Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems with Multiple Sensor Arrays Subject to Deception Attacks

In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is establishe...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on fuzzy systems Vol. 31; no. 10; pp. 1 - 16
Main Authors Luo, Yuqiang, Wang, Zidong, Hu, Jun, Dong, Hongli, Yue, Dong
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1063-6706
1941-0034
DOI10.1109/TFUZZ.2023.3262609

Cover

Loading…
Abstract In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the <inline-formula><tex-math notation="LaTeX">s</tex-math></inline-formula>th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm.
AbstractList In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the <inline-formula><tex-math notation="LaTeX">s</tex-math></inline-formula>th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm.
In this article, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi–Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the [Formula Omitted]th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called [Formula Omitted]- security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding [Formula Omitted]- security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm.
Author Hu, Jun
Luo, Yuqiang
Yue, Dong
Dong, Hongli
Wang, Zidong
Author_xml – sequence: 1
  givenname: Yuqiang
  orcidid: 0000-0002-5567-8025
  surname: Luo
  fullname: Luo, Yuqiang
  organization: Shanghai Key Lab of Modern Optical System, Department of Control Science and Engineering, and the Informatization Office, University of Shanghai for Science and Technology, Shanghai, China
– sequence: 2
  givenname: Zidong
  orcidid: 0000-0002-9576-7401
  surname: Wang
  fullname: Wang, Zidong
  organization: Department of Computer Science, Brunel University London, Uxbridge, Middlesex, United Kingdom
– sequence: 3
  givenname: Jun
  orcidid: 0000-0002-7852-5064
  surname: Hu
  fullname: Hu, Jun
  organization: Department of Mathematics, Harbin University of Science and Technology, Harbin, China
– sequence: 4
  givenname: Hongli
  orcidid: 0000-0001-8531-6757
  surname: Dong
  fullname: Dong, Hongli
  organization: Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing, China
– sequence: 5
  givenname: Dong
  orcidid: 0000-0001-7810-9338
  surname: Yue
  fullname: Yue, Dong
  organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China
BookMark eNp9kElPwzAQhS1UJMryBxAHS5xTvCSuc6y6gcRyCL30EjnuRKRLUuyJqlTivxPaHhAHTjOjeW-e5rsknbIqgZBbznqcs_jhfTKbz3uCCdmTQgnF4jPS5XHIA8Zk2Gl7pmSg-kxdkEvvl4zxMOK6S74SsLUrsAmmtXGmRIAFndT7fUNfAXeVW7VzggaBjj0WG4NFVdK8clQEI5o0HmHj6a7AD_pSr7HYroEmUPpWMHDONJ4mdbYEixQrOgIL28OBAaKxK39NznOz9nBzqldkNhm_Dx-D57fp03DwHFgZMgxCqyKAWBvJpdAx71susxz6C2syyEFlYCPJc6GijAtQSkutAFSUxyzPwoWUV-T-eHfrqs8aPKbLqnZlG5kK3ZeR1kqIViWOKusq7x3k6da1H7sm5Sz9wZweMKc_mNMT5tak_5hsgQdK6Eyx_t96d7QWAPAri2kp2vU30hmPjw
CODEN IEFSEV
CitedBy_id crossref_primary_10_1109_TR_2024_3384063
crossref_primary_10_1080_00207721_2024_2304132
crossref_primary_10_1080_21642583_2024_2357796
crossref_primary_10_1007_s13042_024_02195_3
crossref_primary_10_1016_j_inffus_2025_102984
crossref_primary_10_1109_TSMC_2024_3370221
crossref_primary_10_1080_00207721_2024_2304665
crossref_primary_10_1109_TFUZZ_2024_3439570
crossref_primary_10_1109_TII_2024_3431022
crossref_primary_10_1007_s11432_023_3929_3
Cites_doi 10.1109/TSMC.2019.2952539
10.1080/00207721.2022.2083256
10.1016/j.fss.2019.05.004
10.1016/j.ins.2020.08.034
10.53941/ijndi0101010
10.1109/TIM.2022.3201941
10.1109/TAC.2014.2366855
10.1080/00207721.2022.2053893
10.1016/j.isatra.2018.09.026
10.1080/21642583.2022.2031335
10.1080/21642583.2022.2048322
10.1016/j.neucom.2020.03.104
10.1109/TFUZZ.2022.3201282
10.1016/j.neucom.2018.12.002
10.1080/00207721.2022.2097332
10.1109/ACSSC.2010.5757508
10.1115/1.4000659
10.1016/j.inffus.2011.08.001
10.1109/TSP.2017.2686375
10.1137/1.9781611970777
10.53941/ijndi0101008
10.1080/00207721.2022.2143735
10.1109/TCYB.2016.2514846
10.1016/j.automatica.2020.108813
10.1109/9.28018
10.1109/TCYB.2019.2902520
10.1109/TPAMI.2021.3132503
10.1109/TSMC.2017.2788503
10.1049/iet-cta.2020.0590
10.1007/s11045-020-00715-2
10.1117/12.614726
10.1002/oca.2626
10.1002/rnc.3623
10.1016/j.automatica.2017.12.038
10.1016/j.fss.2012.04.002
10.1109/9.618250
10.1109/TIT.2003.815774
10.1109/TSP.2017.2770102
10.1109/TCSII.2021.3073724
10.1109/TMECH.2016.2620987
10.1109/TKDE.2020.3033324
10.1021/ie0511175
10.1016/j.ins.2020.06.074
10.1038/s41467-019-12490-1
10.1109/TCYB.2020.3025251
10.1080/21642583.2022.2063203
10.53941/ijndi0101003
10.1016/j.inffus.2019.07.008
10.1109/TAC.2020.2999020
10.1109/TSMC.1985.6313399
10.1080/00207721.2022.2062802
10.1109/TNNLS.2015.2411671
10.1080/21642583.2022.2063202
10.1109/CDC.2006.377239
10.1080/00207721.2015.1084396
10.1080/00207721.2021.1885082
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TFUZZ.2023.3262609
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1941-0034
EndPage 16
ExternalDocumentID 10_1109_TFUZZ_2023_3262609
10083209
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61903254; 61933007; U21A2019; 12171124
– fundername: Hainan Province Science and Technology Special Fund of China
  grantid: ZDYF2022SHFZ105
– fundername: Natural Science Foundation of Heilongjiang Province of China
  grantid: ZD2022F003
– fundername: Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
TAE
TN5
5VS
AAYOK
AAYXX
AETIX
AGSQL
AI.
AIBXA
ALLEH
CITATION
EJD
H~9
ICLAB
IFJZH
RIG
VH1
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c340t-4c65ee98a31328917c13bfe7dcabefe6bec531f265b12e668386ee65f90fb4d33
IEDL.DBID RIE
ISSN 1063-6706
IngestDate Sun Jun 29 12:54:11 EDT 2025
Thu Apr 24 22:52:36 EDT 2025
Tue Jul 01 01:55:36 EDT 2025
Wed Aug 27 02:21:29 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c340t-4c65ee98a31328917c13bfe7dcabefe6bec531f265b12e668386ee65f90fb4d33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8531-6757
0000-0002-5567-8025
0000-0002-9576-7401
0000-0002-7852-5064
0000-0001-7810-9338
OpenAccessLink http://bura.brunel.ac.uk/bitstream/2438/26731/3/FullText.pdf
PQID 2873588622
PQPubID 85428
PageCount 16
ParticipantIDs ieee_primary_10083209
proquest_journals_2873588622
crossref_primary_10_1109_TFUZZ_2023_3262609
crossref_citationtrail_10_1109_TFUZZ_2023_3262609
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-10-01
PublicationDateYYYYMMDD 2023-10-01
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on fuzzy systems
PublicationTitleAbbrev TFUZZ
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref57
ref12
ref56
ref15
ref59
ref14
ref58
ref53
ref52
ref55
ref10
ref54
ref17
ref16
ref19
ref18
ref51
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
waltz (ref27) 1986
feng (ref2) 2010
ref49
kaczorek (ref11) 1985
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref34
ref37
ref36
ref31
ref30
ref33
ref32
ref1
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref29
References_xml – ident: ref49
  doi: 10.1109/TSMC.2019.2952539
– ident: ref22
  doi: 10.1080/00207721.2022.2083256
– ident: ref51
  doi: 10.1016/j.fss.2019.05.004
– ident: ref13
  doi: 10.1016/j.ins.2020.08.034
– ident: ref5
  doi: 10.53941/ijndi0101010
– ident: ref56
  doi: 10.1109/TIM.2022.3201941
– ident: ref18
  doi: 10.1109/TAC.2014.2366855
– ident: ref48
  doi: 10.1080/00207721.2022.2053893
– year: 1986
  ident: ref27
  publication-title: Data Fusion for C3I A Tutorial in Command Control Communications Intelligence (C3I) Handbook
– ident: ref52
  doi: 10.1016/j.isatra.2018.09.026
– ident: ref35
  doi: 10.1080/21642583.2022.2031335
– ident: ref44
  doi: 10.1080/21642583.2022.2048322
– ident: ref20
  doi: 10.1016/j.neucom.2020.03.104
– ident: ref55
  doi: 10.1109/TFUZZ.2022.3201282
– ident: ref8
  doi: 10.1016/j.neucom.2018.12.002
– ident: ref33
  doi: 10.1080/00207721.2022.2097332
– ident: ref25
  doi: 10.1109/ACSSC.2010.5757508
– ident: ref39
  doi: 10.1115/1.4000659
– ident: ref28
  doi: 10.1016/j.inffus.2011.08.001
– ident: ref30
  doi: 10.1109/TSP.2017.2686375
– ident: ref50
  doi: 10.1137/1.9781611970777
– ident: ref34
  doi: 10.53941/ijndi0101008
– ident: ref47
  doi: 10.1080/00207721.2022.2143735
– ident: ref42
  doi: 10.1109/TCYB.2016.2514846
– ident: ref14
  doi: 10.1016/j.automatica.2020.108813
– ident: ref58
  doi: 10.1109/9.28018
– ident: ref9
  doi: 10.1109/TCYB.2019.2902520
– ident: ref37
  doi: 10.1109/TPAMI.2021.3132503
– ident: ref15
  doi: 10.1109/TSMC.2017.2788503
– ident: ref53
  doi: 10.1049/iet-cta.2020.0590
– ident: ref17
  doi: 10.1007/s11045-020-00715-2
– ident: ref24
  doi: 10.1117/12.614726
– ident: ref54
  doi: 10.1002/oca.2626
– ident: ref43
  doi: 10.1002/rnc.3623
– ident: ref32
  doi: 10.1016/j.automatica.2017.12.038
– ident: ref59
  doi: 10.1016/j.fss.2012.04.002
– ident: ref10
  doi: 10.1109/9.618250
– ident: ref38
  doi: 10.1109/TIT.2003.815774
– ident: ref31
  doi: 10.1109/TSP.2017.2770102
– ident: ref46
  doi: 10.1109/TCSII.2021.3073724
– ident: ref6
  doi: 10.1109/TMECH.2016.2620987
– ident: ref7
  doi: 10.1109/TKDE.2020.3033324
– ident: ref26
  doi: 10.1021/ie0511175
– ident: ref45
  doi: 10.1016/j.ins.2020.06.074
– ident: ref36
  doi: 10.1038/s41467-019-12490-1
– ident: ref4
  doi: 10.1109/TCYB.2020.3025251
– ident: ref23
  doi: 10.1080/21642583.2022.2063203
– ident: ref21
  doi: 10.53941/ijndi0101003
– ident: ref29
  doi: 10.1016/j.inffus.2019.07.008
– ident: ref16
  doi: 10.1109/TAC.2020.2999020
– ident: ref1
  doi: 10.1109/TSMC.1985.6313399
– year: 2010
  ident: ref2
  publication-title: Analysis and Synthesis of Fuzzy Control Systems A Model-Based Approach
– year: 1985
  ident: ref11
  publication-title: Two-Dimensional Linear Systems
– ident: ref41
  doi: 10.1080/00207721.2022.2062802
– ident: ref3
  doi: 10.1109/TNNLS.2015.2411671
– ident: ref40
  doi: 10.1080/21642583.2022.2063202
– ident: ref12
  doi: 10.1109/CDC.2006.377239
– ident: ref57
  doi: 10.1080/00207721.2015.1084396
– ident: ref19
  doi: 10.1080/00207721.2021.1885082
SSID ssj0014518
Score 2.490158
Snippet In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded...
In this article, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Cyberattack
deception attacks
Dynamic stability
Error analysis
estimation fusion
Fuzzy systems
multiple sensor arrays
Nonlinear systems
Random variables
Security
Sensor arrays
Spatial data
Stability analysis
State estimation
Takagi-Sugeno fuzzy model
Takagi-Sugeno model
Two dimensional displays
Two-dimensional systems
Title Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems with Multiple Sensor Arrays Subject to Deception Attacks
URI https://ieeexplore.ieee.org/document/10083209
https://www.proquest.com/docview/2873588622
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3BTtwwELVaTu2hFErVLRT50FvlYMeOkxxXwAohsRdYCXGJYmdyabVbLdkDK_HvnbEdRFu14hZLHsvKjO0Ze94bxr6Wsmxz2SuhTOGEsbIXRLslSq9dnXeyLHsCJ1_N7cXCXN4WtwmsHrAwABCSzyCjz_CW3638hq7KToiIRucE13uNkVsEaz09GZhCRdyb1cKW0o4IGVmf3MwWd3cZFQrP0FtBD77-7RQKZVX-2ovDATPbZfNxajGv5Hu2GVzmt3-wNr547u_Zu-Rq8mm0jT32Cpb7bHcs48DTqt5nb59xEn5gj9epop0g66H_Dh2fbbbbBz6PKePYDi4qP8ftISIfObq-PBdnPBGgc7re5VcpWZFfY6yMHabrdftwz3GvossfPqz4GaSsGj4dBkL7H7DF7Pzm9EKkGg3CayMHYbwtAOqqJQrICmM_r7Troex866AHiyaCq7zPbeFUDtZWurIAtuhr2TvTaf2R7SxXS_jEeOWMz1vnuw6HJsLcstIKBUHVBloFE6ZGnTU-EZhTHY0fTQhkZN0EPTek5ybpecK-Pcn8jPQd_-19QIp71jPqbMKORtto0hK_bzDU1EWFAWH--R9ih-wNjR5T_47YzrDewBd0YQZ3HEz3F7uB7ZY
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1BT9swFLYmdmA7jMGYKGPDh90mBzt2nORYDaqO0V5oJcQlip2XC6idSnqgEv99fraD2KYhbolkJ5bfs_3e8_u-R8jXnOd1ylvBhMoMU5q3DGm3WG6lKdOG53mL4OTJVI_n6vwqu4pgdY-FAQCffAYJPvq7_GZp1xgqO0EiGpkiXO91hmjcANd6vDRQmQjINy2ZzrnuMTK8PJmN5tfXCZYKT5y94mz48o9zyBdW-Wc39kfMaIdM-8GFzJKbZN2ZxG7-4m188ejfk3fR2KTDoB275BUs9shOX8iBxnW9R94-YSX8QB4uY007hvqDMw8NHa03m3s6DUnj7t0bqfTMbRAB-0id8UtTdkojBTrFAC-dxHRFeum8ZddguFrV93fU7VYY_qHdkp5CzKuhw65DvP8-mY_OZt_HLFZpYFYq3jFldQZQFjWSQBbO-7NCmhbyxtYGWtBOSdw6b1OdGZGC1oUsNIDO2pK3RjVSfiRbi-UCDggtjLJpbWzTuE8jZW5eSOE6gigV1AIGRPQyq2ykMMdKGreVd2V4WXk5VyjnKsp5QL499vkVCDyebb2PgnvSMshsQI563ajiIr-rnLMps8K5hOnhf7odk-3xbHJRXfyY_vxE3uCfQiLgEdnqVmv47AyaznzxavwbQKHw3g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security-Guaranteed+Fuzzy+Networked+State+Estimation+for+2-D+Systems+With+Multiple+Sensor+Arrays+Subject+to+Deception+Attacks&rft.jtitle=IEEE+transactions+on+fuzzy+systems&rft.au=Luo%2C+Yuqiang&rft.au=Wang%2C+Zidong&rft.au=Hu%2C+Jun&rft.au=Dong%2C+Hongli&rft.date=2023-10-01&rft.issn=1063-6706&rft.eissn=1941-0034&rft.volume=31&rft.issue=10&rft.spage=3624&rft.epage=3638&rft_id=info:doi/10.1109%2FTFUZZ.2023.3262609&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TFUZZ_2023_3262609
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6706&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6706&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6706&client=summon