Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks

This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on systems, man, and cybernetics. Systems Vol. 51; no. 6; pp. 3926 - 3938
Main Authors Zhao, Di, Wang, Zidong, Ho, Daniel W. C., Wei, Guoliang
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as regulated by two sequences of Bernoulli distributed random variables with certain probabilities. A novel observer-based PID controller is proposed such that the closed-loop system achieves the desired security level and the quadratic cost criterion (QCC) has an upper bound. Sufficient conditions are derived under which the exponentially mean-square input-to-state stability is guaranteed and the desired security level is then achieved. Subsequently, an upper bound of the QCC is obtained and the explicit expression of the desired PID controller is also parameterized. Finally, the validity of the developed design approach is verified via an illustrative example.
AbstractList This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as regulated by two sequences of Bernoulli distributed random variables with certain probabilities. A novel observer-based PID controller is proposed such that the closed-loop system achieves the desired security level and the quadratic cost criterion (QCC) has an upper bound. Sufficient conditions are derived under which the exponentially mean-square input-to-state stability is guaranteed and the desired security level is then achieved. Subsequently, an upper bound of the QCC is obtained and the explicit expression of the desired PID controller is also parameterized. Finally, the validity of the developed design approach is verified via an illustrative example.
Author Wei, Guoliang
Ho, Daniel W. C.
Zhao, Di
Wang, Zidong
Author_xml – sequence: 1
  givenname: Di
  orcidid: 0000-0002-8575-0294
  surname: Zhao
  fullname: Zhao, Di
  email: zhaodi0907520@163.com
  organization: Department of Control Science and Engineering, Shanghai Key Laboratory of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China
– sequence: 2
  givenname: Zidong
  orcidid: 0000-0002-9576-7401
  surname: Wang
  fullname: Wang, Zidong
  email: zidong.wang@brunel.ac.uk
  organization: Department of Computer Science, Brunel University London, Uxbridge, U.K
– sequence: 3
  givenname: Daniel W. C.
  orcidid: 0000-0001-9799-3712
  surname: Ho
  fullname: Ho, Daniel W. C.
  email: madaniel@cityu.edu.hk
  organization: Department of Mathematics, City University of Hong Kong, Hong Kong
– sequence: 4
  givenname: Guoliang
  surname: Wei
  fullname: Wei, Guoliang
  email: guoliang.wei@usst.edu.cn
  organization: College of Science, University of Shanghai for Science and Technology, Shanghai, China
BookMark eNp9kEtLw0AUhQepYK39AeJmwHXqPDLJZFlTH4VKhba4HGYmN5DaJnVmKuTfm9DiwoWrexfnOwe-azSomxoQuqVkQinJHtart3zCCM0mLBNM8OwCDRlNZMQYZ4PfnyZXaOz9lhBCmUw4SYboY2k8uG9w0aP2UOD3-QyvwB5dFVqcN3VwzQ6XjcOzylsHAfC62kM0g51u8ar1AfYeb-oCHM5b09VMQ9D209-gy1LvPIzPd4Q2z0_r_DVaLF_m-XQRWc6TEJmUl4YKLUsZGyaJYCmVlMeiKEhhSp7RgthMCkqMsTFozUSZlrqwgnPLYspH6P7Ue3DN1xF8UNvm6OpuUjHBZBazVPQpekpZ13jvoFQHV-21axUlqleoeoWqV6jOCjsm_cPYKuhQ9U50tfuXvDuRFQD8LsmMxUln_Qda_X-A
CODEN ITSMFE
CitedBy_id crossref_primary_10_1002_rnc_4963
crossref_primary_10_1109_TIFS_2022_3160355
crossref_primary_10_1109_TNNLS_2021_3106383
crossref_primary_10_1109_TCSI_2021_3116278
crossref_primary_10_1007_s11432_022_3684_x
crossref_primary_10_1109_TCYB_2022_3222171
crossref_primary_10_1080_00207721_2020_1740823
crossref_primary_10_1109_TSIPN_2021_3097217
crossref_primary_10_3390_s23135773
crossref_primary_10_1016_j_neucom_2020_02_064
crossref_primary_10_1016_j_isatra_2023_04_018
crossref_primary_10_1016_j_jfranklin_2023_11_025
crossref_primary_10_1016_j_isatra_2022_09_039
crossref_primary_10_1109_TSMC_2024_3357776
crossref_primary_10_1109_TCYB_2020_3021350
crossref_primary_10_1002_oca_3084
crossref_primary_10_1016_j_isatra_2022_02_001
crossref_primary_10_3390_pr11051375
crossref_primary_10_1002_rnc_5844
crossref_primary_10_1007_s40997_023_00596_3
crossref_primary_10_1002_rnc_5328
crossref_primary_10_1002_rnc_5205
crossref_primary_10_1109_TSMC_2020_3041121
crossref_primary_10_3390_math12081146
crossref_primary_10_1109_TFUZZ_2022_3222905
crossref_primary_10_1002_mma_9386
crossref_primary_10_1016_j_neucom_2020_04_046
crossref_primary_10_1109_TCYB_2020_3021982
crossref_primary_10_1016_j_jfranklin_2022_12_034
crossref_primary_10_1007_s00034_023_02484_2
crossref_primary_10_1109_TSMC_2023_3251355
crossref_primary_10_1016_j_ins_2024_120613
crossref_primary_10_1109_TNNLS_2022_3160627
crossref_primary_10_1109_TII_2024_3363091
crossref_primary_10_1109_TSMC_2022_3205153
crossref_primary_10_1016_j_neucom_2022_05_096
crossref_primary_10_1109_TSMC_2021_3090024
crossref_primary_10_1016_j_nahs_2021_101117
crossref_primary_10_1016_j_neucom_2020_05_011
crossref_primary_10_1109_TNET_2022_3183862
crossref_primary_10_1109_TCC_2024_3480194
crossref_primary_10_1109_TCSII_2022_3220019
crossref_primary_10_1109_TSMC_2022_3160510
crossref_primary_10_1016_j_amc_2021_126535
crossref_primary_10_1016_j_jfranklin_2023_03_007
crossref_primary_10_1016_j_jfranklin_2022_11_048
crossref_primary_10_1007_s11063_023_11426_7
crossref_primary_10_1109_TSIPN_2020_3046220
crossref_primary_10_1002_rnc_7744
crossref_primary_10_1080_00207179_2020_1798020
crossref_primary_10_1155_2022_6122921
crossref_primary_10_1016_j_asoc_2020_106960
crossref_primary_10_1109_TSMC_2024_3509629
crossref_primary_10_1002_int_23036
crossref_primary_10_1109_JSYST_2021_3064920
crossref_primary_10_1109_TNSE_2022_3223040
crossref_primary_10_1109_ACCESS_2020_3044147
crossref_primary_10_1080_00207721_2020_1765219
crossref_primary_10_1002_rnc_6919
crossref_primary_10_1109_TFUZZ_2023_3262609
crossref_primary_10_1109_TASE_2023_3343752
crossref_primary_10_1016_j_jfranklin_2024_106760
crossref_primary_10_1109_TCYB_2020_3004288
crossref_primary_10_1002_rnc_7695
crossref_primary_10_1016_j_jfranklin_2022_01_042
Cites_doi 10.1109/TAC.2016.2612818
10.1109/TIE.2011.2107720
10.1109/JSEN.2017.2654325
10.1109/TCYB.2018.2863664
10.1080/21642583.2017.1355760
10.1016/0005-1098(94)00130-B
10.1109/JAS.2017.7510727
10.1016/S0020-0255(99)00127-9
10.1007/s12555-013-0139-0
10.1109/TFUZZ.2016.2641023
10.1109/TSMC.2017.2733542
10.1109/TAC.2019.2929817
10.1109/TAC.2013.2279896
10.1109/TSMC.2017.2719629
10.1109/TCYB.2019.2918760
10.1016/j.neucom.2014.11.052
10.1109/TII.2016.2607150
10.1007/978-1-4471-3651-4
10.1109/TII.2015.2506545
10.1109/TCYB.2018.2840430
10.1109/TSMC.2017.2681698
10.1109/TCYB.2018.2852290
10.1016/j.automatica.2008.01.012
10.1109/TCYB.2019.2921733
10.1016/j.automatica.2015.09.037
10.1016/j.chaos.2004.12.013
10.1016/S0005-1098(01)00028-0
10.1109/TSMC.2017.2719960
10.1109/TCST.2016.2557278
10.1109/TSMC.2016.2616544
10.1080/21642583.2018.1494639
10.1016/j.nahs.2017.07.005
10.1109/TAC.2019.2910167
10.1002/rnc.3623
10.1049/iet-cta.2016.0135
10.1016/S0167-6911(01)00164-5
10.1109/TCYB.2018.2843358
10.1109/TSMC.2018.2874508
10.1109/TCYB.2017.2671032
10.1109/TSMC.2019.2918002
10.1109/TSMC.2018.2814539
10.1109/TCYB.2017.2707590
10.1109/TIE.2009.2018433
10.1016/j.jmaa.2010.11.038
10.1016/j.automatica.2016.12.026
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
H8D
JQ2
L7M
L~C
L~D
DOI 10.1109/TSMC.2019.2952539
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
Aerospace Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Aerospace Database
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Aerospace Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2168-2232
EndPage 3938
ExternalDocumentID 10_1109_TSMC_2019_2952539
8924686
Genre orig-research
GrantInformation_xml – fundername: Research Grants Council of Hong Kong Special Administrative Region
  grantid: 9042223; CityU 11200717
  funderid: 10.13039/501100002920
– fundername: Alexander von Humboldt Foundation of Germany
  funderid: 10.13039/100005156
– fundername: National Natural Science Foundation of China
  grantid: 61873148; 61873169; 61933007
  funderid: 10.13039/501100001809
GroupedDBID 0R~
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
H8D
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c336t-b73fb15a8f84b280527181345dd0dbf391d0c98510bbc4eaa25f7fadc533c2413
IEDL.DBID RIE
ISSN 2168-2216
IngestDate Mon Jun 30 06:03:42 EDT 2025
Thu Apr 24 22:53:59 EDT 2025
Tue Jul 01 02:29:13 EDT 2025
Wed Aug 27 02:30:24 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c336t-b73fb15a8f84b280527181345dd0dbf391d0c98510bbc4eaa25f7fadc533c2413
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8575-0294
0000-0002-9576-7401
0000-0001-9799-3712
OpenAccessLink http://bura.brunel.ac.uk/bitstream/2438/23448/7/FullText.pdf
PQID 2528942751
PQPubID 75739
PageCount 13
ParticipantIDs crossref_primary_10_1109_TSMC_2019_2952539
proquest_journals_2528942751
crossref_citationtrail_10_1109_TSMC_2019_2952539
ieee_primary_8924686
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-06-01
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 06
  year: 2021
  text: 2021-06-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on systems, man, and cybernetics. Systems
PublicationTitleAbbrev TSMC
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref11
ref10
ref17
ref16
ref18
ref50
ref45
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref34
ref37
ref36
ref31
ref30
ref33
ref32
ziegler (ref46) 1942; 64
ref2
ang (ref1) 2005; 3
ref39
ref38
zou (ref48) 0
ref24
ref23
ref26
ref25
ref20
ref22
ref21
wang (ref35) 0
kim (ref19) 2006; 4
ref28
ref27
ref29
References_xml – ident: ref4
  doi: 10.1109/TAC.2016.2612818
– ident: ref40
  doi: 10.1109/TIE.2011.2107720
– ident: ref24
  doi: 10.1109/JSEN.2017.2654325
– ident: ref32
  doi: 10.1109/TCYB.2018.2863664
– year: 0
  ident: ref35
  article-title: Observer-based fuzzy output-feedback control for discrete-time strict-feedback nonlinear systems with stochastic noises
  publication-title: IEEE Trans Cybern
– ident: ref21
  doi: 10.1080/21642583.2017.1355760
– ident: ref15
  doi: 10.1016/0005-1098(94)00130-B
– ident: ref37
  doi: 10.1109/JAS.2017.7510727
– ident: ref2
  doi: 10.1016/S0020-0255(99)00127-9
– ident: ref28
  doi: 10.1007/s12555-013-0139-0
– ident: ref41
  doi: 10.1109/TFUZZ.2016.2641023
– ident: ref3
  doi: 10.1109/TSMC.2017.2733542
– ident: ref23
  doi: 10.1109/TAC.2019.2929817
– volume: 64
  start-page: 759
  year: 1942
  ident: ref46
  article-title: Optimum settings for automatic controllers
  publication-title: ASME Trans
– year: 0
  ident: ref48
  article-title: Full information estimation for time-varying systems with round-Robin protocol: A recursive filter approach
  publication-title: IEEE Trans Syst Man Cybern Syst
– ident: ref45
  doi: 10.1109/TAC.2013.2279896
– ident: ref26
  doi: 10.1109/TSMC.2017.2719629
– ident: ref16
  doi: 10.1109/TCYB.2019.2918760
– ident: ref44
  doi: 10.1016/j.neucom.2014.11.052
– ident: ref43
  doi: 10.1109/TII.2016.2607150
– volume: 4
  start-page: 624
  year: 2006
  ident: ref19
  article-title: A biologically inspired intelligent PID controller tuning for AVR systems
  publication-title: Int J Control Autom Syst
– ident: ref9
  doi: 10.1007/978-1-4471-3651-4
– ident: ref42
  doi: 10.1109/TII.2015.2506545
– ident: ref39
  doi: 10.1109/TCYB.2018.2840430
– ident: ref29
  doi: 10.1109/TSMC.2017.2681698
– ident: ref7
  doi: 10.1109/TCYB.2018.2852290
– ident: ref14
  doi: 10.1016/j.automatica.2008.01.012
– ident: ref34
  doi: 10.1109/TCYB.2019.2921733
– ident: ref10
  doi: 10.1016/j.automatica.2015.09.037
– ident: ref5
  doi: 10.1016/j.chaos.2004.12.013
– volume: 3
  start-page: 559
  year: 2005
  ident: ref1
  article-title: PID control system analysis, design, and technology
  publication-title: IEEE Trans Control Syst Technol
– ident: ref17
  doi: 10.1016/S0005-1098(01)00028-0
– ident: ref20
  doi: 10.1109/TSMC.2017.2719960
– ident: ref27
  doi: 10.1109/TCST.2016.2557278
– ident: ref13
  doi: 10.1109/TSMC.2016.2616544
– ident: ref22
  doi: 10.1080/21642583.2018.1494639
– ident: ref6
  doi: 10.1016/j.nahs.2017.07.005
– ident: ref50
  doi: 10.1109/TAC.2019.2910167
– ident: ref31
  doi: 10.1002/rnc.3623
– ident: ref11
  doi: 10.1049/iet-cta.2016.0135
– ident: ref18
  doi: 10.1016/S0167-6911(01)00164-5
– ident: ref25
  doi: 10.1109/TCYB.2018.2843358
– ident: ref47
  doi: 10.1109/TSMC.2018.2874508
– ident: ref33
  doi: 10.1109/TCYB.2017.2671032
– ident: ref49
  doi: 10.1109/TSMC.2019.2918002
– ident: ref30
  doi: 10.1109/TSMC.2018.2814539
– ident: ref38
  doi: 10.1109/TCYB.2017.2707590
– ident: ref8
  doi: 10.1109/TIE.2009.2018433
– ident: ref36
  doi: 10.1016/j.jmaa.2010.11.038
– ident: ref12
  doi: 10.1016/j.automatica.2016.12.026
SSID ssj0001286306
Score 2.4598348
Snippet This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3926
SubjectTerms Controllers
Cybersecurity
Deception attacks
Delays
Denial of service attacks
denial-of-service (DoS) attacks
Discrete time systems
exponentially mean-square input-to-state stability (ISS)
Feedback control
observer-based proportional-integral-derivative (PID) control
Observers
PD control
PI control
Proportional integral derivative
Random variables
Security
security control
Time delay systems
Tuning
Upper bound
Upper bounds
Title Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
URI https://ieeexplore.ieee.org/document/8924686
https://www.proquest.com/docview/2528942751
Volume 51
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT9swFH8qnOAwNj60Qpl84DTNrb-THKEFdZPKJtGK3qL4I9I0VCaWHspfP9txqwrQtEuUgx0579l-3-8HcKG0y6ioCM6oLrCoa4O14RxTK1RFi4qbLBQ4T27VeCa-zeW8A182tTDOuZh85vrhNcby7aNZBlfZIPfGgsrVDux4w62t1dryp-SKRyhNRpVnvn-mICYlxWB6NxmGPK6izwrJZIAG3xJDEVfl1WUcJczNAUzWa2sTS371l43um-cXbRv_d_Hv4V1SNdFluzc-QMctDmF_qwHhEdx_18Er657wlZdmFv34OkJ3CdEODdssduTVWjT66a8Xr1-jUDKCR-6hWqHU7BxF6CQ0XGn_mcumCUX7xzC7uZ4OxzhBLWDPGNVgnfFaU1nldS40CzAHXmZRLqS1xOqaF9QSU3jtjGhthKsqJuusrqzx2qIJobkT2F08LtxHQIIya6nlhuRGcP_LxCppstxwY2Re2y6QNeVLk_qQBziMhzLaI6QoA7PKwKwyMasLnzdTfrdNOP41-CgQfzMw0b0LvTV7y3RM_5RMentTsEzS07dnncEeC0ks0e3Sg93maenOvRbS6E9x-_0F0-XXzQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT9swFH9icGA7jK-hdcDmAyeEi7-THKEFlUEBiaJxi-KPSAhUEKQH9tfPdtyqgmnaJcrBjpz3bL_v9wPYVdplVFQEZ1QXWNS1wdpwjqkVqqJFxU0WCpyHF2pwI37eytsF2J_VwjjnYvKZ64bXGMu3j2YSXGUHuTcWVK4-wJKX-5K11VpzHpVc8Qimyajy7PfPFMakpDgYXQ97IZOr6LJCMhnAwecEUURWeXcdRxlzsgLD6era1JL77qTRXfP7TePG_13-KnxOyiY6bHfHGiy48Tp8mmtBuAG_LnXwy7pnfOTlmUVXp310nTDtUK_NY0desUX9O3_BeA0bhaIR3HcP1StK7c5RBE9CvVftP3PYNKFs_wvcnByPegOcwBawZ41qsM54rams8joXmgWgAy-1KBfSWmJ1zQtqiSm8fka0NsJVFZN1VlfWeH3RhODcJiyOH8fuKyBBmbXUckNyI7j_ZWKVNFluuDEyr20HyJTypUmdyAMgxkMZLRJSlIFZZWBWmZjVgb3ZlKe2Dce_Bm8E4s8GJrp3YHvK3jId1JeSSW9xCpZJ-u3vs37A8mA0PC_PTy_OtuAjCykt0QmzDYvN88TteJ2k0d_jVvwDRCDbFw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Observer-Based+PID+Security+Control+for+Discrete+Time-Delay+Systems+Under+Cyber-Attacks&rft.jtitle=IEEE+transactions+on+systems%2C+man%2C+and+cybernetics.+Systems&rft.au=Zhao%2C+Di&rft.au=Wang%2C+Zidong&rft.au=Ho%2C+Daniel+W.+C.&rft.au=Wei%2C+Guoliang&rft.date=2021-06-01&rft.issn=2168-2216&rft.eissn=2168-2232&rft.volume=51&rft.issue=6&rft.spage=3926&rft.epage=3938&rft_id=info:doi/10.1109%2FTSMC.2019.2952539&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSMC_2019_2952539
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2216&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2216&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2216&client=summon