Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal

The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of robust and nonlinear control Vol. 33; no. 14; pp. 8275 - 8289
Main Authors Sun, Hong‐Tao, Zhang, Pengfei, Peng, Chen, Zhang, Yajian
Format Journal Article
LanguageEnglish
Published Bognor Regis Wiley Subscription Services, Inc 25.09.2023
Subjects
Online AccessGet full text
ISSN1049-8923
1099-1239
DOI10.1002/rnc.6819

Cover

Loading…
Abstract The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, H∞$$ {H}_{\infty } $$ control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme.
AbstractList The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, H∞$$ {H}_{\infty } $$ control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme.
The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This paper focuses on the problem of neural‐network‐based event‐triggered adaptive security control (ET‐ASC) scheme for path following of AGVs subject to arbitrary abnormal actuator signal. First, we assume that an arbitrary abnormal signal is caused by arbitrary malicious attacks or disturbances from actuators. Then, radial basis function neural network (RBF‐NN) is used to reconstruct such abnormal actuator signal. Second, modelling issues on security path following control of AGVs with Sigmoid‐like ETC scheme are shown when the AGV is suffering from abnormal actuator signal. In what follows, an ET‐ASC scheme is developed to mitigate the adverse effects of abnormal actuator signal with the reconstructed abnormal signal based on a novel Sigmoid‐like event‐triggered communication scheme. By using the proposed RBF‐NN‐based ET‐ASC scheme, control performance can be guaranteed under arbitrary malicious actuator signal rather than such attacks following a specific probability distribution. Final, some simulation experiments are provided to verify the effectiveness of proposed ET‐ASC scheme.
Author Sun, Hong‐Tao
Zhang, Yajian
Zhang, Pengfei
Peng, Chen
Author_xml – sequence: 1
  givenname: Hong‐Tao
  orcidid: 0000-0002-8454-806X
  surname: Sun
  fullname: Sun, Hong‐Tao
  organization: Shanghai University
– sequence: 2
  givenname: Pengfei
  surname: Zhang
  fullname: Zhang, Pengfei
  organization: Qufu Normal University
– sequence: 3
  givenname: Chen
  surname: Peng
  fullname: Peng, Chen
  organization: Shanghai University
– sequence: 4
  givenname: Yajian
  surname: Zhang
  fullname: Zhang, Yajian
  email: zhang_ya_jian@shu.edu.cn
  organization: Shanghai University
BookMark eNp1kM9uEzEQxi1UJNqCxCNY4sJlU9trJfYRRUCRqiIhOK_G3tmtg2MH_0mUWx-BCy_Ik-AQTghO883Mb0Yz3xW5CDEgIS85W3DGxE0KdrFUXD8hl5xp3XHR64uTlrpTWvTPyFXOG8ZaT8hL8uMeawL_8_F7wHKI6WtTBjKOFPcYSstKcvOMqVVghF1xe6QZbU2uHOkOygOdovfx4MJMbQwlRU_jRKGWGOI21kznFGsY6R4fnPWYaa5mg7bQEimYENMWPAVbKpSYaHZzAP-cPJ3AZ3zxJ16TL-_efl7fdncf339Yv7nrrNC97kZhLOuNXqqe99M0WaM1Cq6YlEYxNSLKUfVMgmJ8ZaUxlq9WjCsFTCI2M67Jq_PeXYrfKuYybGJN7YA8CCVXS6GXkjVqcaZsijknnAbrChR3-hacHzgbTtYPzfrhZH0beP3XwC65LaTjv9DujB6cx-N_ueHT_fo3_wsKMZvt
CitedBy_id crossref_primary_10_1109_ACCESS_2023_3321269
crossref_primary_10_1109_TFUZZ_2024_3407751
crossref_primary_10_1002_acs_3797
crossref_primary_10_1002_rnc_7695
Cites_doi 10.1109/COMST.2016.2521642
10.1109/TAC.2012.2206694
10.1016/j.automatica.2013.01.038
10.1016/j.automatica.2010.10.014
10.1109/9.618250
10.1109/TNNLS.2021.3056764
10.1016/j.automatica.2019.108557
10.1109/TAC.2014.2366855
10.1016/j.neucom.2021.03.087
10.1109/TAC.2013.2256015
10.1109/MCS.2014.2364725
10.1109/TIE.2017.2726965
10.1109/TITS.2020.3000797
10.1109/TSMC.2019.2960115
10.1109/TCYB.2022.3207430
10.1016/j.neucom.2015.04.107
10.1109/TIE.2020.3009585
10.1002/rnc.1147
10.1109/TVT.2018.2834381
10.1016/j.compeleceng.2018.11.008
10.1016/j.ins.2018.04.055
10.1016/j.ins.2017.09.005
10.3390/pr10071326
10.1109/TVT.2023.3250709
10.1109/TCYB.2018.2861834
10.1109/TII.2017.2734686
10.1002/rnc.4837
10.1109/TAC.2007.902731
10.1109/TVT.2016.2555853
10.1109/9.384214
10.1109/TCYB.2023.3253701
10.1109/JIOT.2020.2966672
10.1109/TSG.2019.2949998
10.1002/rnc.6472
ContentType Journal Article
Copyright 2023 John Wiley & Sons Ltd.
2023 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2023 John Wiley & Sons Ltd.
– notice: 2023 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1002/rnc.6819
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1099-1239
EndPage 8289
ExternalDocumentID 10_1002_rnc_6819
RNC6819
Genre article
GrantInformation_xml – fundername: China Postdoctoral Science Foundation
  funderid: 2021M692024
– fundername: National Natural Science Foundation of China
  funderid: 62173218; 61833011; 62103229
– fundername: Natural Science Foundation of Shandong Province
  funderid: ZR2021QF026
GroupedDBID .3N
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABIJN
ABJNI
ACAHQ
ACCFJ
ACCZN
ACGFO
ACGFS
ACIWK
ACPOU
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AIAGR
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
F00
F01
F04
G-S
G.N
GNP
GODZA
H.T
H.X
HGLYW
HHY
HHZ
HZ~
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
NNB
O66
O9-
P2P
P2W
P2X
P4D
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
RYL
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WH7
WIH
WIK
WJL
WLBEL
WOHZO
WQJ
WRC
WWI
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAYXX
AEYWJ
AGHNM
AGYGG
AMVHM
CITATION
7SC
7SP
7TB
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2939-d2bc03b968313fffcb99e218044b808dee4d8304a8017c4bbc1770188a04ee923
IEDL.DBID DR2
ISSN 1049-8923
IngestDate Fri Jul 25 12:10:09 EDT 2025
Tue Jul 01 01:03:13 EDT 2025
Thu Apr 24 22:58:50 EDT 2025
Wed Jan 22 16:20:53 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 14
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2939-d2bc03b968313fffcb99e218044b808dee4d8304a8017c4bbc1770188a04ee923
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8454-806X
PQID 2847629640
PQPubID 1026344
PageCount 15
ParticipantIDs proquest_journals_2847629640
crossref_citationtrail_10_1002_rnc_6819
crossref_primary_10_1002_rnc_6819
wiley_primary_10_1002_rnc_6819_RNC6819
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 25 September 2023
PublicationDateYYYYMMDD 2023-09-25
PublicationDate_xml – month: 09
  year: 2023
  text: 25 September 2023
  day: 25
PublicationDecade 2020
PublicationPlace Bognor Regis
PublicationPlace_xml – name: Bognor Regis
PublicationTitle International journal of robust and nonlinear control
PublicationYear 2023
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2007; 17
2015; 35
2021; 68
2023; 33
2019; 73
2021; 22
2013; 49
2019; 11
1997; 42
2017; 66
2018; 422
2021; 448
2019; 109
2007; 52
2018; 67
2016; 18
2018; 65
2014; 60
2021; 51
2020; 7
1995; 40
2021; 32
2013; 58
2023
2018; 457
2022
2020; 30
2019; 49
2021; 152
2022; 10
2011; 47
2016; 174
2018; 14
e_1_2_9_30_1
e_1_2_9_31_1
e_1_2_9_11_1
e_1_2_9_10_1
e_1_2_9_35_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_12_1
e_1_2_9_33_1
e_1_2_9_15_1
e_1_2_9_14_1
e_1_2_9_17_1
e_1_2_9_36_1
e_1_2_9_16_1
e_1_2_9_37_1
e_1_2_9_19_1
e_1_2_9_20_1
e_1_2_9_22_1
e_1_2_9_21_1
e_1_2_9_24_1
Ge X (e_1_2_9_34_1) 2021; 152
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_5_1
e_1_2_9_4_1
e_1_2_9_3_1
e_1_2_9_2_1
Sun H (e_1_2_9_18_1) 2022
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
e_1_2_9_27_1
e_1_2_9_29_1
References_xml – volume: 40
  start-page: 791
  issue: 5
  year: 1995
  end-page: 801
  article-title: Adaptive control of a class of nonlinear discrete‐time systems using neural networks
  publication-title: IEEE Trans Autom Control
– volume: 457
  start-page: 113
  year: 2018
  end-page: 125
  article-title: A survey on recent advances in event‐triggered communication and control
  publication-title: Inform Sci
– volume: 58
  start-page: 475
  issue: 2
  year: 2013
  end-page: 481
  article-title: A delay system method for designing event‐triggered controllers of networked control systems
  publication-title: IEEE Trans Autom Control
– start-page: 1
  year: 2023
  end-page: 13
  article-title: Event‐triggered SMC for networked Markov jumping systems with channel fading and applications: genetic algorithm
  publication-title: IEEE Trans Cybern
– volume: 11
  start-page: 2218
  issue: 3
  year: 2019
  end-page: 2234
  article-title: A survey on the detection algorithms for false data injection attacks in smart grids
  publication-title: IEEE Trans Smart Grid
– volume: 66
  start-page: 952
  issue: 2
  year: 2017
  end-page: 964
  article-title: Path planning and tracking for vehicle collision avoidance based on model predictive control with multiconstraints
  publication-title: IEEE Trans Veh Technol
– volume: 47
  start-page: 235
  year: 2011
  end-page: 238
  article-title: Reciprocally convex approach to stability of systems with time‐varying delays
  publication-title: Automatica
– volume: 17
  start-page: 1002
  issue: 10–11
  year: 2007
  end-page: 1003
  article-title: Distributed multi‐vehicle coordinated control via local information exchange
  publication-title: Int J Robust Nonlinear Control
– volume: 422
  start-page: 257
  year: 2018
  end-page: 270
  article-title: On designing of an adaptive event‐triggered communication scheme for nonlinear networked interconnected control systems
  publication-title: Inform Sci
– volume: 10
  start-page: 1
  issue: 7
  year: 2022
  end-page: 14
  article-title: Sigmoid‐like event‐triggered security cruise control under stochastic false data injection attacks
  publication-title: Processes
– volume: 174
  start-page: 475
  issue: 3
  year: 2016
  end-page: 482
  article-title: Adaptive event‐triggered communication scheme for networked control systems with randomly occurring nonlinearities and uncertainties
  publication-title: Neurocomputing
– volume: 42
  start-page: 1171
  issue: 8
  year: 1997
  end-page: 1176
  article-title: A cone complementarity linearization algorithm for static output‐feedback and related problems
  publication-title: IEEE Trans Autom Control
– volume: 49
  start-page: 4271
  issue: 12
  year: 2019
  end-page: 4281
  article-title: Resilient event‐triggered controller synthesis of networked control systems under periodic DoS jamming attacks
  publication-title: IEEE Trans Cybern
– volume: 152
  start-page: 1
  year: 2021
  end-page: 26
  article-title: Dynamic event‐triggered scheduling and control for vehicle active suspension over controller area network
  publication-title: Mech Sys Signal Pr
– volume: 67
  start-page: 6906
  issue: 8
  year: 2018
  end-page: 6920
  article-title: Interactive control paradigm‐based robust lateral stability controller design for autonomous automobile path tracking with uncertain disturbance: a dynamic game approach
  publication-title: IEEE Trans Veh Technol
– start-page: 1
  year: 2022
  end-page: 14
  article-title: Finite‐time event‐triggered stabilization for discrete‐time fuzzy Markov jump singularly perturbed systems
  publication-title: IEEE Trans Cybern
– volume: 30
  start-page: 1534
  issue: 4
  year: 2020
  end-page: 1548
  article-title: Resilient control of networked control systems under deception attacks: a memory‐event‐triggered communication scheme
  publication-title: Int J Robust Nonlinear Control
– volume: 14
  start-page: 931
  issue: 3
  year: 2018
  end-page: 940
  article-title: Nonlinear system modeling using RBF networks for industrial application
  publication-title: IEEE Trans Indust Inform
– volume: 33
  start-page: 991
  issue: 2
  year: 2023
  end-page: 1009
  article-title: Attack‐parameter‐dependent state feedback controller design for stochastic systems with denial‐of‐service attacks
  publication-title: Int J Robust Nonlinear Control
– volume: 7
  start-page: 3693
  issue: 5
  year: 2020
  end-page: 3705
  article-title: Deception attack detection and estimation for a local vehicle in vehicle platooning based on a modified UFIR estimator
  publication-title: IEEE Internet Things J
– volume: 22
  start-page: 7015
  issue: 11
  year: 2021
  end-page: 7029
  article-title: Autonomous vehicle: security by design
  publication-title: IEEE Trans Intell Transp Syst
– volume: 58
  start-page: 2620
  issue: 10
  year: 2013
  end-page: 2626
  article-title: A novel event‐triggered transmission scheme and control co‐design for sampled‐data control systems
  publication-title: IEEE Trans Autom Control
– volume: 18
  start-page: 1552
  issue: 3
  year: 2016
  end-page: 1571
  article-title: In‐vehicle networks outlook: achievements and challenges
  publication-title: IEEE Commun Surv Tutor
– start-page: 3538
  year: 2022
  end-page: 3551
  article-title: Self‐discipline predictive control of autonomous vehicles against denial of service attacks.
  publication-title: J Control
– volume: 60
  start-page: 1992
  issue: 7
  year: 2014
  end-page: 1997
  article-title: Dynamic triggering mechanisms for event‐triggered control
  publication-title: IEEE Trans Autom Control
– volume: 68
  start-page: 8698
  issue: 9
  year: 2021
  end-page: 8707
  article-title: Model‐predictive‐control‐based path tracking controller of autonomous vehicle considering parametric uncertainties and velocity‐varying
  publication-title: IEEE Trans Ind Electron
– volume: 109
  start-page: 1
  year: 2019
  end-page: 10
  article-title: Distributed Krein space‐based attack detection over sensor networks under deception attacks
  publication-title: Automatica
– volume: 448
  start-page: 263
  year: 2021
  end-page: 275
  article-title: Neural‐network‐based adaptive secure control for nonstrict‐feedback nonlinear interconnected systems under DoS attacks
  publication-title: Neurocomputing
– volume: 65
  start-page: 1685
  issue: 2
  year: 2018
  end-page: 1694
  article-title: Adaptive event‐triggering load frequency control for network‐based power systems
  publication-title: IEEE Trans Ind Electron
– volume: 35
  start-page: 110
  issue: 1
  year: 2015
  end-page: 127
  article-title: Control‐theoretic methods for cyberphysical security: geometric principles for optimal cross‐layer resilient control systems
  publication-title: IEEE Control Syst Mag
– volume: 51
  start-page: 6197
  issue: 10
  year: 2021
  end-page: 6206
  article-title: Event‐triggered security output feedback control for networked interconnected systems subject to cyber‐attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 32
  start-page: 5644
  issue: 12
  year: 2021
  end-page: 5653
  article-title: Path tracking control of autonomous vehicles subject to deception attacks via a learning‐based event‐triggered mechanism
  publication-title: IEEE Trans Neur Net Learn
– volume: 49
  start-page: 1326
  year: 2013
  end-page: 1332
  article-title: Event‐triggered communication and control co‐design for networked control systems
  publication-title: Automatica
– volume: 52
  start-page: 1362
  issue: 8
  year: 2007
  end-page: 1379
  article-title: Trajectory‐tracking and path‐following of underactuated autonomous vehicles with parametric modeling uncertainty
  publication-title: IEEE Trans Autom Control
– volume: 73
  start-page: 128
  year: 2019
  end-page: 144
  article-title: Turkish national cyber‐firewall to mitigate countrywide cyber‐attacks
  publication-title: Comput Electr Eng
– start-page: 1
  year: 2023
  end-page: 10
  article-title: Event‐triggered adaptive security path following control for unmanned ground vehicles under sensor attacks
  publication-title: IEEE Trans Veh Technol
– ident: e_1_2_9_7_1
  doi: 10.1109/COMST.2016.2521642
– ident: e_1_2_9_9_1
  doi: 10.1109/TAC.2012.2206694
– ident: e_1_2_9_33_1
  doi: 10.1016/j.automatica.2013.01.038
– ident: e_1_2_9_36_1
  doi: 10.1016/j.automatica.2010.10.014
– ident: e_1_2_9_37_1
  doi: 10.1109/9.618250
– ident: e_1_2_9_17_1
  doi: 10.1109/TNNLS.2021.3056764
– ident: e_1_2_9_21_1
  doi: 10.1016/j.automatica.2019.108557
– ident: e_1_2_9_15_1
  doi: 10.1109/TAC.2014.2366855
– ident: e_1_2_9_30_1
  doi: 10.1016/j.neucom.2021.03.087
– ident: e_1_2_9_10_1
  doi: 10.1109/TAC.2013.2256015
– ident: e_1_2_9_25_1
  doi: 10.1109/MCS.2014.2364725
– ident: e_1_2_9_13_1
  doi: 10.1109/TIE.2017.2726965
– ident: e_1_2_9_23_1
  doi: 10.1109/TITS.2020.3000797
– ident: e_1_2_9_26_1
  doi: 10.1109/TSMC.2019.2960115
– ident: e_1_2_9_11_1
  doi: 10.1109/TCYB.2022.3207430
– start-page: 3538
  year: 2022
  ident: e_1_2_9_18_1
  article-title: Self‐discipline predictive control of autonomous vehicles against denial of service attacks. Asian
  publication-title: J Control
– ident: e_1_2_9_35_1
  doi: 10.1016/j.neucom.2015.04.107
– ident: e_1_2_9_6_1
  doi: 10.1109/TIE.2020.3009585
– ident: e_1_2_9_2_1
  doi: 10.1002/rnc.1147
– ident: e_1_2_9_4_1
  doi: 10.1109/TVT.2018.2834381
– ident: e_1_2_9_31_1
  doi: 10.1016/j.compeleceng.2018.11.008
– ident: e_1_2_9_8_1
  doi: 10.1016/j.ins.2018.04.055
– ident: e_1_2_9_14_1
  doi: 10.1016/j.ins.2017.09.005
– ident: e_1_2_9_22_1
  doi: 10.3390/pr10071326
– ident: e_1_2_9_24_1
  doi: 10.1109/TVT.2023.3250709
– ident: e_1_2_9_19_1
  doi: 10.1109/TCYB.2018.2861834
– ident: e_1_2_9_32_1
  doi: 10.1109/TII.2017.2734686
– ident: e_1_2_9_16_1
  doi: 10.1002/rnc.4837
– ident: e_1_2_9_3_1
  doi: 10.1109/TAC.2007.902731
– ident: e_1_2_9_5_1
  doi: 10.1109/TVT.2016.2555853
– ident: e_1_2_9_29_1
  doi: 10.1109/9.384214
– volume: 152
  start-page: 1
  year: 2021
  ident: e_1_2_9_34_1
  article-title: Dynamic event‐triggered scheduling and control for vehicle active suspension over controller area network
  publication-title: Mech Sys Signal Pr
– ident: e_1_2_9_12_1
  doi: 10.1109/TCYB.2023.3253701
– ident: e_1_2_9_27_1
  doi: 10.1109/JIOT.2020.2966672
– ident: e_1_2_9_28_1
  doi: 10.1109/TSG.2019.2949998
– ident: e_1_2_9_20_1
  doi: 10.1002/rnc.6472
SSID ssj0009924
Score 2.4142656
Snippet The malicious physical attacks from both sensor and actuator sides make real threats to the security and safety of autonomous ground vehicles (AGVs). This...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 8275
SubjectTerms actuator attacks
Actuators
Adaptive control
autonomous ground vehicle
event‐triggered control
H-infinity control
neural network
Neural networks
Radial basis function
Security
security control
Trajectory planning
Unmanned ground vehicles
Title Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Frnc.6819
https://www.proquest.com/docview/2847629640
Volume 33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Na9wwEBUlp_aQpk1CNknLFEJ6cuK15bV0LKHLUmgOIYFAD2YkSwl0sZe13UJP_Qm55A_2l3TGH9k0JBB68geysTUz0rP85o0QB8qkuUSbBjqNMZCEOQJNA2FgZezovExcq9359XQyu5BfLpPLnlXJuTCdPsTdghtHRjtec4CjqY5XoqFLip-JahU_marFeOhspRyldVfPlgBwoAjEDLqzYXQ8XPjvTLSCl_dBajvLTF-Lb8PzdeSS70dNbY7srwfSjf_3AhtivQef8KnzljfihSveilf3JAk3xS2rdeD8z--boiOI0x7PdDm0Uk90VNP3_BVX-ATMccGjJVR9ETzg-sbgybXKn3Q36HnwUHrApub0ibKpgBNJihx-uOuWkgdVY3gxCOoS0BSMoeeAnNdSl0tgfgnOt8TF9PP5ySzoSzcElvCDDvLI2DA2eqLicey9t0ZrsroKpTQqVLlzMldxKJH8IrXSGDtO03CsFIbSObLXtlgrysLtCEDpE-ttiqg1K-0YHXlvkgRNjEmkxyPxcTBjZntdcy6vMc86ReYoo47OuKNH4sNdy0Wn5fFIm_3BE7I-mquMp_AJ_58OR-KwNemT12dnpye83X1uwz3xkivYMwUlSvbFWr1s3DvCObV533r0XzJgAds
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB5Ccmh7SPokm0c7hdKenHhteS3RUwgN2zbZQ0ggh4KRZKmFLHbYtRPIKT8hl_7B_pLO-JFNSwulJz-QjK2Z0XySZ74BeCNNmgtt00ClsQ4EYY5A0UQYWBE7ui8S13B3Hk1G41Px6Sw5W4L3fS5Myw9xt-HGltHM12zgvCG9u2ANnZEBjSRTfq5wQe9mPXW84I5Sqq1oSxA4kARjeubZMNrte_7qixYA8z5MbfzMwRp86d-wDS8536krs2OvfyNv_M9PeAyrHf7EvVZhnsCSK57Co3ushM_gOxN26OmPm9uijRGnM3Z2OTZsT3RV0ZL-Kxf5RJ3rC54wcd7VwUMucYyetKu8oqdhFwqPpUddV5xBUdZz5FySIsdL962JysN5bXg_CKsStSkYRk9Rc2pLVc6QQ0z09DmcHnw42R8HXfWGwBKEUEEeGRvGRo1kPIy999YoRYKXoRBGhjJ3TuQyDoUm1UitMMYO0zQcSqlD4RwJ7AUsF2Xh1gG18In1NtVaKSbbMSry3iSJNrFOIjUcwLtejpntqM25wsY0a0mZo4wGOuOBHsDru5YXLZ3HH9ps9aqQdQY9z9iLj_gXdTiAt41M_9o_O57s83HjXxu-ggfjk6PD7PDj5PMmPOSC9hyREiVbsFzNardNsKcyLxv1_gkkvAX2
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBYlgdIekvRFN69OobQnJ1pbtqVjSLKkr6WEBgI9GEmWGshiL7t2AjnlJ-TSP9hfkhk_smlpofTkB5KxNTOaT_LMN4y9kSbNhbZpoNJIBwIxR6BwIgysiBzeF7FruDs_j5OjE_HhND7toiopF6blh7jbcCPLaOZrMvBp7ncXpKEztJ9EEuPnski4JI0-OF5QRynVFrRFBBxIRDE98SwPd_uev7qiBb68j1IbNzNaZd_6F2yjS8536srs2KvfuBv_7wvW2EqHPmGvVZcn7IErnrLH9zgJn7EfRNehJz-vb4o2QhzPyNXl0HA94VWFC_rvVOITdK6nNF3CvKuCB1TgGDzqVnmJT4MuEB5KD7quKH-irOdAmSRFDhfurInJg3ltaDcIqhK0KQhET0BTYktVzoACTPTkOTsZHX7dPwq62g2BRQChgjw0lkdGJTIaRt57a5RCsUsuhJFc5s6JXEZcaFSM1Apj7DBN-VBKzYVzKK8XbKkoC_eSgRY-tt6mWitFVDtGhd6bONYm0nGohgP2rhdjZjtic6qvMclaSuYww4HOaKAH7PVdy2lL5vGHNpu9JmSdOc8z8uEJ_aDmA_a2Eelf-2fH4306rv9rw1fs4ZeDUfbp_fjjBntE1ewpHCWMN9lSNavdFmKeymw3yn0LRc4Erg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Neural%E2%80%90network%E2%80%90based+event%E2%80%90triggered+adaptive+security+path+following+control+of+autonomous+ground+vehicles+subject+to+abnormal+actuator+signal&rft.jtitle=International+journal+of+robust+and+nonlinear+control&rft.au=Hong%E2%80%90Tao+Sun&rft.au=Zhang%2C+Pengfei&rft.au=Chen%2C+Peng&rft.au=Zhang%2C+Yajian&rft.date=2023-09-25&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1049-8923&rft.eissn=1099-1239&rft.volume=33&rft.issue=14&rft.spage=8275&rft.epage=8289&rft_id=info:doi/10.1002%2Frnc.6819&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-8923&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-8923&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-8923&client=summon