References
- An, L., & Yang, G.-H. (2018, January). Decentralized adaptive fuzzy secure control for nonlinear uncertain interconnected systems against intermittent DoS attacks. IEEE Transactions on Cybernetics, 49(3), 827–838. doi:https://doi.org/10.1109/TCYB.2017.2787740
- Ang, K. H., Chong, G., & Li, Y. (2005, July). PID control system analysis, design, and technology. IEEE Transactions on Control Systems Technology, 3(4), 559–576. doi: https://doi.org/10.1109/tcst.2005.847331
- Åström, K. J., Hägglund, T., Hang, C. C., & Ho, W. K. (1993, August). Automatic tuning and adaptation for PID controllers-a survey. Control Engineering Practice, 1(4), 699–714. https://doi.org/https://doi.org/10.1016/0967-0661(93)91394-C
- Bai, C.-Z., Pasqualetti, F., & Gupta, V. (2017, April). Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs. Automatica, 82, 251–260. https://doi.org/https://doi.org/10.1016/j.automatica.2017.04.047
- Basin, M. V., Ramírez, P. C. R., & Guerra-Avellaneda, F. (2018, February). Continuous fixed-time controller design for mechatronic systems with incomplete measurements. IEEE-ASME Transactions on Mechatronics, 23(1), 57–67. https://doi.org/https://doi.org/10.1109/TMECH.2017.2700459
- Basin, M. V., Yu, P., & Shtessel, Y. B. (2018, January). Hypersonic missile adaptive sliding mode control using finite- and fixed-time observers. IEEE Transactions on Industrial Electronics, 65(1), 930–941. https://doi.org/https://doi.org/10.1109/TIE.41
- Cetinkaya, A., Ishii, H., & Hayakawa, T. (2017, May). Networked control under random and malicious packet losses. IEEE Transactions on Automatic Control, 62(5), 2434–2449. https://doi.org/https://doi.org/10.1109/TAC.2016.2612818
- Chen, B., Ho, D. W. C., Hu, G., & Yu, L. (2018, June). Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks. IEEE Transactions on Cybernetics, 48(6), 1862–1876. https://doi.org/https://doi.org/10.1109/TCYB.2017.2716115
- Cui, Y., Liu, Y., Zhang, W., & Alsaadi, F. E. (2018, November). Sampled-based consensus for nonlinear multiagent systems with deception attacks: The decoupled method. IEEE Transactions on Systems, Man, and Cybernetics: Systems. https://doi.org/https://doi.org/10.1109/TSMC.2018.2876497
- Ding, D., Wang, Z., Han, Q.-L., & Wei, G. (2018, May). Security control for discrete-time stochastic nonlinear systems subject to deception attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 48(5), 779–789. https://doi.org/https://doi.org/10.1109/TSMC.2016.2616544
- Ding, D., Wang, Z., Han, Q.-L., & Wei, G. (2019, June). Neural-network-based output-feedback control under Round-Robin scheduling protocols. IEEE Transactions on Cybernetics, 49(6), 2372–2384. https://doi.org/https://doi.org/10.1109/TCYB.2018.2827037
- Ding, D., Wang, Z., Ho, D. W. C., & Wei, G. (2017a, April). Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica, 78, 231–240. https://doi.org/https://doi.org/10.1016/j.automatica.2016.12.026
- Ding, D., Wang, Z., Ho, D. W. C., & Wei, G. (2017b, August). Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks. IEEE Transactions on Cybernetics, 47(8), 1936–1947. https://doi.org/https://doi.org/10.1109/TCYB.2016.2582802
- Dong, H., Lam, J., & Gao, H. (2011, January). Distributed H∞ filtering for repeated scalar nonlinear systems with random packet losses in sensor networks. International Journal of Systems Science, 42(9), 1507–1519. https://doi.org/https://doi.org/10.1080/00207721.2010.550403
- Huang, C., Ho, D. W. C., & Lu, J. (2012, April). Partial-information-based distributed filtering in two-targets tracking sensor network. IEEE Transactions on Circuits and Systems I: Regular Papers, 59, 820–832. https://doi.org/https://doi.org/10.1109/TCSI.2011.2169912
- Jin, X., Haddad, W. M., & Yucelen, T. (2017, November). An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Transactions on Automatic Control, 62(11), 6058–6064. https://doi.org/https://doi.org/10.1109/TAC.2017.2652127
- Li, J., Dong, H., Wang, Z., Hou, N., & Alsaadi, F. E. (2019). On passivity and robust passivity for discrete-time stochastic neural networks with randomly occurring mixed time delays. Neural Computing and Applications, 31(1), 65–78. https://doi.org/https://doi.org/10.1007/s00521-017-2980-1
- Li, X., Han, F., Hou, N., Dong, H., & Liu, H. (2020, May). Set-membership filtering for piecewise linear systems with censored measurements under Round-Robin protocol. International Journal of Systems Science, 51(9), 1578–1588. https://doi.org/https://doi.org/10.1080/00207721.2020.1768453
- Li, Y., Shi, L., Cheng, P., Chen, J., & Quevedo, D. E. (2015, October). Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach. IEEE Transactions on Automatic Control, 60(10), 2831–2836. https://doi.org/https://doi.org/10.1109/TAC.2015.2461851
- Liang, J., Shen, B., Dong, H., & Lam, J. (2011, January). Robust distributed state estimation for sensor networks with multiple stochastic communication delays. International Journal of Systems Science, 42(9), 1459–1471. https://doi.org/https://doi.org/10.1080/00207721.2010.550402
- Lien, C. H. (2004, August). Robust observer-based control of systems with state perturbations via LMI approach. IEEE Transactions on Automatic Control, 49(8), 1365–1370. https://doi.org/https://doi.org/10.1109/TAC.2004.832660
- Mo, Y., Chabukswar, R., & Sinopoli, B. (2014, July). Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, 22(4), 1396–1407. https://doi.org/https://doi.org/10.1109/TCST.2013.2280899
- Mousavinejad, E., Yang, F., Han, Q.-L., & Vlacic, L. (2018, November). A novel cyber attack detection method in networked control systems. IEEE Transactions on Cybernetics, 48(11), 3254–3264. https://doi.org/https://doi.org/10.1109/TCYB.2018.2843358
- Peng, L., Shi, L., Cao, X., & Sun, C. (2018, July). Optimal attack energy allocation against remote state estimation. IEEE Transactions on Automatic Control, 63(7), 2199–2205. https://doi.org/https://doi.org/10.1109/TAC.9
- Rosinová, D., & Veselý, V. (2007). Robust PID decentralized controller design using LMI. International Journal of Computers Communications & Control, 2(2), 195–204. https://doi.org/https://doi.org/10.15837/ijccc.2007.2
- Silva, G. J., Datta, A., & Bhattacharyya, S. P. (2002, February). New results on the synthesis of PID controllers. IEEE Transactions on Automatic Control, 47(2), 241–252. https://doi.org/https://doi.org/10.1109/9.983352
- Soleymani, R., Nekoui, M. A., & Moarefianpour, A. (2020, January). Robust adaptive unknown input observer design for a class of disturbed systems. Systems Science and Control Engineering, 8(1), 249–257. https://doi.org/https://doi.org/10.1080/21642583.2020.1739578
- Takahashi, R. H. C., Peres, P. L. D., & Ferreira, P. A. V. (1997, October). Multiobjective H2/ H∞ guaranteed cost PID design. IEEE Control Systems Magazine, 17(5), 37–47. https://doi.org/https://doi.org/10.1109/37.621468
- Wang, D., Mu, C., He, H., & Liu, D. (2017, July). Event-driven adaptive robust control of nonlinear systems with uncertainties through NDP strategy. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(7), 1358–1370. https://doi.org/https://doi.org/10.1109/TSMC.2016.2592682
- Ying, H. (2000, April). Theory and application of a novel fuzzy PID controller using a simplified Takagi-Sugeno rule scheme. Information Sciences, 123(3), 281–293. https://doi.org/https://doi.org/10.1016/S0020-0255(99)00133-4
- Yuan, H., & Xia, Y. (2018). Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacks. IET Control Theory & Applications, 12(4), 515–523. https://doi.org/https://doi.org/10.1049/cth2.v12.4
- Zhang, M., & Lin, C. (2020). Secure state estimation for cyber physical systems with state delay and sparse sensor attacks. Systems Science and Control Engineering. https://doi.org/https://doi.org/10.1080/21642583.2020.1834465
- Zhang, D., Song, H., & Yu, L. (2017, August). Robust fuzzy-model-based filtering for nonlinear cyber-physical systems with multiple stochastic incomplete measurements. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(8), 1826–1838. https://doi.org/https://doi.org/10.1109/TSMC.2016.2551200
- Zhao, D., Wang, Z., Ding, D., Wei, G., & Alsaadi, F. E. (2018, April). PID output-feedback control under event-triggered protocol. International Journal of General Systems, 47(5), 432–445. https://doi.org/https://doi.org/10.1080/03081079.2018.1459596
- Zhao, D., Wang, Z., Ding, D., & Wei, G. (2020, June). H∞ PID control with fading measurements: The output-feedback case. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(6), 2170–2180. https://doi.org/https://doi.org/10.1109/TSMC.6221021
- Zhao, D., Wang, Z., Wei, G., & Han, Q.-L. (2020, October). A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica, 120, Article No. 109128, 13 pages. https://doi.org/https://doi.org/10.1016/j.automatica.2020.109128
- Zhao, L., & Yang, G.-H. (2020). Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks. Journal of the Franklin Institute, 357(6), 3419–3433. https://doi.org/https://doi.org/10.1016/j.jfranklin.2019.12.032
- Zhu, M., & Martínez, S. (2014, March). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808. https://doi.org/https://doi.org/10.1109/TAC.2013.2279896
- Zhuang, M., & Atherton, D. P. (1993, May). Automatic tuning of optimum PID controllers. IEE Proceedings D-Control Theory and Applications, 140(3), 216–224. https://doi.org/https://doi.org/10.1049/ip-d.1993.0030
- Zou, L., Wang, Z., Dong, H., & Han, Q.-L. (2020, November). Moving horizon estimation with multi-rate measurements and correlated noises. International Journal of Robust and Nonlinear Control, 30(17), 7429–7445. https://doi.org/https://doi.org/10.1002/rnc.v30.17
- Zou, L., Wang, Z., Han, Q.-L., & Zhou, D. (2019, December). Moving horizon estimation for networked time-delay systems under Round-Robin protocol. IEEE Transactions on Automatic Control, 64(12), 5191–5198. https://doi.org/https://doi.org/10.1109/TAC.9
- Zou, L., Wang, Z., & Zhou, D. (2020, October). Moving horizon estimation with non-uniform sampling under component-based dynamic event-triggered transmission. Automatica, 120. https://doi.org/https://doi.org/10.1109/TAC.2019.2910167