Sampled-Data-Based Secure Synchronization Control for Chaotic Lur'e Systems Subject to Denial-of-Service Attacks
This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilien...
Saved in:
Published in | IEEE transaction on neural networks and learning systems Vol. 35; no. 4; pp. 1 - 13 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
United States
IEEE
01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilient sampled data control scheme consisting of a secure controller and communication protocol is designed by considering the attack signals and periodic sampling mechanism simultaneously. Then, a novel index, i.e., the maximum anti-attack ratio, is proposed to measure the secure level. On this basis, a multi-interval-dependent functional is established for the resulting closed-loop system model. The main feature of the developed functional lies in that it can fully use the information of resilient sampling intervals and DoS attacks. In combination with the convex combination method, discrete-time Lyapunov theory, and some inequality estimate techniques, two sufficient conditions are, respectively, derived to achieve sampled-data-based secure synchronization of drive-response systems against DoS attacks. Compared with the existing Lyapunov functionals, the advantages of the proposed multi-interval-dependent functional are analyzed in detail. Finally, a synchronization example and an application to secure communication are provided to display the effectiveness and validity of the obtained results. |
---|---|
AbstractList | This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilient sampled data control scheme consisting of a secure controller and communication protocol is designed by considering the attack signals and periodic sampling mechanism simultaneously. Then, a novel index, i.e., the maximum anti-attack ratio, is proposed to measure the secure level. On this basis, a multi-interval-dependent functional is established for the resulting closed-loop system model. The main feature of the developed functional lies in that it can fully use the information of resilient sampling intervals and DoS attacks. In combination with the convex combination method, discrete-time Lyapunov theory, and some inequality estimate techniques, two sufficient conditions are, respectively, derived to achieve sampled-data-based secure synchronization of drive-response systems against DoS attacks. Compared with the existing Lyapunov functionals, the advantages of the proposed multi-interval-dependent functional are analyzed in detail. Finally, a synchronization example and an application to secure communication are provided to display the effectiveness and validity of the obtained results. This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilient sampled data control scheme consisting of a secure controller and communication protocol is designed by considering the attack signals and periodic sampling mechanism simultaneously. Then, a novel index, i.e., the maximum anti-attack ratio, is proposed to measure the secure level. On this basis, a multi-interval-dependent functional is established for the resulting closed-loop system model. The main feature of the developed functional lies in that it can fully use the information of resilient sampling intervals and DoS attacks. In combination with the convex combination method, discrete-time Lyapunov theory, and some inequality estimate techniques, two sufficient conditions are, respectively, derived to achieve sampled-data-based secure synchronization of drive-response systems against DoS attacks. Compared with the existing Lyapunov functionals, the advantages of the proposed multi-interval-dependent functional are analyzed in detail. Finally, a synchronization example and an application to secure communication are provided to display the effectiveness and validity of the obtained results.This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained denial-of-service (DoS) attacks, which can block data packets' transmission in communication channels. To eliminate the adverse effects, a resilient sampled data control scheme consisting of a secure controller and communication protocol is designed by considering the attack signals and periodic sampling mechanism simultaneously. Then, a novel index, i.e., the maximum anti-attack ratio, is proposed to measure the secure level. On this basis, a multi-interval-dependent functional is established for the resulting closed-loop system model. The main feature of the developed functional lies in that it can fully use the information of resilient sampling intervals and DoS attacks. In combination with the convex combination method, discrete-time Lyapunov theory, and some inequality estimate techniques, two sufficient conditions are, respectively, derived to achieve sampled-data-based secure synchronization of drive-response systems against DoS attacks. Compared with the existing Lyapunov functionals, the advantages of the proposed multi-interval-dependent functional are analyzed in detail. Finally, a synchronization example and an application to secure communication are provided to display the effectiveness and validity of the obtained results. |
Author | Huang, Xia Shen, Hao Li, Yuxia Fan, Yingjie |
Author_xml | – sequence: 1 givenname: Yingjie orcidid: 0000-0001-9256-8450 surname: Fan fullname: Fan, Yingjie organization: College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao, China – sequence: 2 givenname: Xia orcidid: 0000-0002-4955-8318 surname: Huang fullname: Huang, Xia organization: College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao, China – sequence: 3 givenname: Yuxia orcidid: 0000-0002-6069-2630 surname: Li fullname: Li, Yuxia organization: College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao, China – sequence: 4 givenname: Hao orcidid: 0000-0001-7024-6573 surname: Shen fullname: Shen, Hao organization: College of Electrical and Information Engineering, Anhui University of Technology, Ma'anshan, China |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36094992$$D View this record in MEDLINE/PubMed |
BookMark | eNp9kc1u1DAUhS1URH_oC4CELLEomwz-yTj2skwLVBq1ixSJneXYN6qHJJ7aDlJ5-iadaRddcDe-i--7ss45RgdDGAChD5QsKCXq6-319bpeMMLYgjPCuWRv0BGjghWMS3nwsle_D9FpShsyjSBLUap36JALokql2BHa1qbfduCKC5NN8c0kcLgGO0bA9cNg72IY_D-TfRjwKgw5hg63IeLVnQnZW7we49lMpgx9wvXYbMBmnAO-gMGbrghtUUP86y3g85yN_ZPeo7et6RKc7t8T9Ov75e3qZ7G--XG1Ol8Xli9pLmhZtRZkRSsLIIkrnZMla8VStsS23BFhG6ccU45WTbVsqTLECOsaZW3DpOQn6Mvu7jaG-xFS1r1PFrrODBDGpFlFOSdSihn9_ArdhDEO0-80n5IVVEk-U5_21Nj04PQ2-t7EB_2c5QTIHWBjSClCq63PT9HlaHynKdFzc_qpOT03p_fNTSp7pT5f_6_0cSd5AHgRlJSVkoI_AgGlpEI |
CODEN | ITNNAL |
CitedBy_id | crossref_primary_10_1016_j_isatra_2025_01_031 crossref_primary_10_3934_era_2023284 crossref_primary_10_1109_TCSI_2023_3292478 |
Cites_doi | 10.1016/j.neunet.2013.10.002 10.1016/j.nahs.2016.11.006 10.1109/TSMC.2019.2895060 10.1109/TNNLS.2019.2904978 10.1109/tcyb.2021.3090398 10.1109/TSMC.2018.2884952 10.1016/j.amc.2021.126494 10.1109/TSMC.2017.2687944 10.1109/TCSII.2021.3124043 10.1109/TNNLS.2019.2963146 10.1016/j.nahs.2018.02.006 10.1016/j.jfranklin.2019.06.014 10.1007/978-1-4612-0039-0 10.1109/tfuzz.2021.3119114 10.1016/j.ins.2021.05.046 10.1109/TCSI.2020.2994547 10.1109/JAS.2020.1003297 10.1109/TCYB.2019.2903817 10.1109/tcsii.2018.2847282 10.1109/TSMC.2018.2850157 10.1016/j.automatica.2017.04.051 10.1016/j.jfranklin.2021.07.054 10.1109/TAC.2020.2972220 10.1007/s11431-020-1728-y 10.1109/TNNLS.2019.2896162 10.1109/TNNLS.2020.2969249 10.1016/j.automatica.2015.09.028 10.1016/j.neucom.2015.12.058 10.1109/TFUZZ.2020.3018509 10.1109/tsmc.2021.3063907 10.1016/j.amc.2020.125261 10.1109/TNNLS.2018.2890119 10.1109/TSMC.2017.2657779 10.1109/tnnls.2021.3105731 10.1109/tii.2021.3126644 10.1016/j.amc.2018.12.073 10.1109/TNNLS.2016.2607236 10.1109/TNNLS.2012.2236356 10.1109/tac.2021.3074848 10.1109/TNNLS.2019.2943548 10.1109/TSMC.2016.2616544 10.1109/CDC.2014.7040210 10.1109/TNNLS.2019.2920665 10.1109/TCYB.2018.2807587 10.1109/TCYB.2018.2877410 10.1007/s11071-017-3476-3 10.1109/tcsi.2021.3121555 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
DBID | 97E RIA RIE AAYXX CITATION NPM 7QF 7QO 7QP 7QQ 7QR 7SC 7SE 7SP 7SR 7TA 7TB 7TK 7U5 8BQ 8FD F28 FR3 H8D JG9 JQ2 KR7 L7M L~C L~D P64 7X8 |
DOI | 10.1109/TNNLS.2022.3203382 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef PubMed Aluminium Industry Abstracts Biotechnology Research Abstracts Calcium & Calcified Tissue Abstracts Ceramic Abstracts Chemoreception Abstracts Computer and Information Systems Abstracts Corrosion Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts Materials Business File Mechanical & Transportation Engineering Abstracts Neurosciences Abstracts Solid State and Superconductivity Abstracts METADEX Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Aerospace Database Materials Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Biotechnology and BioEngineering Abstracts MEDLINE - Academic |
DatabaseTitle | CrossRef PubMed Materials Research Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Materials Business File Aerospace Database Engineered Materials Abstracts Biotechnology Research Abstracts Chemoreception Abstracts Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Civil Engineering Abstracts Aluminium Industry Abstracts Electronics & Communications Abstracts Ceramic Abstracts Neurosciences Abstracts METADEX Biotechnology and BioEngineering Abstracts Computer and Information Systems Abstracts Professional Solid State and Superconductivity Abstracts Engineering Research Database Calcium & Calcified Tissue Abstracts Corrosion Abstracts MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic Materials Research Database PubMed |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2162-2388 |
EndPage | 13 |
ExternalDocumentID | 36094992 10_1109_TNNLS_2022_3203382 9887986 |
Genre | orig-research Journal Article |
GrantInformation_xml | – fundername: Taishan Scholar Project of Shandong Province of China – fundername: National Natural Science Foundation of China grantid: 62003794; 61973199; 62173214 funderid: 10.13039/501100001809 – fundername: Shandong Provincial Natural Science Foundation grantid: ZR2020QF050; ZR2021MF003 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK ACPRK AENEX AFRAH AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 MS~ O9- OCL PQQKQ RIA RIE RNS AAYXX AGSQL CITATION EJD RIG NPM 7QF 7QO 7QP 7QQ 7QR 7SC 7SE 7SP 7SR 7TA 7TB 7TK 7U5 8BQ 8FD F28 FR3 H8D JG9 JQ2 KR7 L7M L~C L~D P64 7X8 |
ID | FETCH-LOGICAL-c351t-147fce8717cee80d4dd842f658f0cf3d06cbd9d29d17b75f19a0a6cdb9ccb2883 |
IEDL.DBID | RIE |
ISSN | 2162-237X 2162-2388 |
IngestDate | Fri Jul 11 04:24:47 EDT 2025 Mon Jun 30 05:15:19 EDT 2025 Thu Jul 24 03:24:51 EDT 2025 Tue Jul 01 00:27:47 EDT 2025 Thu Apr 24 23:02:06 EDT 2025 Wed Aug 27 02:17:13 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c351t-147fce8717cee80d4dd842f658f0cf3d06cbd9d29d17b75f19a0a6cdb9ccb2883 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0001-7024-6573 0000-0001-9256-8450 0000-0002-4955-8318 0000-0002-6069-2630 |
PMID | 36094992 |
PQID | 3033619838 |
PQPubID | 85436 |
PageCount | 13 |
ParticipantIDs | pubmed_primary_36094992 crossref_citationtrail_10_1109_TNNLS_2022_3203382 crossref_primary_10_1109_TNNLS_2022_3203382 proquest_journals_3033619838 proquest_miscellaneous_2713308868 ieee_primary_9887986 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-01 |
PublicationDateYYYYMMDD | 2024-04-01 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States – name: Piscataway |
PublicationTitle | IEEE transaction on neural networks and learning systems |
PublicationTitleAbbrev | TNNLS |
PublicationTitleAlternate | IEEE Trans Neural Netw Learn Syst |
PublicationYear | 2024 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref46 ref23 ref45 ref26 ref25 ref47 ref20 ref42 ref41 ref22 ref44 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 Chua (ref48) 1992; 46 ref6 ref5 ref40 |
References_xml | – ident: ref47 doi: 10.1016/j.neunet.2013.10.002 – volume: 46 start-page: 250 issue: 3 year: 1992 ident: ref48 article-title: The genesis of Chua’s circuit publication-title: Int. J. Electron. Commun. – ident: ref14 doi: 10.1016/j.nahs.2016.11.006 – ident: ref32 doi: 10.1109/TSMC.2019.2895060 – ident: ref7 doi: 10.1109/TNNLS.2019.2904978 – ident: ref31 doi: 10.1109/tcyb.2021.3090398 – ident: ref34 doi: 10.1109/TSMC.2018.2884952 – ident: ref44 doi: 10.1016/j.amc.2021.126494 – ident: ref46 doi: 10.1109/TSMC.2017.2687944 – ident: ref17 doi: 10.1109/TCSII.2021.3124043 – ident: ref20 doi: 10.1109/TNNLS.2019.2963146 – ident: ref15 doi: 10.1016/j.nahs.2018.02.006 – ident: ref38 doi: 10.1016/j.jfranklin.2019.06.014 – ident: ref43 doi: 10.1007/978-1-4612-0039-0 – ident: ref19 doi: 10.1109/tfuzz.2021.3119114 – ident: ref27 doi: 10.1016/j.ins.2021.05.046 – ident: ref21 doi: 10.1109/TCSI.2020.2994547 – ident: ref33 doi: 10.1109/JAS.2020.1003297 – ident: ref41 doi: 10.1109/TCYB.2019.2903817 – ident: ref22 doi: 10.1109/tcsii.2018.2847282 – ident: ref28 doi: 10.1109/TSMC.2018.2850157 – ident: ref13 doi: 10.1016/j.automatica.2017.04.051 – ident: ref37 doi: 10.1016/j.jfranklin.2021.07.054 – ident: ref35 doi: 10.1109/TAC.2020.2972220 – ident: ref40 doi: 10.1007/s11431-020-1728-y – ident: ref25 doi: 10.1109/TNNLS.2019.2896162 – ident: ref24 doi: 10.1109/TNNLS.2020.2969249 – ident: ref6 doi: 10.1016/j.automatica.2015.09.028 – ident: ref11 doi: 10.1016/j.neucom.2015.12.058 – ident: ref18 doi: 10.1109/TFUZZ.2020.3018509 – ident: ref26 doi: 10.1109/tsmc.2021.3063907 – ident: ref16 doi: 10.1016/j.amc.2020.125261 – ident: ref39 doi: 10.1109/TNNLS.2018.2890119 – ident: ref10 doi: 10.1109/TSMC.2017.2657779 – ident: ref23 doi: 10.1109/tnnls.2021.3105731 – ident: ref29 doi: 10.1109/tii.2021.3126644 – ident: ref9 doi: 10.1016/j.amc.2018.12.073 – ident: ref45 doi: 10.1109/TNNLS.2016.2607236 – ident: ref1 doi: 10.1109/TNNLS.2012.2236356 – ident: ref12 doi: 10.1109/tac.2021.3074848 – ident: ref3 doi: 10.1109/TNNLS.2019.2943548 – ident: ref30 doi: 10.1109/TSMC.2016.2616544 – ident: ref36 doi: 10.1109/CDC.2014.7040210 – ident: ref42 doi: 10.1109/TNNLS.2019.2920665 – ident: ref2 doi: 10.1109/TCYB.2018.2807587 – ident: ref5 doi: 10.1109/TCYB.2018.2877410 – ident: ref8 doi: 10.1007/s11071-017-3476-3 – ident: ref4 doi: 10.1109/tcsi.2021.3121555 |
SSID | ssj0000605649 |
Score | 2.488571 |
Snippet | This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur'e systems subject to power-constrained... This article investigates the sampled-data-based secure synchronization control problem for chaotic Lur’e systems subject to power-constrained... |
SourceID | proquest pubmed crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 1 |
SubjectTerms | Chaotic communication Chaotic Lur’e systems Closed loop systems Closed loops Communication Control systems Data control Denial of service attacks denial-of-service (DoS) attacks Denial-of-service attack Feedback control Indexes multi-interval-dependent functional Packet transmission Protocols resilient sampled data control Sampling secure synchronization Synchronism Synchronization Wireless communication |
Title | Sampled-Data-Based Secure Synchronization Control for Chaotic Lur'e Systems Subject to Denial-of-Service Attacks |
URI | https://ieeexplore.ieee.org/document/9887986 https://www.ncbi.nlm.nih.gov/pubmed/36094992 https://www.proquest.com/docview/3033619838 https://www.proquest.com/docview/2713308868 |
Volume | 35 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4Bp15KC31sC5WRKvXQenFsrxMfYQGhiu5lQdpblPihSqAEQXJof33HjhOpVVtxi5KJ42jGnodnvgH4mOFtUbGaOlSvVCpXU-1yvCo0N5ozv7Axy3elLm_k181iswVfploY51xMPnPzcBnP8m1r-hAqO9a4InShtmEbHbehVmuKpzC0y1W0dnmmOOUi34w1MkwfX69WV2v0BjmfC87QLQtdbIRiAZqF_6aSYo-Vf5ubUe1c7MK3ccJDtsntvO_qufn5B5bjU__oBTxP9ic5GQTmJWy5Zg92x94OJC31fbhfVwE32NKzqqvoKeo6S2Js3pH1j8ZESN2hgpMsh2x3guYvWX6vWhyZXPUPnwJlhEMnuDuFcA_pWnIWkvvuaOtp2qXISdeFOv9XcHNxfr28pKk7AzVikXU0k7k3Dv2tHPVsway0tpDco0XjmfHCMmVqqy3XNsvrfOEzXbFKGVtrY-rQ4_g17DRt494CkQadsNwqWRsvpUYbSirJbMG9CAD1dgbZyKDSJOjy0EHjrowuDNNl5G8Z-Fsm_s7g8_TO_QDc8V_q_cCciTLxZQYHoxyUaW0_lqj0BbqdhShmcDQ9xlUZjlqqxrX9Y8mD748buEKaN4P8TGOPYvfu7998D89wZik76AB2uofeHaLh09UfosT_AuZa_Hk |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NbtQwEB6VcoBLCxTahQJGAnFA3jqO48QHDmWXakuXvexW2ltIbEdIVEnVTYTKs_AqvBtj50cCAbdK3KLEcRLn8_x5_A3AywBPhxnLqUX1SoW0OVU2xqNEca04KyLjs3wXcnYuPqyj9RZ8H_bCWGt98pkdu0O_lm8q3bhQ2ZHCGaES2aVQntnrr-igbd6eTvFvvuL85P1qMqNdDQGqwyioaSDiQlv0CmLUBgkzwphE8AL1bsF0ERomdW6U4coEcR5HRaAylkltcqV17irxYr-34DbaGRFvd4cNERyGnoD09jUPJKc8jNf9rhymjlaLxXyJ_ifn45AzdARd3ZxQMkcGw39Rgr6qy98NXK_oTnbhRz9EbX7Ll3FT52P97Tf2yP91DO_BTmdhk-N2StyHLVs-gN2-egXphNkeXC4zx4xs6DSrM_oOtbkhfvXBkuV1qT1pcLtHlUzafH6CBj6ZfM4q7JnMm6vXrqUnfCcof11Ai9QVmbr0xQtaFbSTw-S4rh2TwUM4v5HvfgTbZVXaAyBCo5sZGylyXQih0EoUUjCT8CJ0FPxmBEEPiFR35OyuRshF6p00plKPp9ThKe3wNII3wz2XLTXJP1vvOTAMLTscjOCwx13aSa9NimZNiI51EiYjeDFcRrnjFpOy0lbNJuUuuoEqSmKb_RavQ989zB__-ZnP4c5s9XGezk8XZ0_gLr5llwt1CNv1VWOfoplX58_8bCPw6aah-RNrs1yz |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Sampled-Data-Based+Secure+Synchronization+Control+for+Chaotic+Lur%E2%80%99e+Systems+Subject+to+Denial-of-Service+Attacks&rft.jtitle=IEEE+transaction+on+neural+networks+and+learning+systems&rft.au=Fan%2C+Yingjie&rft.au=Huang%2C+Xia&rft.au=Li%2C+Yuxia&rft.au=Shen%2C+Hao&rft.date=2024-04-01&rft.issn=2162-237X&rft.eissn=2162-2388&rft.volume=35&rft.issue=4&rft.spage=5332&rft.epage=5344&rft_id=info:doi/10.1109%2FTNNLS.2022.3203382&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNNLS_2022_3203382 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2162-237X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2162-237X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2162-237X&client=summon |