{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T10:10:13Z","timestamp":1740823813479,"version":"3.38.0"},"reference-count":33,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100012456","name":"national social science fund of china","doi-asserted-by":"publisher","award":["61773089"],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Transactions of the Institute of Measurement and Control"],"published-print":{"date-parts":[[2022,4]]},"abstract":" This paper is concerned with the event-triggered control (ETC) problem for switched systems in networked environments, which are suffered from denial-of-service (DoS) attack and deception attack. Considering that the packet in networked switched systems contains the sampled state and switching signal, DoS attack prevents the packet transmission to cause the zero input, while deception attack falsifies the packet to cause the asynchronous control input with nonlinear disturbance. First, the probabilistic characterization of invalid packet transmissions caused by two different attack models is constructed, namely the ratio of the number of packet transmissions suffering from network attacks to the total number of packet transmissions. Second, a suitable ETC scheme is designed to determine the next triggering instant, which guarantees that the value of Lyapunov function cannot exceed a given restriction and updates the control input at switching instant. After that, the average dwell time and control gains are designed to guarantee the almost sure asymptotic stability of such systems. Finally, a numerical simulation is given to verify the effectiveness of the theoretical results. <\/jats:p>","DOI":"10.1177\/01423312211050270","type":"journal-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T10:37:25Z","timestamp":1635417445000},"page":"1334-1343","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":15,"title":["Event-triggered control of networked switched systems under network attacks"],"prefix":"10.1177","volume":"44","author":[{"given":"Yuchen","family":"Han","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, P.R. China"},{"name":"School of Control Science and Engineering, Dalian University of Technology, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1033-3805","authenticated-orcid":false,"given":"Jie","family":"Lian","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, P.R. China"},{"name":"School of Control Science and Engineering, Dalian University of Technology, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2021,10,28]]},"reference":[{"key":"bibr1-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2014.6805982"},{"key":"bibr2-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"bibr3-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.09.007"},{"key":"bibr4-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2612818"},{"key":"bibr5-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.019"},{"key":"bibr6-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2019.03.005"},{"key":"bibr7-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416924"},{"key":"bibr8-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2616544"},{"key":"bibr9-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992702"},{"key":"bibr10-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3029165"},{"key":"bibr11-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1177\/0142331217740622"},{"key":"bibr12-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2705287"},{"key":"bibr13-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1177\/0142331219900757"},{"key":"bibr14-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.09.028"},{"key":"bibr15-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2903817"},{"key":"bibr16-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0017-8"},{"key":"bibr17-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.11.037"},{"key":"bibr18-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.12.006"},{"key":"bibr19-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2286898"},{"key":"bibr20-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2989773"},{"key":"bibr21-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2801284"},{"key":"bibr22-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2789186"},{"key":"bibr23-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0389-7"},{"key":"bibr24-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1177\/0142331217709528"},{"key":"bibr25-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.093"},{"key":"bibr26-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2016.1181226"},{"key":"bibr27-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2856819"},{"key":"bibr28-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2894984"},{"key":"bibr29-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.09.037"},{"key":"bibr30-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1177\/0142331220909655"},{"key":"bibr31-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.056"},{"key":"bibr32-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1177\/0142331217745353"},{"key":"bibr33-01423312211050270","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2018.10.043"}],"container-title":["Transactions of the Institute of Measurement and Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01423312211050270","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01423312211050270","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01423312211050270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T09:09:16Z","timestamp":1740820156000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01423312211050270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["10.1177\/01423312211050270"],"URL":"https:\/\/doi.org\/10.1177\/01423312211050270","relation":{},"ISSN":["0142-3312","1477-0369"],"issn-type":[{"type":"print","value":"0142-3312"},{"type":"electronic","value":"1477-0369"}],"subject":[],"published":{"date-parts":[[2021,10,28]]}}}