Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack

The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cybernetics Vol. 51; no. 8; pp. 4000 - 4010
Main Authors Liu, Jinliang, Wang, Yuda, Cao, Jinde, Yue, Dong, Xie, Xiangpeng
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.08.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.
AbstractList The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.
The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.
Author Cao, Jinde
Liu, Jinliang
Wang, Yuda
Yue, Dong
Xie, Xiangpeng
Author_xml – sequence: 1
  givenname: Jinliang
  orcidid: 0000-0001-5489-0246
  surname: Liu
  fullname: Liu, Jinliang
  email: liujinliang@vip.163.com
  organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China
– sequence: 2
  givenname: Yuda
  orcidid: 0000-0002-7821-440X
  surname: Wang
  fullname: Wang, Yuda
  email: wangyd1996@163.com
  organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China
– sequence: 3
  givenname: Jinde
  orcidid: 0000-0003-3133-7119
  surname: Cao
  fullname: Cao, Jinde
  email: jdcao@seu.edu.cn
  organization: School of Mathematics, Southeast University, Nanjing, China
– sequence: 4
  givenname: Dong
  orcidid: 0000-0001-7810-9338
  surname: Yue
  fullname: Yue, Dong
  email: medongy@vip.163.com
  organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China
– sequence: 5
  givenname: Xiangpeng
  orcidid: 0000-0003-4822-3134
  surname: Xie
  fullname: Xie, Xiangpeng
  email: xiexiangpeng1953@163.com
  organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China
BookMark eNp9kU9r3DAQxUVJadI0H6D0IuglF2-l0eqPj1s3aQKBHrqlhByELI-3Sh15K8mB_fbxsiGHHDqXeQy_N8zw3pOjOEYk5CNnC85Z_WXd3H5dAAO2EIwJLeENOQGuTAWg5dGLVvqYnOV8z-Yy86g278ixAGOUAn5C7n6inxLSVee2JTxidfGIsVTrFDYbTNjRyzAUTPQb5rCJ9Hcof-h13E6FNmPMJbkQC3Wxo1e7NoWONrt2plelOP_3A3nbuyHj2XM_Jb8uL9bNVXXz4_t1s7qpvABVKg2i5R564bQDD6h7zpyQHbaK9cqzlnnFOyVq7IwS0suOGy8Mw1ko6XtxSs4Pe7dp_DdhLvYhZI_D4CKOU7awXLKlBg31jH5-hd6PU4rzdRak1LU2kpuZ0gfKpzHnhL31obgSxrh_eLCc2X0Edh-B3UdgnyOYnfyVc5vCg0u7_3o-HTwBEV_4mosajBBPRe6Qng
CODEN ITCEB8
CitedBy_id crossref_primary_10_1016_j_ejcon_2025_101186
crossref_primary_10_1016_j_engappai_2023_106128
crossref_primary_10_1016_j_ins_2023_119527
crossref_primary_10_1002_acs_3529
crossref_primary_10_1002_rnc_5899
crossref_primary_10_1016_j_nahs_2023_101377
crossref_primary_10_1016_j_jfranklin_2021_09_010
crossref_primary_10_1080_0954898X_2024_2392786
crossref_primary_10_1109_TCYB_2024_3367851
crossref_primary_10_1007_s40815_023_01669_w
crossref_primary_10_1002_acs_3241
crossref_primary_10_1002_acs_3483
crossref_primary_10_1080_00207721_2024_2365433
crossref_primary_10_1109_TNSE_2021_3107935
crossref_primary_10_1109_JAS_2021_1004162
crossref_primary_10_1109_TCYB_2023_3285526
crossref_primary_10_1109_TCYB_2024_3414650
crossref_primary_10_1016_j_jfranklin_2022_12_025
crossref_primary_10_1016_j_jfranklin_2024_107365
crossref_primary_10_1049_cth2_12059
crossref_primary_10_1016_j_jfranklin_2022_09_016
crossref_primary_10_1016_j_jfranklin_2021_12_020
crossref_primary_10_1109_TCYB_2024_3376695
crossref_primary_10_1109_TSMC_2024_3418970
crossref_primary_10_1016_j_amc_2022_127300
crossref_primary_10_1109_TCYB_2021_3088711
crossref_primary_10_1002_acs_3496
crossref_primary_10_1109_TSMC_2024_3378773
crossref_primary_10_1016_j_dsp_2024_104398
crossref_primary_10_1109_TII_2024_3423454
crossref_primary_10_1109_TSMC_2024_3408413
crossref_primary_10_1007_s00034_024_02678_2
crossref_primary_10_1109_TCYB_2025_3532547
crossref_primary_10_3390_math12020203
crossref_primary_10_1049_cth2_12446
crossref_primary_10_1080_00207721_2022_2093418
crossref_primary_10_1002_rnc_7794
crossref_primary_10_1016_j_jfranklin_2024_106941
crossref_primary_10_1109_TSIPN_2024_3356789
crossref_primary_10_1002_rnc_5957
crossref_primary_10_1016_j_neucom_2022_05_096
crossref_primary_10_1002_oca_3078
crossref_primary_10_1002_rnc_7616
crossref_primary_10_1007_s11071_025_11024_3
crossref_primary_10_1016_j_amc_2024_128723
crossref_primary_10_1109_OJIES_2022_3176683
crossref_primary_10_1109_TNET_2021_3135963
crossref_primary_10_3389_fmars_2024_1320361
crossref_primary_10_1109_TSMC_2023_3339199
crossref_primary_10_1109_TII_2022_3198699
crossref_primary_10_1155_2020_5093620
crossref_primary_10_1109_TCYB_2023_3312346
crossref_primary_10_1109_TNNLS_2021_3137426
crossref_primary_10_1109_TSG_2021_3118801
crossref_primary_10_1109_TFUZZ_2022_3215529
crossref_primary_10_1109_TICPS_2024_3446769
crossref_primary_10_1002_rnc_7103
crossref_primary_10_1002_rnc_7343
crossref_primary_10_1109_TNNLS_2023_3300270
crossref_primary_10_1016_j_ins_2022_08_085
crossref_primary_10_1007_s00034_025_03061_5
crossref_primary_10_1002_acs_3834
crossref_primary_10_3390_s24134071
crossref_primary_10_1016_j_sigpro_2024_109724
crossref_primary_10_1109_TCYB_2024_3496794
crossref_primary_10_1016_j_chaos_2024_115170
crossref_primary_10_1109_TCYB_2022_3151880
crossref_primary_10_1177_01423312241279903
crossref_primary_10_1109_TCSI_2021_3097824
crossref_primary_10_1002_acs_3707
crossref_primary_10_1007_s12555_022_0630_6
crossref_primary_10_1109_TFUZZ_2021_3092200
crossref_primary_10_1002_acs_3689
crossref_primary_10_1002_rnc_7913
crossref_primary_10_1007_s12555_021_1053_5
crossref_primary_10_1109_TASE_2024_3360718
crossref_primary_10_1109_TNSE_2021_3098258
crossref_primary_10_1016_j_ins_2021_01_030
crossref_primary_10_1109_TCSII_2021_3079354
crossref_primary_10_1109_TCYB_2021_3110402
crossref_primary_10_1080_00207721_2024_2345196
crossref_primary_10_1007_s11071_024_09638_0
crossref_primary_10_1177_01423312221148220
crossref_primary_10_1016_j_isatra_2023_04_018
crossref_primary_10_1016_j_ins_2024_121257
crossref_primary_10_1049_cth2_12530
crossref_primary_10_1016_j_jfranklin_2022_05_038
crossref_primary_10_1002_rnc_6950
crossref_primary_10_1002_rnc_7246
crossref_primary_10_1002_rnc_7400
crossref_primary_10_1177_01423312231166455
crossref_primary_10_1109_TSMC_2022_3144161
crossref_primary_10_1007_s40815_022_01346_4
crossref_primary_10_1109_JAS_2022_105548
crossref_primary_10_1109_TCYB_2024_3411868
crossref_primary_10_1109_TCSII_2024_3352667
crossref_primary_10_1109_TASE_2023_3300917
crossref_primary_10_1007_s11768_023_00182_7
crossref_primary_10_1002_acs_3455
crossref_primary_10_1002_mma_10068
crossref_primary_10_1016_j_cnsns_2024_108579
crossref_primary_10_1088_1402_4896_ad6485
crossref_primary_10_1016_j_cnsns_2025_108624
crossref_primary_10_1109_TNSE_2024_3409900
crossref_primary_10_1109_TII_2023_3335996
crossref_primary_10_1109_TCNS_2023_3295345
crossref_primary_10_1016_j_ijepes_2023_109278
crossref_primary_10_1109_TCYB_2021_3125851
crossref_primary_10_1109_TSMC_2022_3143903
crossref_primary_10_1002_acs_3625
crossref_primary_10_3390_electronics10222736
crossref_primary_10_1080_00207721_2022_2083260
crossref_primary_10_1109_TCYB_2023_3241179
crossref_primary_10_1002_asjc_3472
crossref_primary_10_1007_s40815_023_01563_5
crossref_primary_10_1016_j_adhoc_2023_103351
crossref_primary_10_1177_01423312241301299
crossref_primary_10_1016_j_cnsns_2024_108423
crossref_primary_10_1109_TCYB_2023_3311609
crossref_primary_10_1109_TICPS_2024_3481375
crossref_primary_10_1109_TFUZZ_2022_3148875
crossref_primary_10_1109_TSG_2024_3429231
crossref_primary_10_1109_TSMC_2024_3411885
crossref_primary_10_1109_TFUZZ_2023_3306074
crossref_primary_10_1002_rnc_6335
crossref_primary_10_1016_j_amc_2024_128636
crossref_primary_10_1109_ACCESS_2024_3455329
crossref_primary_10_1002_ett_4674
crossref_primary_10_1007_s12555_022_0242_1
crossref_primary_10_1109_TFUZZ_2023_3319662
crossref_primary_10_1177_09596518231199211
crossref_primary_10_1080_00207721_2022_2053893
crossref_primary_10_1140_epjs_s11734_024_01372_3
crossref_primary_10_1109_ACCESS_2020_3046522
crossref_primary_10_1109_TCYB_2021_3052732
crossref_primary_10_1007_s11063_022_10860_3
crossref_primary_10_1080_00207721_2021_1998721
crossref_primary_10_1109_TNSE_2021_3077766
Cites_doi 10.1109/TAC.2015.2416924
10.1109/TFUZZ.2019.2895560
10.1109/TCYB.2019.2944761
10.1002/rnc.4837
10.1109/TFUZZ.2015.2501412
10.1109/TCST.2016.2557224
10.1109/ALLERTON.2009.5394956
10.1109/TCYB.2019.2937951
10.1016/j.ins.2018.12.091
10.1109/TSMC.2016.2616544
10.1109/TCYB.2018.2802044
10.1109/TIE.2017.2726965
10.1109/TSMC.2018.2888633
10.1109/TFUZZ.2018.2883374
10.1016/j.jfranklin.2018.04.001
10.1109/TIE.2018.2885726
10.1109/TSMC.2018.2875484
10.1109/TAC.2013.2279896
10.1109/TNNLS.2016.2538779
10.1109/TSMC.2019.2912846
10.1109/TFUZZ.2018.2849702
10.1109/TSMC.2018.2834967
10.1109/JSEN.2017.2654325
10.1016/j.automatica.2013.01.038
10.1016/j.ins.2017.09.005
10.1016/j.nahs.2019.03.005
10.1109/TCYB.2016.2608499
10.1109/TCYB.2018.2823362
10.1016/j.automatica.2019.06.019
10.1109/TNNLS.2016.2580609
10.1016/j.automatica.2014.10.067
10.1049/iet-cta.2017.0868
10.1109/TFUZZ.2007.905915
10.1109/TCYB.2015.2507177
10.1109/TCYB.2018.2828503
10.1109/TCYB.2020.2972384
10.1109/TSMC.2019.2960115
10.1109/TCYB.2018.2864776
10.1016/j.ins.2017.09.042
10.1109/TAC.2012.2206694
10.1109/TAC.2015.2461851
10.1109/TCYB.2018.2839912
10.1109/TSG.2015.2513772
10.1109/TSMC.2019.2896249
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
F28
FR3
H8D
JQ2
L7M
L~C
L~D
7X8
DOI 10.1109/TCYB.2020.3003752
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Aerospace Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
DatabaseTitle CrossRef
Aerospace Database
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
Aerospace Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2168-2275
EndPage 4010
ExternalDocumentID 10_1109_TCYB_2020_3003752
9139283
Genre orig-research
GrantInformation_xml – fundername: Qing Lan Project
– fundername: Natural Science Foundation of Jiangsu Province of China
  grantid: BK20171481
  funderid: 10.13039/501100004608
– fundername: National Natural Science Foundation of China
  grantid: 61973152; 61903182
  funderid: 10.13039/501100001809
– fundername: Natural Science Foundation of the Jiangsu Higher Education Institutions of China
  grantid: 19KJA510005
  funderid: 10.13039/501100010023
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
F28
FR3
H8D
JQ2
L7M
L~C
L~D
7X8
ID FETCH-LOGICAL-c326t-723b1c2f3a7a2c2e7f10a35deb60f6c0b0c61d639ed8635c5d18c380e5d165cf3
IEDL.DBID RIE
ISSN 2168-2267
2168-2275
IngestDate Fri Jul 11 10:04:52 EDT 2025
Mon Jun 30 05:24:57 EDT 2025
Thu Apr 24 23:12:04 EDT 2025
Tue Jul 01 00:53:56 EDT 2025
Wed Aug 27 02:39:34 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c326t-723b1c2f3a7a2c2e7f10a35deb60f6c0b0c61d639ed8635c5d18c380e5d165cf3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-7821-440X
0000-0003-4822-3134
0000-0001-5489-0246
0000-0001-7810-9338
0000-0003-3133-7119
PMID 32886621
PQID 2557978518
PQPubID 85422
PageCount 11
ParticipantIDs ieee_primary_9139283
crossref_citationtrail_10_1109_TCYB_2020_3003752
crossref_primary_10_1109_TCYB_2020_3003752
proquest_journals_2557978518
proquest_miscellaneous_2440472729
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-08-01
PublicationDateYYYYMMDD 2021-08-01
PublicationDate_xml – month: 08
  year: 2021
  text: 2021-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on cybernetics
PublicationTitleAbbrev TCYB
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref37
ref15
ref36
ref14
lin (ref44) 2008; 16
ref31
ref30
ref33
ref11
ref32
ref10
ref1
ref39
ref17
ref38
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref21
ref43
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
liu (ref2) 2020
References_xml – ident: ref43
  doi: 10.1109/TAC.2015.2416924
– ident: ref25
  doi: 10.1109/TFUZZ.2019.2895560
– ident: ref13
  doi: 10.1109/TCYB.2019.2944761
– ident: ref33
  doi: 10.1002/rnc.4837
– ident: ref15
  doi: 10.1109/TFUZZ.2015.2501412
– ident: ref7
  doi: 10.1109/TCST.2016.2557224
– ident: ref38
  doi: 10.1109/ALLERTON.2009.5394956
– year: 2020
  ident: ref2
  article-title: Event-based secure leader-following consensus control for multi-agent systems with multiple cyber-attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2937951
– ident: ref37
  doi: 10.1016/j.ins.2018.12.091
– ident: ref35
  doi: 10.1109/TSMC.2016.2616544
– ident: ref28
  doi: 10.1109/TCYB.2018.2802044
– ident: ref27
  doi: 10.1109/TIE.2017.2726965
– ident: ref22
  doi: 10.1109/TSMC.2018.2888633
– ident: ref14
  doi: 10.1109/TFUZZ.2018.2883374
– ident: ref10
  doi: 10.1016/j.jfranklin.2018.04.001
– ident: ref12
  doi: 10.1109/TIE.2018.2885726
– ident: ref23
  doi: 10.1109/TSMC.2018.2875484
– ident: ref39
  doi: 10.1109/TAC.2013.2279896
– ident: ref11
  doi: 10.1109/TNNLS.2016.2538779
– ident: ref26
  doi: 10.1109/TSMC.2019.2912846
– ident: ref21
  doi: 10.1109/TFUZZ.2018.2849702
– ident: ref30
  doi: 10.1109/TSMC.2018.2834967
– ident: ref34
  doi: 10.1109/JSEN.2017.2654325
– ident: ref18
  doi: 10.1016/j.automatica.2013.01.038
– ident: ref24
  doi: 10.1016/j.ins.2017.09.005
– ident: ref42
  doi: 10.1016/j.nahs.2019.03.005
– ident: ref3
  doi: 10.1109/TCYB.2016.2608499
– ident: ref16
  doi: 10.1109/TCYB.2018.2823362
– ident: ref31
  doi: 10.1016/j.automatica.2019.06.019
– ident: ref19
  doi: 10.1109/TNNLS.2016.2580609
– ident: ref41
  doi: 10.1016/j.automatica.2014.10.067
– ident: ref36
  doi: 10.1049/iet-cta.2017.0868
– volume: 16
  start-page: 739
  year: 2008
  ident: ref44
  article-title: Filter design for nonlinear systems with time-delay through T-S fuzzy model approach
  publication-title: IEEE Trans Fuzzy Syst
  doi: 10.1109/TFUZZ.2007.905915
– ident: ref9
  doi: 10.1109/TCYB.2015.2507177
– ident: ref5
  doi: 10.1109/TCYB.2018.2828503
– ident: ref6
  doi: 10.1109/TCYB.2020.2972384
– ident: ref20
  doi: 10.1109/TSMC.2019.2960115
– ident: ref29
  doi: 10.1109/TCYB.2018.2864776
– ident: ref32
  doi: 10.1016/j.ins.2017.09.042
– ident: ref17
  doi: 10.1109/TAC.2012.2206694
– ident: ref4
  doi: 10.1109/TAC.2015.2461851
– ident: ref1
  doi: 10.1109/TCYB.2018.2839912
– ident: ref8
  doi: 10.1109/TSG.2015.2513772
– ident: ref40
  doi: 10.1109/TSMC.2019.2896249
SSID ssj0000816898
Score 2.616423
Snippet The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4000
SubjectTerms Adaptation models
Adaptive event-triggered scheme
Adaptive systems
Control systems
Cyberattack
Cybersecurity
deception attacks
Denial of service attacks
denial-of-service (DoS) attacks
Denial-of-service attack
Filter design (mathematics)
hybrid cyber attack
Linear matrix inequalities
secure filtering
Stability augmentation
Symmetric matrices
Systems stability
Title Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack
URI https://ieeexplore.ieee.org/document/9139283
https://www.proquest.com/docview/2557978518
https://www.proquest.com/docview/2440472729
Volume 51
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PfUC9IFYKMhIPdAKb2Nn89jjsnS1IJXTVi3iEDn2BKqi7Io6h_LrmfF6IxUQ4mYpk8jReOwZz8z3ARyPRlikrlayUcrJkSqtNEpZadW4QG1oewzV7hef8vnl6ON1dr0Fb_teGEQMxWc45GHI5bul7fiq7IwhLOk43IZtCtzWvVr9fUogkAjUt5oGkryKIiYxVTI-W0w_v6NgUFOMGlhfmcQm1WWZ51o9OJECxcof-3I4bGaP4WIzzXWNye2w8_XQ_vwNwfF__-MJPIpep5isl8kebGG7D3vRru_Emwg-fXIAX8IFPIqJMyveCeU5F0TKBQXxX5nWU8xuOL8u3ofKD3F147-JD-2q84KpPwPhhBemdWJ-z71gYnpfk_TEe2NvD-Fydr6YzmUkYJCWvDovC53WyuomNYXRVmPRqMSkmcM6T5rcJnVic-XIx0FXkuNiM0e6TssEaZBntkmfwk67bPEZCM1QayWj4DaKm2ONaTDFrDS5qhsy_QEkGyVUNqKT85y_VyFKScYVq7BiFVZRhQM47V9ZraE5_iV8wHroBaMKBnC00XQVjfeuoiiroOA6U-UAXvePyew4l2JaXHYkw7iKnMQeP__7l1_Arubyl1AreAQ7_keHL8l_8fWrsHB_ATH06B8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fT9swED4x9rC9wBibKDDmSXvYprnETvOjj6VQlY3yVDSmPUSO7QACpRU4D_DXc-e6kbahaW-W4kSOzue78919H8DHXs9msSkFr4QwvCdyzZUQmmvRz6xUeDz6avfJaTo-6307T85X4GvbC2Ot9cVntktDn8s3M93QVdk-QViiOXwGz9HuJ2LRrdXeqHgKCU9-K3HA0a_IQhpTRP396fDnAYaDEqNUz_tKNDaxzPM0leI3m-RJVv46mb25Ga3DZLnQRZXJdbdxZVc__IHh-L9_8grWgt_JBouNsgErtn4NG0Gz79inAD_9eRN--St4ywZGzeks5EdUEsmnGMZfELEnG11Rhp0d-toP9uPKXbLjet44RuSfnnLCMVUbNr6nbjA2vC9x9sA5pa_fwNnoaDoc80DBwDX6dY5nMi6FllWsMiW1tFklIhUnxpZpVKU6KiOdCoNejjU5ui46MSjtOI8sDtJEV_FbWK1ntd0CJglsLScc3EpQe6xSlY1tkqtUlBUqfweipRAKHfDJac03hY9Ton5BIixIhEUQYQe-tK_MF-Ac_5q8SXJoJwYRdGB3KekiqO9dgXFWhuF1IvIOfGgfo-JRNkXVdtbgHEJWpDR2f_vpL7-HF-Pp5KQ4OT79vgMvJRXD-MrBXVh1t419h96MK_f8Jn4Ed73raA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Adaptive-Event-Triggered+Filter+Design+With+Input+Constraint+and+Hybrid+Cyber+Attack&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Liu%2C+Jinliang&rft.au=Wang%2C+Yuda&rft.au=Cao%2C+Jinde&rft.au=Yue%2C+Dong&rft.date=2021-08-01&rft.issn=2168-2267&rft.eissn=2168-2275&rft.volume=51&rft.issue=8&rft.spage=4000&rft.epage=4010&rft_id=info:doi/10.1109%2FTCYB.2020.3003752&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCYB_2020_3003752
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon