{"id":"https://openalex.org/W4312348603","doi":"https://doi.org/10.1109/tfuzz.2022.3229487","title":"Adaptive Decentralized Finite-Time Fuzzy Secure Control for Uncertain Nonlinear CPSs Under Deception Attacks","display_name":"Adaptive Decentralized Finite-Time Fuzzy Secure Control for Uncertain Nonlinear CPSs Under Deception Attacks","publication_year":2022,"publication_date":"2022-12-15","ids":{"openalex":"https://openalex.org/W4312348603","doi":"https://doi.org/10.1109/tfuzz.2022.3229487"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2022.3229487","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086483816","display_name":"Yannan Bi","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yannan Bi","raw_affiliation_strings":["Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061239630","display_name":"Tong Wang","orcid":"https://orcid.org/0000-0002-7252-1695"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Wang","raw_affiliation_strings":["Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050453488","display_name":"Jianbin Qiu","orcid":"https://orcid.org/0000-0001-7707-6159"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Qiu","raw_affiliation_strings":["Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100627530","display_name":"Min Li","orcid":"https://orcid.org/0000-0001-7927-6656"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Li","raw_affiliation_strings":["Beijing Institute of Control Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Control Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090124967","display_name":"Chunling Wei","orcid":"https://orcid.org/0000-0002-6448-2534"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunling Wei","raw_affiliation_strings":["Beijing Institute of Control Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Control Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100680541","display_name":"Li Yuan","orcid":"https://orcid.org/0000-0002-3987-5790"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Yuan","raw_affiliation_strings":["Beijing Institute of Control Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Control Engineering, Beijing, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.351,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.665406,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"31","issue":"8","first_page":"2568","last_page":"2580"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.7438869},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.58645463},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.57406294},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.5721808},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.5229312},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.51320195},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.48963243},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4894725},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.48349503},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.48065436},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.34797883},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20968816},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14959979},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14570245},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2022.3229487","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.51}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U21B6001"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62273121"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62173109"},{"funder":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province","award_id":"YQ2022F007"}],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W2003530067","https://openalex.org/W2109577142","https://openalex.org/W2115607130","https://openalex.org/W2129275525","https://openalex.org/W2158914121","https://openalex.org/W2342952057","https://openalex.org/W2492823850","https://openalex.org/W2572224102","https://openalex.org/W2762538584","https://openalex.org/W2783221532","https://openalex.org/W2792882341","https://openalex.org/W2885419454","https://openalex.org/W2900718115","https://openalex.org/W2924756513","https://openalex.org/W2955893219","https://openalex.org/W2963365386","https://openalex.org/W2973688650","https://openalex.org/W2981278581","https://openalex.org/W2984771622","https://openalex.org/W2995070254","https://openalex.org/W2995800690","https://openalex.org/W3014783125","https://openalex.org/W3041071398","https://openalex.org/W3043846937","https://openalex.org/W3047008857","https://openalex.org/W3092220132","https://openalex.org/W3093483185","https://openalex.org/W3094534394","https://openalex.org/W3138623967","https://openalex.org/W3155111211","https://openalex.org/W3155749896","https://openalex.org/W3166665528","https://openalex.org/W3207840248","https://openalex.org/W3210954297","https://openalex.org/W3216399076","https://openalex.org/W4206785520","https://openalex.org/W4229068424","https://openalex.org/W4312688468"],"related_works":["https://openalex.org/W4295295666","https://openalex.org/W2948663225","https://openalex.org/W2792368061","https://openalex.org/W2165717120","https://openalex.org/W2162992672","https://openalex.org/W2115512691","https://openalex.org/W2039390456","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W1978059949"],"abstract_inverted_index":{"This":[0],"article":[1],"addresses":[2],"the":[3,38,53,87,103,108,111,127,130],"adaptive":[4,25],"secure":[5,76,132],"control":[6,27,46,70,77,105,133],"problem":[7],"for":[8,29,81],"a":[9,23,61,73,91],"class":[10],"of":[11,32,40,110,129],"uncertain":[12],"nonlinear":[13],"large-scale":[14],"cyber-physical":[15],"systems":[16],"(CPSs)":[17],"subjected":[18],"to":[19,36,50,58,66,84,90,116,125],"deception":[20],"attacks.":[21],"Specifically,":[22],"novel":[24],"fuzzy":[26],"scheme":[28,78],"each":[30],"subsystem":[31],"CPSs":[33,83],"is":[34,64,79,99],"designed":[35,80],"mitigate":[37],"effects":[39],"cyberattacks":[41],"that":[42,101],"intentionally":[43],"tamper":[44],"with":[45,102],"signals":[47,55,109],"from":[48,56],"controllers":[49],"actuators":[51],"and":[52,60],"state":[54],"sensors":[57],"controllers,":[59],"Nussbaum":[62],"function":[63],"proposed":[65,104,131],"tackle":[67],"unknown":[68],"time-varying":[69],"directions.":[71],"Moreover,":[72],"finite-time":[74],"converging":[75],"compromised":[82],"guarantee":[85],"all":[86,107],"states":[88],"converge":[89],"predetermined":[92],"small":[93],"set":[94],"in":[95],"finite":[96],"time.":[97],"It":[98],"shown":[100],"scheme,":[106],"closed-loop":[112],"system":[113],"are":[114,123],"proved":[115],"be":[117],"semiglobally":[118],"bounded.":[119],"Two":[120],"simulation":[121],"examples":[122],"provided":[124],"illustrate":[126],"effectiveness":[128],"method.":[134]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4312348603","counts_by_year":[{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":6}],"updated_date":"2025-01-05T20:23:26.728699","created_date":"2023-01-04"}