{"id":"https://openalex.org/W4368232964","doi":"https://doi.org/10.1109/jsyst.2023.3268710","title":"Adaptive Learning Security Control for Networked Switched Systems Subject to Resource Constraints and Attacks","display_name":"Adaptive Learning Security Control for Networked Switched Systems Subject to Resource Constraints and Attacks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4368232964","doi":"https://doi.org/10.1109/jsyst.2023.3268710"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2023.3268710","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/jsyst.2023.3268710","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091516793","display_name":"Yiwen Qi","orcid":"https://orcid.org/0000-0002-7113-7114"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiwen Qi","raw_affiliation_strings":["College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076722522","display_name":"Honglin Geng","orcid":"https://orcid.org/0000-0002-7794-0995"},"institutions":[{"id":"https://openalex.org/I125904092","display_name":"Shenyang Aerospace University","ror":"https://ror.org/02423gm04","country_code":"CN","type":"education","lineage":["https://openalex.org/I125904092"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Honglin Geng","raw_affiliation_strings":["School of Automation, Shenyang Aerospace University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Shenyang Aerospace University, Shenyang, China","institution_ids":["https://openalex.org/I125904092"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080980727","display_name":"Ning Xing","orcid":"https://orcid.org/0000-0002-8979-5561"},"institutions":[{"id":"https://openalex.org/I125904092","display_name":"Shenyang Aerospace University","ror":"https://ror.org/02423gm04","country_code":"CN","type":"education","lineage":["https://openalex.org/I125904092"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Xing","raw_affiliation_strings":["School of Automation, Shenyang Aerospace University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Shenyang Aerospace University, Shenyang, China","institution_ids":["https://openalex.org/I125904092"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091516793"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":0.6061,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70037339,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12794","display_name":"Adaptive Dynamic Programming Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12794","display_name":"Adaptive Dynamic Programming Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10675","display_name":"Mechanical Circulatory Support Devices","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10040","display_name":"Adaptive Control of Nonlinear Systems","score":0.947700023651123,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7880078554153442},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821770668029785},{"id":"https://openalex.org/keywords/dynamic-programming","display_name":"Dynamic programming","score":0.5751203894615173},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.49788832664489746},{"id":"https://openalex.org/keywords/optimal-control","display_name":"Optimal control","score":0.4717367887496948},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4618699848651886},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4536950886249542},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45295557379722595},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.43792960047721863},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42054566740989685},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.37720993161201477},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.34732675552368164},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.333919882774353},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32600170373916626},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2027696967124939},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19386982917785645},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12470820546150208}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7880078554153442},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821770668029785},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.5751203894615173},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.49788832664489746},{"id":"https://openalex.org/C91575142","wikidata":"https://www.wikidata.org/wiki/Q1971426","display_name":"Optimal control","level":2,"score":0.4717367887496948},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4618699848651886},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4536950886249542},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45295557379722595},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.43792960047721863},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42054566740989685},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.37720993161201477},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.34732675552368164},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.333919882774353},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32600170373916626},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2027696967124939},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19386982917785645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12470820546150208},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2023.3268710","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/jsyst.2023.3268710","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1256911438","display_name":null,"funder_award_id":"61811530036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8932911009","display_name":null,"funder_award_id":"61873172","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2035018355","https://openalex.org/W2038341035","https://openalex.org/W2048687352","https://openalex.org/W2074642422","https://openalex.org/W2082289097","https://openalex.org/W2093831009","https://openalex.org/W2098035803","https://openalex.org/W2100409338","https://openalex.org/W2165726932","https://openalex.org/W2332672415","https://openalex.org/W2484646121","https://openalex.org/W2602572350","https://openalex.org/W2790119357","https://openalex.org/W2804418902","https://openalex.org/W2910238065","https://openalex.org/W2912326338","https://openalex.org/W2942517366","https://openalex.org/W2947209574","https://openalex.org/W2947661140","https://openalex.org/W2949510088","https://openalex.org/W2970156326","https://openalex.org/W2995984855","https://openalex.org/W3004068726","https://openalex.org/W3005803304","https://openalex.org/W3007859930","https://openalex.org/W3011563688","https://openalex.org/W3012221872","https://openalex.org/W3015586532","https://openalex.org/W3032958247","https://openalex.org/W3047907375","https://openalex.org/W3082437751","https://openalex.org/W3089132090","https://openalex.org/W3110927164","https://openalex.org/W3136023617","https://openalex.org/W3163501229","https://openalex.org/W3166041587","https://openalex.org/W3178584252","https://openalex.org/W3198785577","https://openalex.org/W4285082190","https://openalex.org/W4288057946","https://openalex.org/W4288064477","https://openalex.org/W4306157784"],"related_works":["https://openalex.org/W1932159282","https://openalex.org/W4285537323","https://openalex.org/W2379312070","https://openalex.org/W2136173754","https://openalex.org/W2110050003","https://openalex.org/W2953025626","https://openalex.org/W2499081552","https://openalex.org/W2366053282","https://openalex.org/W1653644965","https://openalex.org/W2128788708"],"abstract_inverted_index":{"We":[0],"employ":[1],"the":[2,15,47,63,73,92,95,112,124,127,133,150,154,172,175],"adaptive":[3],"dynamic":[4],"programming":[5],"(ADP)":[6],"approach":[7,37],"with":[8],"a":[9,20,101,165],"resilient":[10],"event-triggering":[11],"mechanism":[12],"to":[13,31,40,57,72,106,170],"handle":[14],"optimal":[16,113,117],"control":[17,114],"problems":[18],"for":[19,62,99],"switched":[21],"system,":[22],"which":[23,100],"is":[24,38,50,56,89,104,143,168],"constrained":[25],"by":[26],"network":[27,65],"resources":[28],"and":[29,76,85,116,140,158],"vulnerable":[30],"denial-of-service":[32],"(DoS)":[33],"attacks.":[34,78],"The":[35,79],"proposed":[36,176],"able":[39],"guarantee":[41],"satisfactory":[42],"system":[43,96,138,156],"performances":[44],"even":[45],"when":[46],"data":[48],"transmission":[49],"interrupted":[51],"intermittently.":[52],"A":[53],"key":[54],"step":[55],"develop":[58],"an":[59],"updating":[60],"method":[61],"neural":[64],"(NN)":[66],"weights":[67,142],"of":[68,81,94,126,137,174],"ADP":[69,129],"in":[70,149],"response":[71],"triggered":[74],"events":[75],"experienced":[77],"consideration":[80],"lowering":[82],"computational":[83],"cost":[84,102],"mitigating":[86],"attack":[87],"influences":[88],"integrated":[90],"into":[91],"design":[93],"switching":[97,118],"law":[98],"function":[103],"utilized":[105],"reduce":[107],"unnecessary":[108],"switching.":[109],"In":[110],"fact,":[111],"policy":[115,119],"can":[120],"be":[121],"obtained":[122],"as":[123],"outcome":[125],"converging":[128],"iterative":[130],"process.":[131],"Furthermore,":[132],"uniformly":[134],"ultimately":[135],"boundedness":[136],"state":[139],"NN":[141],"proven;":[144],"more":[145],"importantly,":[146],"we":[147],"illustrate":[148],"dynamical":[151],"processes,":[152],"how":[153],"event-triggering,":[155],"switching,":[157],"DoS":[159],"attacks":[160],"affect":[161],"one":[162],"another.":[163],"Finally,":[164],"numerical":[166],"example":[167],"provided":[169],"verify":[171],"effectiveness":[173],"method.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
