{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T06:10:12Z","timestamp":1729059012365},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973128","62006052"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515011520"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005015","name":"South China University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2022A1515110148","2023A1515012468"],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Automatica"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.automatica.2023.110977","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T21:51:03Z","timestamp":1678571463000},"page":"110977","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Neural network-based adaptive event-triggered control for cyber\u2013physical systems under resource constraints and hybrid cyberattacks"],"prefix":"10.1016","volume":"152","author":[{"given":"Xuhuan","family":"Xie","sequence":"first","affiliation":[]},{"given":"Yonggui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qinxue","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2021","series-title":"Bespoke security for resource constrained cyber-physical systems","author":"Arroyo","key":"10.1016\/j.automatica.2023.110977_b1"},{"year":"2010","series-title":"Wireless security in the home and office environment","author":"Barbeau","key":"10.1016\/j.automatica.2023.110977_b2"},{"year":"1994","series-title":"Linear matrix inequalities in system and control theory","author":"Boyd","key":"10.1016\/j.automatica.2023.110977_b3"},{"key":"10.1016\/j.automatica.2023.110977_b4","series-title":"Proc. 28th int. conf. on distributed computing systems workshops","first-page":"495","article-title":"Secure control: Towards survivable cyber-physical systems","author":"Cardenas","year":"2008"},{"issue":"10","key":"10.1016\/j.automatica.2023.110977_b5","doi-asserted-by":"crossref","first-page":"6246","DOI":"10.1109\/TSMC.2022.3143903","article-title":"Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks","volume":"52","author":"Chen","year":"2022","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"10","key":"10.1016\/j.automatica.2023.110977_b6","doi-asserted-by":"crossref","first-page":"6545","DOI":"10.1109\/TSMC.2022.3147228","article-title":"Nonstationary filtering for fuzzy Markov switching affine systems with quantization effects and deception attacks","volume":"52","author":"Cheng","year":"2022","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"11","key":"10.1016\/j.automatica.2023.110977_b7","doi-asserted-by":"crossref","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","article-title":"Input-to-state stabilizing control under denial-of-service","volume":"60","author":"De\u00a0Persis","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.1016\/j.automatica.2023.110977_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110172","article-title":"Resilient practical cooperative output regulation for MASs with unknown switching exosystem dynamics under DoS attacks","volume":"139","author":"Deng","year":"2022","journal-title":"Automatica"},{"key":"10.1016\/j.automatica.2023.110977_b9","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.automatica.2016.12.026","article-title":"Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks","volume":"78","author":"Ding","year":"2017","journal-title":"Automatica"},{"issue":"5","key":"10.1016\/j.automatica.2023.110977_b10","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/JAS.2022.105548","article-title":"A survey of cyber attacks on cyber physical systems: Recent advances and challenges","volume":"9","author":"Duo","year":"2022","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"10.1016\/j.automatica.2023.110977_b11","doi-asserted-by":"crossref","unstructured":"Fu,\u00a0L. (1996). Neural network approach to variable structure based adaptive tracking of SISO systems. In Proc. IEEE int. workshop variable struct. syst. - VSS\u201996 -, Tokyo, Japan (pp. 148\u2013153).","DOI":"10.1109\/VSS.1996.578593"},{"issue":"9","key":"10.1016\/j.automatica.2023.110977_b12","doi-asserted-by":"crossref","first-page":"3112","DOI":"10.1109\/TSMC.2020.3010825","article-title":"Dynamic event-triggered distributed coordination control and its applications: A survey of trends and techniques","volume":"50","author":"Ge","year":"2020","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"2","key":"10.1016\/j.automatica.2023.110977_b13","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TFUZZ.2020.2999779","article-title":"Affine transformed IT2 fuzzy event-triggered control under deception attacks","volume":"29","author":"Han","year":"2021","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"1","key":"10.1016\/j.automatica.2023.110977_b14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TFUZZ.2020.3033851","article-title":"Attack-resilient event-triggered fuzzy interval type-2 filter design for networked nonlinear systems under sporadic denial-of-service jamming attacks","volume":"30","author":"Hu","year":"2022","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"1","key":"10.1016\/j.automatica.2023.110977_b15","doi-asserted-by":"crossref","first-page":"4271","DOI":"10.1109\/TCYB.2018.2861834","article-title":"Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks","volume":"49","author":"Hu","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"6","key":"10.1016\/j.automatica.2023.110977_b16","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security\u2013A survey","volume":"4","author":"Humayed","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"10.1016\/j.automatica.2023.110977_b17","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/JSYST.2014.2322503","article-title":"Design techniques and applications of cyberphysical systems: A survey","volume":"9","author":"Khaitan","year":"2014","journal-title":"IEEE Systems Journal"},{"year":"2021","series-title":"Cyber-physical systems: Digital technologies and applications","author":"Kravets","key":"10.1016\/j.automatica.2023.110977_b18"},{"issue":"5","key":"10.1016\/j.automatica.2023.110977_b19","doi-asserted-by":"crossref","first-page":"2819","DOI":"10.1109\/TSMC.2021.3054794","article-title":"Stability, scalability, speedability, and string stability of connected vehicle systems","volume":"52","author":"Liu","year":"2022","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"10","key":"10.1016\/j.automatica.2023.110977_b20","doi-asserted-by":"crossref","first-page":"6162","DOI":"10.1109\/TITS.2020.2988401","article-title":"Internal stability and string stability of connected vehicle systems with time delays","volume":"22","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"10","key":"10.1016\/j.automatica.2023.110977_b21","doi-asserted-by":"crossref","first-page":"6544","DOI":"10.1109\/TSMC.2019.2963143","article-title":"Security control for T-S fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks","volume":"51","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"9","key":"10.1016\/j.automatica.2023.110977_b22","doi-asserted-by":"crossref","first-page":"4437","DOI":"10.1109\/TNNLS.2021.3057438","article-title":"Adaptive learning and sampled-control for nonlinear game systems using dynamic event-triggering strategy","volume":"33","author":"Mu","year":"2022","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"5","key":"10.1016\/j.automatica.2023.110977_b23","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1016\/j.automatica.2013.01.038","article-title":"Event-triggered communication and H\u221e control co-design for networked control systems","volume":"49","author":"Peng","year":"2013","journal-title":"Automatica"},{"issue":"2","key":"10.1016\/j.automatica.2023.110977_b24","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TIE.2017.2726965","article-title":"Adaptive event-triggering H\u221e load frequency control for network-based power systems","volume":"65","author":"Peng","year":"2017","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"11","key":"10.1016\/j.automatica.2023.110977_b25","doi-asserted-by":"crossref","first-page":"2152","DOI":"10.1109\/TFUZZ.2019.2895560","article-title":"Observer-based fuzzy adaptive event-triggered control for pure-feedback nonlinear systems with prescribed performance","volume":"27","author":"Qiu","year":"2019","journal-title":"IEEE Transactions on Fuzzy Systems"},{"year":"2015","series-title":"Cyber-physical systems: From theory to practice","author":"Rawat","key":"10.1016\/j.automatica.2023.110977_b26"},{"year":"2018","series-title":"Neural network control of nonlinear discrete-time systems","author":"Sarangapani","key":"10.1016\/j.automatica.2023.110977_b27"},{"issue":"5","key":"10.1016\/j.automatica.2023.110977_b28","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1109\/TAC.2008.2010999","article-title":"To zero or to hold control inputs with lossy links?","volume":"54","author":"Schenato","year":"2009","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"10","key":"10.1016\/j.automatica.2023.110977_b29","doi-asserted-by":"crossref","first-page":"4211","DOI":"10.1109\/TFUZZ.2022.3145816","article-title":"Adaptive event-triggered control of networked fuzzy PDE systems under hybrid cyber-attacks","volume":"30","author":"Song","year":"2022","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"2","key":"10.1016\/j.automatica.2023.110977_b30","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TAC.2020.2987307","article-title":"The vulnerability of cyber-physical system under stealthy attacks","volume":"66","author":"Sui","year":"2021","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"12","key":"10.1016\/j.automatica.2023.110977_b31","doi-asserted-by":"crossref","first-page":"5405","DOI":"10.1109\/TCSI.2020.3027678","article-title":"Decentralized adaptive event-triggered control for a class of uncertain systems with deception attacks and its application to electronic circuits","volume":"67","author":"Sun","year":"2020","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"6","key":"10.1016\/j.automatica.2023.110977_b32","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/TAC.2010.2045697","article-title":"Self-triggering under state-independent disturbances","volume":"55","author":"Wang","year":"2010","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"4","key":"10.1016\/j.automatica.2023.110977_b33","doi-asserted-by":"crossref","first-page":"1750","DOI":"10.1109\/TNNLS.2020.2991015","article-title":"Neural-network-based adaptive event-triggered consensus control of nonstrict-feedback nonlinear systems","volume":"32","author":"Wang","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"3","key":"10.1016\/j.automatica.2023.110977_b34","doi-asserted-by":"crossref","first-page":"2506","DOI":"10.1109\/TNSE.2021.3098258","article-title":"An improved protocol to consensus of delayed MASs with UNMS and aperiodic DoS cyber-attacks","volume":"8","author":"Wang","year":"2021","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"4","key":"10.1016\/j.automatica.2023.110977_b35","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1002\/rnc.4837","article-title":"Resilient control of networked control systems under deception attacks: a memory-event-triggered communication scheme","volume":"30","author":"Wang","year":"2020","journal-title":"International Journal of Robust and Nonlinear Control"},{"issue":"11","key":"10.1016\/j.automatica.2023.110977_b36","doi-asserted-by":"crossref","first-page":"2451","DOI":"10.1016\/j.jfranklin.2016.04.011","article-title":"Recent advances on filtering and control for cyber-physical systems under security and resource constraints","volume":"353","author":"Wang","year":"2016","journal-title":"Journal of the Franklin Institute"},{"issue":"1\u20132","key":"10.1016\/j.automatica.2023.110977_b37","first-page":"1","article-title":"Resilient control in cyber-physical systems: Countering uncertainty, constraints, and adversarial behavior","volume":"7","author":"Weerakkody","year":"2019","journal-title":"Foundations and Trends \u00aein Systems and Control"},{"issue":"18","key":"10.1016\/j.automatica.2023.110977_b38","doi-asserted-by":"crossref","first-page":"11760","DOI":"10.1016\/j.jfranklin.2019.09.013","article-title":"Adaptive event-triggered H\u221e fuzzy filtering for interval type-2 T\u2013S fuzzy-model-based networked control systems with asynchronously and imperfectly matched membership functions","volume":"356","author":"Xie","year":"2019","journal-title":"Journal of the Franklin Institute"},{"key":"10.1016\/j.automatica.2023.110977_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110188","article-title":"Fully distributed observer-based consensus protocol: Adaptive dynamic event-triggered schemes","volume":"139","author":"Xu","year":"2022","journal-title":"Automatica"},{"issue":"11","key":"10.1016\/j.automatica.2023.110977_b40","doi-asserted-by":"crossref","first-page":"4981","DOI":"10.1109\/TAC.2020.3004328","article-title":"Remote state estimation with stochastic event-triggered sensor schedule and packet drops","volume":"65","author":"Xu","year":"2020","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.1016\/j.automatica.2023.110977_b41","article-title":"Dynamic-memory event-triggered H\u221e load frequency control for reconstructed switched model of power systems under hybrid attacks","author":"Yang","year":"2022","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"11","key":"10.1016\/j.automatica.2023.110977_b42","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1016\/0005-1098(95)00078-B","article-title":"Feedback linearization using neural networks","volume":"31","author":"Ye\u015fildirek","year":"1995","journal-title":"Automatica"},{"issue":"12","key":"10.1016\/j.automatica.2023.110977_b43","doi-asserted-by":"crossref","first-page":"13800","DOI":"10.1109\/TCYB.2021.3125851","article-title":"Dynamic event-triggered output feedback control for networked systems subject to multiple cyber attacks","volume":"52","author":"Zha","year":"2021","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"1","key":"10.1016\/j.automatica.2023.110977_b44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JAS.2019.1911651","article-title":"Networked control systems: A survey of trends and techniques","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"1","key":"10.1016\/j.automatica.2023.110977_b45","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TII.2016.2607150","article-title":"An overview and deep investigation on sampled-data-based event-triggered control and filtering for networked systems","volume":"13","author":"Zhang","year":"2016","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"10.1016\/j.automatica.2023.110977_b46","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/JAS.2021.1004261","article-title":"Deep learning based attack detection for cyber-physical system cybersecurity: A survey","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"10.1016\/j.automatica.2023.110977_b47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.isatra.2021.01.036","article-title":"A survey on attack detection, estimation and control of industrial cyber\u2013physical systems","volume":"116","author":"Zhang","year":"2021","journal-title":"ISA Transactions"},{"key":"10.1016\/j.automatica.2023.110977_b48","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/TSIPN.2022.3163929","article-title":"Adaptive event-triggered quantized communication-based distributed estimation over sensor networks with semi-Markovian switching topologies","volume":"8","author":"Zhu","year":"2022","journal-title":"IEEE Transactions on Signal and Information Processing over Networks"},{"issue":"6","key":"10.1016\/j.automatica.2023.110977_b49","doi-asserted-by":"crossref","first-page":"3425","DOI":"10.1002\/rnc.5957","article-title":"An adaptive torus-event-based controller design for networked T-S fuzzy systems under deception attacks","volume":"32","author":"Zhu","year":"2022","journal-title":"International Journal of Robust and Nonlinear Control"}],"container-title":["Automatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109823001292?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109823001292?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T05:51:12Z","timestamp":1729057872000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0005109823001292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":49,"alternative-id":["S0005109823001292"],"URL":"https:\/\/doi.org\/10.1016\/j.automatica.2023.110977","relation":{},"ISSN":["0005-1098"],"issn-type":[{"type":"print","value":"0005-1098"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Neural network-based adaptive event-triggered control for cyber\u2013physical systems under resource constraints and hybrid cyberattacks","name":"articletitle","label":"Article Title"},{"value":"Automatica","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.automatica.2023.110977","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"110977"}}