Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems with Multiple Sensor Arrays Subject to Deception Attacks
In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is establishe...
Saved in:
Published in | IEEE transactions on fuzzy systems Vol. 31; no. 10; pp. 1 - 16 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.10.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1063-6706 1941-0034 |
DOI | 10.1109/TFUZZ.2023.3262609 |
Cover
Loading…
Abstract | In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the <inline-formula><tex-math notation="LaTeX">s</tex-math></inline-formula>th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm. |
---|---|
AbstractList | In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi-Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the <inline-formula><tex-math notation="LaTeX">s</tex-math></inline-formula>th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding <inline-formula><tex-math notation="LaTeX">(\varrho _{1},\varrho _{2},\varrho _{3},\rho _{s})</tex-math></inline-formula>-security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm. In this article, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering the structural specificity of the 2-D systems, the membership function in the Takagi–Sugeno fuzzy model is established to reflect the spatial information. Multiple sensor arrays are utilized to improve the observation diversity and overcome the measurement obstacle induced by geographical restrictions. The network-based deception attacks, occurring in a probabilistic fashion, are characterized by a set of Bernoulli distributed random variables. By resorting to the 2-D fuzzy blending and augmentation operations, the error dynamics of the [Formula Omitted]th 2-D fuzzy estimator is formulated and, subsequently, the globally asymptotical stability of the local error dynamics is studied in virtue of Lyapunov stability theory, fuzzy theory, and stochastic analysis technique. Then, sufficient conditions are derived to ensure the so-called [Formula Omitted]- security of the local error dynamics. Furthermore, the estimation fusion problem of the local fuzzy estimators is discussed and the corresponding [Formula Omitted]- security is also guaranteed. Finally, an illustrative example is provided to demonstrate the rationality and the effectiveness of the proposed state estimation algorithm. |
Author | Hu, Jun Luo, Yuqiang Yue, Dong Dong, Hongli Wang, Zidong |
Author_xml | – sequence: 1 givenname: Yuqiang orcidid: 0000-0002-5567-8025 surname: Luo fullname: Luo, Yuqiang organization: Shanghai Key Lab of Modern Optical System, Department of Control Science and Engineering, and the Informatization Office, University of Shanghai for Science and Technology, Shanghai, China – sequence: 2 givenname: Zidong orcidid: 0000-0002-9576-7401 surname: Wang fullname: Wang, Zidong organization: Department of Computer Science, Brunel University London, Uxbridge, Middlesex, United Kingdom – sequence: 3 givenname: Jun orcidid: 0000-0002-7852-5064 surname: Hu fullname: Hu, Jun organization: Department of Mathematics, Harbin University of Science and Technology, Harbin, China – sequence: 4 givenname: Hongli orcidid: 0000-0001-8531-6757 surname: Dong fullname: Dong, Hongli organization: Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing, China – sequence: 5 givenname: Dong orcidid: 0000-0001-7810-9338 surname: Yue fullname: Yue, Dong organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China |
BookMark | eNp9kElPwzAQhS1UJMryBxAHS5xTvCSuc6y6gcRyCL30EjnuRKRLUuyJqlTivxPaHhAHTjOjeW-e5rsknbIqgZBbznqcs_jhfTKbz3uCCdmTQgnF4jPS5XHIA8Zk2Gl7pmSg-kxdkEvvl4zxMOK6S74SsLUrsAmmtXGmRIAFndT7fUNfAXeVW7VzggaBjj0WG4NFVdK8clQEI5o0HmHj6a7AD_pSr7HYroEmUPpWMHDONJ4mdbYEixQrOgIL28OBAaKxK39NznOz9nBzqldkNhm_Dx-D57fp03DwHFgZMgxCqyKAWBvJpdAx71susxz6C2syyEFlYCPJc6GijAtQSkutAFSUxyzPwoWUV-T-eHfrqs8aPKbLqnZlG5kK3ZeR1kqIViWOKusq7x3k6da1H7sm5Sz9wZweMKc_mNMT5tak_5hsgQdK6Eyx_t96d7QWAPAri2kp2vU30hmPjw |
CODEN | IEFSEV |
CitedBy_id | crossref_primary_10_1109_TR_2024_3384063 crossref_primary_10_1080_00207721_2024_2304132 crossref_primary_10_1080_21642583_2024_2357796 crossref_primary_10_1007_s13042_024_02195_3 crossref_primary_10_1016_j_inffus_2025_102984 crossref_primary_10_1109_TSMC_2024_3370221 crossref_primary_10_1080_00207721_2024_2304665 crossref_primary_10_1109_TFUZZ_2024_3439570 crossref_primary_10_1109_TII_2024_3431022 crossref_primary_10_1007_s11432_023_3929_3 |
Cites_doi | 10.1109/TSMC.2019.2952539 10.1080/00207721.2022.2083256 10.1016/j.fss.2019.05.004 10.1016/j.ins.2020.08.034 10.53941/ijndi0101010 10.1109/TIM.2022.3201941 10.1109/TAC.2014.2366855 10.1080/00207721.2022.2053893 10.1016/j.isatra.2018.09.026 10.1080/21642583.2022.2031335 10.1080/21642583.2022.2048322 10.1016/j.neucom.2020.03.104 10.1109/TFUZZ.2022.3201282 10.1016/j.neucom.2018.12.002 10.1080/00207721.2022.2097332 10.1109/ACSSC.2010.5757508 10.1115/1.4000659 10.1016/j.inffus.2011.08.001 10.1109/TSP.2017.2686375 10.1137/1.9781611970777 10.53941/ijndi0101008 10.1080/00207721.2022.2143735 10.1109/TCYB.2016.2514846 10.1016/j.automatica.2020.108813 10.1109/9.28018 10.1109/TCYB.2019.2902520 10.1109/TPAMI.2021.3132503 10.1109/TSMC.2017.2788503 10.1049/iet-cta.2020.0590 10.1007/s11045-020-00715-2 10.1117/12.614726 10.1002/oca.2626 10.1002/rnc.3623 10.1016/j.automatica.2017.12.038 10.1016/j.fss.2012.04.002 10.1109/9.618250 10.1109/TIT.2003.815774 10.1109/TSP.2017.2770102 10.1109/TCSII.2021.3073724 10.1109/TMECH.2016.2620987 10.1109/TKDE.2020.3033324 10.1021/ie0511175 10.1016/j.ins.2020.06.074 10.1038/s41467-019-12490-1 10.1109/TCYB.2020.3025251 10.1080/21642583.2022.2063203 10.53941/ijndi0101003 10.1016/j.inffus.2019.07.008 10.1109/TAC.2020.2999020 10.1109/TSMC.1985.6313399 10.1080/00207721.2022.2062802 10.1109/TNNLS.2015.2411671 10.1080/21642583.2022.2063202 10.1109/CDC.2006.377239 10.1080/00207721.2015.1084396 10.1080/00207721.2021.1885082 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TFUZZ.2023.3262609 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1941-0034 |
EndPage | 16 |
ExternalDocumentID | 10_1109_TFUZZ_2023_3262609 10083209 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61903254; 61933007; U21A2019; 12171124 – fundername: Hainan Province Science and Technology Special Fund of China grantid: ZDYF2022SHFZ105 – fundername: Natural Science Foundation of Heilongjiang Province of China grantid: ZD2022F003 – fundername: Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany |
GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS TAE TN5 5VS AAYOK AAYXX AETIX AGSQL AI. AIBXA ALLEH CITATION EJD H~9 ICLAB IFJZH RIG VH1 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c340t-4c65ee98a31328917c13bfe7dcabefe6bec531f265b12e668386ee65f90fb4d33 |
IEDL.DBID | RIE |
ISSN | 1063-6706 |
IngestDate | Sun Jun 29 12:54:11 EDT 2025 Thu Apr 24 22:52:36 EDT 2025 Tue Jul 01 01:55:36 EDT 2025 Wed Aug 27 02:21:29 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c340t-4c65ee98a31328917c13bfe7dcabefe6bec531f265b12e668386ee65f90fb4d33 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-8531-6757 0000-0002-5567-8025 0000-0002-9576-7401 0000-0002-7852-5064 0000-0001-7810-9338 |
OpenAccessLink | http://bura.brunel.ac.uk/bitstream/2438/26731/3/FullText.pdf |
PQID | 2873588622 |
PQPubID | 85428 |
PageCount | 16 |
ParticipantIDs | ieee_primary_10083209 proquest_journals_2873588622 crossref_primary_10_1109_TFUZZ_2023_3262609 crossref_citationtrail_10_1109_TFUZZ_2023_3262609 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-10-01 |
PublicationDateYYYYMMDD | 2023-10-01 |
PublicationDate_xml | – month: 10 year: 2023 text: 2023-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on fuzzy systems |
PublicationTitleAbbrev | TFUZZ |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref57 ref12 ref56 ref15 ref59 ref14 ref58 ref53 ref52 ref55 ref10 ref54 ref17 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 waltz (ref27) 1986 feng (ref2) 2010 ref49 kaczorek (ref11) 1985 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref29 |
References_xml | – ident: ref49 doi: 10.1109/TSMC.2019.2952539 – ident: ref22 doi: 10.1080/00207721.2022.2083256 – ident: ref51 doi: 10.1016/j.fss.2019.05.004 – ident: ref13 doi: 10.1016/j.ins.2020.08.034 – ident: ref5 doi: 10.53941/ijndi0101010 – ident: ref56 doi: 10.1109/TIM.2022.3201941 – ident: ref18 doi: 10.1109/TAC.2014.2366855 – ident: ref48 doi: 10.1080/00207721.2022.2053893 – year: 1986 ident: ref27 publication-title: Data Fusion for C3I A Tutorial in Command Control Communications Intelligence (C3I) Handbook – ident: ref52 doi: 10.1016/j.isatra.2018.09.026 – ident: ref35 doi: 10.1080/21642583.2022.2031335 – ident: ref44 doi: 10.1080/21642583.2022.2048322 – ident: ref20 doi: 10.1016/j.neucom.2020.03.104 – ident: ref55 doi: 10.1109/TFUZZ.2022.3201282 – ident: ref8 doi: 10.1016/j.neucom.2018.12.002 – ident: ref33 doi: 10.1080/00207721.2022.2097332 – ident: ref25 doi: 10.1109/ACSSC.2010.5757508 – ident: ref39 doi: 10.1115/1.4000659 – ident: ref28 doi: 10.1016/j.inffus.2011.08.001 – ident: ref30 doi: 10.1109/TSP.2017.2686375 – ident: ref50 doi: 10.1137/1.9781611970777 – ident: ref34 doi: 10.53941/ijndi0101008 – ident: ref47 doi: 10.1080/00207721.2022.2143735 – ident: ref42 doi: 10.1109/TCYB.2016.2514846 – ident: ref14 doi: 10.1016/j.automatica.2020.108813 – ident: ref58 doi: 10.1109/9.28018 – ident: ref9 doi: 10.1109/TCYB.2019.2902520 – ident: ref37 doi: 10.1109/TPAMI.2021.3132503 – ident: ref15 doi: 10.1109/TSMC.2017.2788503 – ident: ref53 doi: 10.1049/iet-cta.2020.0590 – ident: ref17 doi: 10.1007/s11045-020-00715-2 – ident: ref24 doi: 10.1117/12.614726 – ident: ref54 doi: 10.1002/oca.2626 – ident: ref43 doi: 10.1002/rnc.3623 – ident: ref32 doi: 10.1016/j.automatica.2017.12.038 – ident: ref59 doi: 10.1016/j.fss.2012.04.002 – ident: ref10 doi: 10.1109/9.618250 – ident: ref38 doi: 10.1109/TIT.2003.815774 – ident: ref31 doi: 10.1109/TSP.2017.2770102 – ident: ref46 doi: 10.1109/TCSII.2021.3073724 – ident: ref6 doi: 10.1109/TMECH.2016.2620987 – ident: ref7 doi: 10.1109/TKDE.2020.3033324 – ident: ref26 doi: 10.1021/ie0511175 – ident: ref45 doi: 10.1016/j.ins.2020.06.074 – ident: ref36 doi: 10.1038/s41467-019-12490-1 – ident: ref4 doi: 10.1109/TCYB.2020.3025251 – ident: ref23 doi: 10.1080/21642583.2022.2063203 – ident: ref21 doi: 10.53941/ijndi0101003 – ident: ref29 doi: 10.1016/j.inffus.2019.07.008 – ident: ref16 doi: 10.1109/TAC.2020.2999020 – ident: ref1 doi: 10.1109/TSMC.1985.6313399 – year: 2010 ident: ref2 publication-title: Analysis and Synthesis of Fuzzy Control Systems A Model-Based Approach – year: 1985 ident: ref11 publication-title: Two-Dimensional Linear Systems – ident: ref41 doi: 10.1080/00207721.2022.2062802 – ident: ref3 doi: 10.1109/TNNLS.2015.2411671 – ident: ref40 doi: 10.1080/21642583.2022.2063202 – ident: ref12 doi: 10.1109/CDC.2006.377239 – ident: ref57 doi: 10.1080/00207721.2015.1084396 – ident: ref19 doi: 10.1080/00207721.2021.1885082 |
SSID | ssj0014518 |
Score | 2.490158 |
Snippet | In this paper, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded... In this article, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Cyberattack deception attacks Dynamic stability Error analysis estimation fusion Fuzzy systems multiple sensor arrays Nonlinear systems Random variables Security Sensor arrays Spatial data Stability analysis State estimation Takagi-Sugeno fuzzy model Takagi-Sugeno model Two dimensional displays Two-dimensional systems |
Title | Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems with Multiple Sensor Arrays Subject to Deception Attacks |
URI | https://ieeexplore.ieee.org/document/10083209 https://www.proquest.com/docview/2873588622 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3BTtwwELVaTu2hFErVLRT50FvlYMeOkxxXwAohsRdYCXGJYmdyabVbLdkDK_HvnbEdRFu14hZLHsvKjO0Ze94bxr6Wsmxz2SuhTOGEsbIXRLslSq9dnXeyLHsCJ1_N7cXCXN4WtwmsHrAwABCSzyCjz_CW3638hq7KToiIRucE13uNkVsEaz09GZhCRdyb1cKW0o4IGVmf3MwWd3cZFQrP0FtBD77-7RQKZVX-2ovDATPbZfNxajGv5Hu2GVzmt3-wNr547u_Zu-Rq8mm0jT32Cpb7bHcs48DTqt5nb59xEn5gj9epop0g66H_Dh2fbbbbBz6PKePYDi4qP8ftISIfObq-PBdnPBGgc7re5VcpWZFfY6yMHabrdftwz3GvossfPqz4GaSsGj4dBkL7H7DF7Pzm9EKkGg3CayMHYbwtAOqqJQrICmM_r7Troex866AHiyaCq7zPbeFUDtZWurIAtuhr2TvTaf2R7SxXS_jEeOWMz1vnuw6HJsLcstIKBUHVBloFE6ZGnTU-EZhTHY0fTQhkZN0EPTek5ybpecK-Pcn8jPQd_-19QIp71jPqbMKORtto0hK_bzDU1EWFAWH--R9ih-wNjR5T_47YzrDewBd0YQZ3HEz3F7uB7ZY |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1BT9swFLYmdmA7jMGYKGPDh90mBzt2nORYDaqO0V5oJcQlip2XC6idSnqgEv99fraD2KYhbolkJ5bfs_3e8_u-R8jXnOd1ylvBhMoMU5q3DGm3WG6lKdOG53mL4OTJVI_n6vwqu4pgdY-FAQCffAYJPvq7_GZp1xgqO0EiGpkiXO91hmjcANd6vDRQmQjINy2ZzrnuMTK8PJmN5tfXCZYKT5y94mz48o9zyBdW-Wc39kfMaIdM-8GFzJKbZN2ZxG7-4m188ejfk3fR2KTDoB275BUs9shOX8iBxnW9R94-YSX8QB4uY007hvqDMw8NHa03m3s6DUnj7t0bqfTMbRAB-0id8UtTdkojBTrFAC-dxHRFeum8ZddguFrV93fU7VYY_qHdkp5CzKuhw65DvP8-mY_OZt_HLFZpYFYq3jFldQZQFjWSQBbO-7NCmhbyxtYGWtBOSdw6b1OdGZGC1oUsNIDO2pK3RjVSfiRbi-UCDggtjLJpbWzTuE8jZW5eSOE6gigV1AIGRPQyq2ykMMdKGreVd2V4WXk5VyjnKsp5QL499vkVCDyebb2PgnvSMshsQI563ajiIr-rnLMps8K5hOnhf7odk-3xbHJRXfyY_vxE3uCfQiLgEdnqVmv47AyaznzxavwbQKHw3g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security-Guaranteed+Fuzzy+Networked+State+Estimation+for+2-D+Systems+With+Multiple+Sensor+Arrays+Subject+to+Deception+Attacks&rft.jtitle=IEEE+transactions+on+fuzzy+systems&rft.au=Luo%2C+Yuqiang&rft.au=Wang%2C+Zidong&rft.au=Hu%2C+Jun&rft.au=Dong%2C+Hongli&rft.date=2023-10-01&rft.issn=1063-6706&rft.eissn=1941-0034&rft.volume=31&rft.issue=10&rft.spage=3624&rft.epage=3638&rft_id=info:doi/10.1109%2FTFUZZ.2023.3262609&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TFUZZ_2023_3262609 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6706&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6706&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6706&client=summon |