_15_1 e_1_2_9_14_1 e_1_2_9_17_1 e_1_2_9_36_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_19_1 e_1_2_9_20_1 e_1_2_9_22_1 e_1_2_9_21_1 e_1_2_9_24_1 Ge X (e_1_2_9_34_1) 2021; 152 e_1_2_9_23_1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_5_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 Sun H (e_1_2_9_18_1) 2022 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_25_1 e_1_2_9_28_1 e_1_2_9_27_1 e_1_2_9_29_1 |
References_xml | – volume: 40 start-page: 791 issue: 5 year: 1995 end-page: 801 article-title: Adaptive control of a class of nonlinear discrete‐time systems using neural networks publication-title: IEEE Trans Autom Control – volume: 457 start-page: 113 year: 2018 end-page: 125 article-title: A survey on recent advances in event‐triggered communication and control publication-title: Inform Sci – volume: 58 start-page: 475 issue: 2 year: 2013 end-page: 481 article-title: A delay system method for designing event‐triggered controllers of networked control systems publication-title: IEEE Trans Autom Control – start-page: 1 year: 2023 end-page: 13 article-title: Event‐triggered SMC for networked Markov jumping systems with channel fading and applications: genetic algorithm publication-title: IEEE Trans Cybern – volume: 11 start-page: 2218 issue: 3 year: 2019 end-page: 2234 article-title: A survey on the detection algorithms for false data injection attacks in smart grids publication-title: IEEE Trans Smart Grid – volume: 66 start-page: 952 issue: 2 year: 2017 end-page: 964 article-title: Path planning and tracking for vehicle collision avoidance based on model predictive control with multiconstraints publication-title: IEEE Trans Veh Technol – volume: 47 start-page: 235 year: 2011 end-page: 238 article-title: Reciprocally convex approach to stability of systems with time‐varying delays publication-title: Automatica – volume: 17 start-page: 1002 issue: 10–11 year: 2007 end-page: 1003 article-title: Distributed multi‐vehicle coordinated control via local information exchange publication-title: Int J Robust Nonlinear Control – volume: 422 start-page: 257 year: 2018 end-page: 270 article-title: On designing of an adaptive event‐triggered communication scheme for nonlinear networked interconnected control systems publication-title: Inform Sci – volume: 10 start-page: 1 issue: 7 year: 2022 end-page: 14 article-title: Sigmoid‐like event‐triggered security cruise control under stochastic false data injection attacks publication-title: Processes – volume: 174 start-page: 475 issue: 3 year: 2016 end-page: 482 article-title: Adaptive event‐triggered communication scheme for networked control systems with randomly occurring nonlinearities and uncertainties publication-title: Neurocomputing – volume: 42 start-page: 1171 issue: 8 year: 1997 end-page: 1176 article-title: A cone complementarity linearization algorithm for static output‐feedback and related problems publication-title: IEEE Trans Autom Control – volume: 49 start-page: 4271 issue: 12 year: 2019 end-page: 4281 article-title: Resilient event‐triggered controller synthesis of networked control systems under periodic DoS jamming attacks publication-title: IEEE Trans Cybern – volume: 152 start-page: 1 year: 2021 end-page: 26 article-title: Dynamic event‐triggered scheduling and control for vehicle active suspension over controller area network publication-title: Mech Sys Signal Pr – volume: 67 start-page: 6906 issue: 8 year: 2018 end-page: 6920 article-title: Interactive control paradigm‐based robust lateral stability controller design for autonomous automobile path tracking with uncertain disturbance: a dynamic game approach publication-title: IEEE Trans Veh Technol – start-page: 1 year: 2022 end-page: 14 article-title: Finite‐time event‐triggered stabilization for discrete‐time fuzzy Markov jump singularly perturbed systems publication-title: IEEE Trans Cybern – volume: 30 start-page: 1534 issue: 4 year: 2020 end-page: 1548 article-title: Resilient control of networked control systems under deception attacks: a memory‐event‐triggered communication scheme publication-title: Int J Robust Nonlinear Control – volume: 14 start-page: 931 issue: 3 year: 2018 end-page: 940 article-title: Nonlinear system modeling using RBF networks for industrial application publication-title: IEEE Trans Indust Inform – volume: 33 start-page: 991 issue: 2 year: 2023 end-page: 1009 article-title: Attack‐parameter‐dependent state feedback controller design for stochastic systems with denial‐of‐service attacks publication-title: Int J Robust Nonlinear Control – volume: 7 start-page: 3693 issue: 5 year: 2020 end-page: 3705 article-title: Deception attack detection and estimation for a local vehicle in vehicle platooning based on a modified UFIR estimator publication-title: IEEE Internet Things J – volume: 22 start-page: 7015 issue: 11 year: 2021 end-page: 7029 article-title: Autonomous vehicle: security by design publication-title: IEEE Trans Intell Transp Syst – volume: 58 start-page: 2620 issue: 10 year: 2013 end-page: 2626 article-title: A novel event‐triggered transmission scheme and control co‐design for sampled‐data control systems publication-title: IEEE Trans Autom Control – volume: 18 start-page: 1552 issue: 3 year: 2016 end-page: 1571 article-title: In‐vehicle networks outlook: achievements and challenges publication-title: IEEE Commun Surv Tutor – start-page: 3538 year: 2022 end-page: 3551 article-title: Self‐discipline predictive control of autonomous vehicles against denial of service attacks. publication-title: J Control – volume: 60 start-page: 1992 issue: 7 year: 2014 end-page: 1997 article-title: Dynamic triggering mechanisms for event‐triggered control publication-title: IEEE Trans Autom Control – volume: 68 start-page: 8698 issue: 9 year: 2021 end-page: 8707 article-title: Model‐predictive‐control‐based path tracking controller of autonomous vehicle considering parametric uncertainties and velocity‐varying publication-title: IEEE Trans Ind Electron – volume: 109 start-page: 1 year: 2019 end-page: 10 article-title: Distributed Krein space‐based attack detection over sensor networks under deception attacks publication-title: Automatica – volume: 448 start-page: 263 year: 2021 end-page: 275 article-title: Neural‐network‐based adaptive secure control for nonstrict‐feedback nonlinear interconnected systems under DoS attacks publication-title: Neurocomputing – volume: 65 start-page: 1685 issue: 2 year: 2018 end-page: 1694 article-title: Adaptive event‐triggering load frequency control for network‐based power systems publication-title: IEEE Trans Ind Electron – volume: 35 start-page: 110 issue: 1 year: 2015 end-page: 127 article-title: Control‐theoretic methods for cyberphysical security: geometric principles for optimal cross‐layer resilient control systems publication-title: IEEE Control Syst Mag – volume: 51 start-page: 6197 issue: 10 year: 2021 end-page: 6206 article-title: Event‐triggered security output feedback control for networked interconnected systems subject to cyber‐attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 32 start-page: 5644 issue: 12 year: 2021 end-page: 5653 article-title: Path tracking control of autonomous vehicles subject to deception attacks via a learning‐based event‐triggered mechanism publication-title: IEEE Trans Neur Net Learn – volume: 49 start-page: 1326 year: 2013 end-page: 1332 article-title: Event‐triggered communication and control co‐design for networked control systems publication-title: Automatica – volume: 52 start-page: 1362 issue: 8 year: 2007 end-page: 1379 article-title: Trajectory‐tracking and path‐following of underactuated autonomous vehicles with parametric modeling uncertainty publication-title: IEEE Trans Autom Control – volume: 73 start-page: 128 year: 2019 end-page: 144 article-title: Turkish national cyber‐firewall to mitigate countrywide cyber‐attacks publication-title: Comput Electr Eng – start-page: 1 year: 2023 end-page: 10 article-title: Event‐triggered adaptive security path following control for unmanned ground vehicles under sensor attacks publication-title: IEEE Trans Veh Technol – ident: e_1_2_9_7_1 doi: 10.1109/COMST.2016.2521642 – ident: e_1_2_9_9_1 doi: 10.1109/TAC.2012.2206694 – ident: e_1_2_9_33_1 doi: 10.1016/j.automatica.2013.01.038 – ident: e_1_2_9_36_1 doi: 10.1016/j.automatica.2010.10.014 – ident: e_1_2_9_37_1 doi: 10.1109/9.618250 – ident: e_1_2_9_17_1 doi: 10.1109/TNNLS.2021.3056764 – ident: e_1_2_9_21_1 doi: 10.1016/j.automatica.2019.108557 – ident: e_1_2_9_15_1 doi: 10.1109/TAC.2014.2366855 – ident: e_1_2_9_30_1 doi: 10.1016/j.neucom.2021.03.087 – ident: e_1_2_9_10_1 doi: 10.1109/TAC.2013.2256015 – ident: e_1_2_9_25_1 doi: 10.1109/MCS.2014.2364725 – ident: e_1_2_9_13_1 doi: 10.1109/TIE.2017.2726965 – ident: e_1_2_9_23_1 doi: 10.1109/TITS.2020.3000797 – ident: e_1_2_9_26_1 doi: 10.1109/TSMC.2019.2960115 – ident: e_1_2_9_11_1 doi: 10.1109/TCYB.2022.3207430 – start-page: 3538 year: 2022 ident: e_1_2_9_18_1 article-title: Self‐discipline predictive control of autonomous vehicles against denial of service attacks. Asian publication-title: J Control – ident: e_1_2_9_35_1 doi: 10.1016/j.neucom.2015.04.107 – ident: e_1_2_9_6_1 doi: 10.1109/TIE.2020.3009585 – ident: e_1_2_9_2_1 doi: 10.1002/rnc.1147 – ident: e_1_2_9_4_1 doi: 10.1109/TVT.2018.2834381 – ident: e_1_2_9_31_1 doi: 10.1016/j.compeleceng.2018.11.008 – ident: e_1_2_9_8_1 doi: 10.1016/j.ins.2018.04.055 – ident: e_1_2_9_14_1 doi: 10.1016/j.ins.2017.09.005 – ident: e_1_2_9_22_1 doi: 10.3390/pr10071326 – ident: e_1_2_9_24_1 doi: 10.1109/TVT.2023.3250709 – ident: e_1_2_9_19_1 doi: 10.1109/TCYB.2018.2861834 – ident: e_1_2_9_32_1 doi: 10.1109/TII.2017.2734686 – ident: e_1_2_9_16_1 doi: 10.1002/rnc.4837 – ident: e_1_2_9_3_1 doi: 10.1109/TAC.2007.902731 – ident: e_1_2_9_5_1 doi: 10.1109/TVT.2016.2555853 – ident: e_1_2_9_29_1 doi: 10.1109/9.384214 – volume: 152 start-page: 1 year: 2021 ident: e_1_2_9_34_1 article-title: Dynamic event‐triggered scheduling and control for vehicle active suspension over controller area network publication-title: Mech Sys Signal Pr – ident: e_1_2_9_12_1 doi: 10.1109/TCYB.2023.3253701 – ident: e_1_2_9_27_1 doi: 10.1109/JIOT.2020.2966672 – ident: e_1_2_9_28_1 doi: 10.1109/TSG.2019.2949998 – ident: e_1_2_9_20_1 doi: 10.1002/rnc.6472 |
SSID | ssj0009924 |
Score | 2.4142656 |
Snippet | The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 8275 |
SubjectTerms | actuator attacks Actuators Adaptive control autonomous ground vehicle event‐triggered control H-infinity control neural network Neural networks Radial basis function Security security control Trajectory planning Unmanned ground vehicles |
Title | Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.6819 https://www.proquest.com/docview/2847629640 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Na9wwEBUlp_aQpk1CNknLFEJ6cuK15bV0LKHLUmgOIYFAD2YkSwl0sZe13UJP_Qm55A_2l3TGH9k0JBB68geysTUz0rP85o0QB8qkuUSbBjqNMZCEOQJNA2FgZezovExcq9359XQyu5BfLpPLnlXJuTCdPsTdghtHRjtec4CjqY5XoqFLip-JahU_marFeOhspRyldVfPlgBwoAjEDLqzYXQ8XPjvTLSCl_dBajvLTF-Lb8PzdeSS70dNbY7srwfSjf_3AhtivQef8KnzljfihSveilf3JAk3xS2rdeD8z--boiOI0x7PdDm0Uk90VNP3_BVX-ATMccGjJVR9ETzg-sbgybXKn3Q36HnwUHrApub0ibKpgBNJihx-uOuWkgdVY3gxCOoS0BSMoeeAnNdSl0tgfgnOt8TF9PP5ySzoSzcElvCDDvLI2DA2eqLicey9t0ZrsroKpTQqVLlzMldxKJH8IrXSGDtO03CsFIbSObLXtlgrysLtCEDpE-ttiqg1K-0YHXlvkgRNjEmkxyPxcTBjZntdcy6vMc86ReYoo47OuKNH4sNdy0Wn5fFIm_3BE7I-mquMp_AJ_58OR-KwNemT12dnpye83X1uwz3xkivYMwUlSvbFWr1s3DvCObV533r0XzJgAds |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB5Ccmh7SPokm0c7hdKenHhteS3RUwgN2zbZQ0ggh4KRZKmFLHbYtRPIKT8hl_7B_pLO-JFNSwulJz-QjK2Z0XySZ74BeCNNmgtt00ClsQ4EYY5A0UQYWBE7ui8S13B3Hk1G41Px6Sw5W4L3fS5Myw9xt-HGltHM12zgvCG9u2ANnZEBjSRTfq5wQe9mPXW84I5Sqq1oSxA4kARjeubZMNrte_7qixYA8z5MbfzMwRp86d-wDS8536krs2OvfyNv_M9PeAyrHf7EvVZhnsCSK57Co3ushM_gOxN26OmPm9uijRGnM3Z2OTZsT3RV0ZL-Kxf5RJ3rC54wcd7VwUMucYyetKu8oqdhFwqPpUddV5xBUdZz5FySIsdL962JysN5bXg_CKsStSkYRk9Rc2pLVc6QQ0z09DmcHnw42R8HXfWGwBKEUEEeGRvGRo1kPIy999YoRYKXoRBGhjJ3TuQyDoUm1UitMMYO0zQcSqlD4RwJ7AUsF2Xh1gG18In1NtVaKSbbMSry3iSJNrFOIjUcwLtejpntqM25wsY0a0mZo4wGOuOBHsDru5YXLZ3HH9ps9aqQdQY9z9iLj_gXdTiAt41M_9o_O57s83HjXxu-ggfjk6PD7PDj5PMmPOSC9hyREiVbsFzNardNsKcyLxv1_gkkvAX2 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBYlgdIekvRFN69OobQnJ1pbtqVjSLKkr6WEBgI9GEmWGshiL7t2AjnlJ-TSP9hfkhk_smlpofTkB5KxNTOaT_LMN4y9kSbNhbZpoNJIBwIxR6BwIgysiBzeF7FruDs_j5OjE_HhND7toiopF6blh7jbcCPLaOZrMvBp7ncXpKEztJ9EEuPnski4JI0-OF5QRynVFrRFBBxIRDE98SwPd_uev7qiBb68j1IbNzNaZd_6F2yjS8536srs2KvfuBv_7wvW2EqHPmGvVZcn7IErnrLH9zgJn7EfRNehJz-vb4o2QhzPyNXl0HA94VWFC_rvVOITdK6nNF3CvKuCB1TgGDzqVnmJT4MuEB5KD7quKH-irOdAmSRFDhfurInJg3ltaDcIqhK0KQhET0BTYktVzoACTPTkOTsZHX7dPwq62g2BRQChgjw0lkdGJTIaRt57a5RCsUsuhJFc5s6JXEZcaFSM1Apj7DBN-VBKzYVzKK8XbKkoC_eSgRY-tt6mWitFVDtGhd6bONYm0nGohgP2rhdjZjtic6qvMclaSuYww4HOaKAH7PVdy2lL5vGHNpu9JmSdOc8z8uEJ_aDmA_a2Eelf-2fH4306rv9rw1fs4ZeDUfbp_fjjBntE1ewpHCWMN9lSNavdFmKeymw3yn0LRc4Erg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Neural%E2%80%90network%E2%80%90based+event%E2%80%90triggered+adaptive+security+path+following+control+of+autonomous+ground+vehicles+subject+to+abnormal+actuator+signal&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Hong%E2%80%90Tao+Sun&rft.au=Zhang%2C+Pengfei&rft.au=Chen%2C+Peng&rft.au=Zhang%2C+Yajian&rft.date=2023-09-25&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=33&rft.issue=14&rft.spage=8275&rft.epage=8289&rft_id=info:doi/10.1002%2Frnc.6819&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon |