勾引 发表于 2025-3-25 03:21:39
http://reply.papertrans.cn/87/8637/863607/863607_21.pngWatemelon 发表于 2025-3-25 08:53:59
Book 2022ems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers巫婆 发表于 2025-3-25 13:39:03
http://reply.papertrans.cn/87/8637/863607/863607_23.pngFLOAT 发表于 2025-3-25 17:25:02
Optimal DoS Attack Scheduling for CPSsattacker’s perspective. For the system setup, the system designer utilizes multiple communication channels to transmit data to the remote estimator. In this way, the reliability of the cyber layer can be improved . The adversary attempts to attack these channels. Due to the limited energies, theBumptious 发表于 2025-3-25 22:42:17
http://reply.papertrans.cn/87/8637/863607/863607_25.png外星人 发表于 2025-3-26 02:22:52
http://reply.papertrans.cn/87/8637/863607/863607_26.png胆小懦夫 发表于 2025-3-26 07:47:52
Intelligent Control for Nonlinear Networked Control Systems due to the use of communication networks. Pade approximation method is followed to demonstrate how to separate network-induced delay from controller. At the end of this section, a clear description for FLSs is given.薄膜 发表于 2025-3-26 09:51:16
http://reply.papertrans.cn/87/8637/863607/863607_28.pngexpeditious 发表于 2025-3-26 12:43:03
http://reply.papertrans.cn/87/8637/863607/863607_29.pngCULP 发表于 2025-3-26 20:00:04
Zero-Sum Game Based Optimal Secure Controlear time-invariant discrete-time model with Gaussian noises. Assume the controller and the actuator are distributed and connected over communication network. The attacker can hijack the network and modify actuator readings to deteriorate the system performance. The controller (i.e., the defender) an