{"id":"https://openalex.org/W4403863306","doi":"https://doi.org/10.1109/tase.2024.3484512","title":"Distributed Adaptive Consensus Control for Nonlinear Network Systems With Event-Based Switching Mechanism Against Malicious Attacks","display_name":"Distributed Adaptive Consensus Control for Nonlinear Network Systems With Event-Based Switching Mechanism Against Malicious Attacks","publication_year":2024,"publication_date":"2024-10-29","ids":{"openalex":"https://openalex.org/W4403863306","doi":"https://doi.org/10.1109/tase.2024.3484512"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2024.3484512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2024.3484512","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053663084","display_name":"Zhen Han","orcid":"https://orcid.org/0000-0001-8450-9100"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Han","raw_affiliation_strings":["Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210145005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101378863","display_name":"Yue Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhou","raw_affiliation_strings":["Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210145005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021078987","display_name":"Yutong Jiang","orcid":"https://orcid.org/0000-0003-2538-9422"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yutong Jiang","raw_affiliation_strings":["Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210145005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101796044","display_name":"Ke Bao","orcid":"https://orcid.org/0000-0002-5061-1518"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Bao","raw_affiliation_strings":["Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210145005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083805375","display_name":"Wenbin Yue","orcid":"https://orcid.org/0000-0003-2510-0190"},"institutions":[{"id":"https://openalex.org/I4210145005","display_name":"State Key Laboratory of Vehicle NVH and Safety Technology","ror":"https://ror.org/04e6h1p91","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210145005"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbin Yue","raw_affiliation_strings":["Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Scholartree Ridge State Key Laboratory, China North Vehicle Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210145005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053663084"],"corresponding_institution_ids":["https://openalex.org/I4210145005"],"apc_list":null,"apc_paid":null,"fwci":0.6868,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72862751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"22","issue":null,"first_page":"8329","last_page":"8340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6225859522819519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.619131326675415},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.5457547903060913},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4844051003456116},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45197224617004395},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4461541771888733},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.421953022480011},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41529202461242676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.391741544008255},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.25065457820892334},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0974222719669342}],"concepts":[{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6225859522819519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.619131326675415},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.5457547903060913},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4844051003456116},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45197224617004395},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4461541771888733},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.421953022480011},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41529202461242676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.391741544008255},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.25065457820892334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0974222719669342},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tase.2024.3484512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2024.3484512","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4132050132","display_name":null,"funder_award_id":"JCKY2022208A003","funder_id":"https://openalex.org/F4320337495","funder_display_name":"Technology Development"}],"funders":[{"id":"https://openalex.org/F4320337495","display_name":"Technology Development","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W4009483","https://openalex.org/W1980491877","https://openalex.org/W2000806524","https://openalex.org/W2068740779","https://openalex.org/W2167040191","https://openalex.org/W2320478320","https://openalex.org/W2337446187","https://openalex.org/W2620963101","https://openalex.org/W2795714409","https://openalex.org/W2901810865","https://openalex.org/W2973688650","https://openalex.org/W2982599638","https://openalex.org/W2998763528","https://openalex.org/W2999262688","https://openalex.org/W3004103088","https://openalex.org/W3004740639","https://openalex.org/W3022439926","https://openalex.org/W3047194659","https://openalex.org/W3092049558","https://openalex.org/W3094534394","https://openalex.org/W3101479266","https://openalex.org/W3134002281","https://openalex.org/W3184880618","https://openalex.org/W3184943192","https://openalex.org/W3214827861","https://openalex.org/W4206149993","https://openalex.org/W4206843821","https://openalex.org/W4285130884","https://openalex.org/W4285155398","https://openalex.org/W4286579125","https://openalex.org/W4311922055","https://openalex.org/W4317496740","https://openalex.org/W4319998072","https://openalex.org/W4322576828","https://openalex.org/W4361301288","https://openalex.org/W4365451933","https://openalex.org/W4381198781","https://openalex.org/W4394805013","https://openalex.org/W4396542339","https://openalex.org/W4396817527"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W3046732854"],"abstract_inverted_index":{"In":[0,191,337,394],"this":[1,112,323,339],"paper,":[2],"the":[3,38,54,107,130,164,167,178,192,194,208,213,218,225,230,284,290,304,308,330,348,358,391,395,426],"distributed":[4,135,251,341],"adaptive":[5,131,136,252,342],"consensus":[6,144,180,219,253,359,378,392,427],"control":[7,137,169,181,235,254,343,374],"problem":[8,113,182],"for":[9,67,183,404],"nonlinear":[10,184,411],"network":[11,185],"systems":[12,186],"with":[13,279,333],"unmatched":[14],"unknown":[15,410],"parameters":[16,375],"is":[17,51,65,97,123,139,175,240,256,277],"investigated.":[18],"The":[19,273],"communication":[20,62,72,91,156,189,210],"channels":[21,80],"among":[22],"subsystems":[23,35,68],"are":[24,146,160,388],"directed":[25],"and":[26,89,114,154,228,268,319,353,361,409,424],"suffer":[27],"from":[28,53],"malicious":[29,87,155,188,205,238,260,351,430],"attacks.":[30,157,190,206,431],"Besides,":[31],"only":[32],"part":[33],"of":[34,45,56,166,234,307,314,350],"can":[36,81,293,316,325,345,367,416],"access":[37],"reference":[39],"states.":[40],"To":[41,110],"depict":[42],"different":[43,312],"kinds":[44,313],"attacks,":[46,261],"a":[47,99,119,134,242,269,300],"unified":[48,301],"attack":[49,76,117,239,302],"model":[50],"established":[52],"viewpoint":[55],"attacked":[57],"subsystems.":[58],"Then,":[59,133],"an":[60,249,264],"event-based":[61,265],"switching":[63,90,152,226,266,275,285,291,335],"mechanism":[64,267,276],"proposed":[66,140,168,257,340],"to":[69,102,141,162,172,203,223,258,282,329,376,381,419],"establish":[70],"new":[71],"channels,":[73],"such":[74,288,364],"that":[75,86,143,289,365],"effects":[77,349],"on":[78,357,371],"these":[79,247],"be":[82,294,317,327,417],"mitigated":[83],"actively.":[84],"Noting":[85],"attacks":[88,315,352],"make":[92],"transmitted":[93],"states":[94,356],"discrete,":[95],"it":[96],"also":[98,326],"tough":[100,243],"issue":[101],"design":[103],"controllers":[104,408],"by":[105,125,177,212,246],"adopt":[106],"backstepping":[108],"technique.":[109],"handle":[111],"mitigate":[115],"residual":[116],"effects,":[118],"continuous":[120],"virtual":[121],"controller":[122,310,324,362],"designed":[124,278],"introducing":[126,299],"normalization":[127],"terms":[128],"in":[129,390],"laws.":[132],"scheme":[138,255,344],"guarantee":[142],"errors":[145],"globally":[147],"uniformly":[148],"bounded":[149,386,422],"under":[150,187,429],"arbitrary":[151,334],"dwell-time":[153],"Experimental":[158],"results":[159],"provided":[161],"validate":[163],"effectiveness":[165],"scheme.":[170],"Note":[171],"Practitioners\u2014This":[173],"paper":[174],"motivated":[176],"secure":[179,271,309,407],"practice,":[193],"Frequency-Hopping":[195],"Spread":[196],"Spectrum":[197],"(FHSS)":[198],"technique":[199,215],"has":[200],"been":[201],"used":[202],"defend":[204,259],"However,":[207,380],"switched":[209,331,354,406],"induced":[211],"FHSS":[214],"may":[216],"destroy":[217],"performance.":[220,379,393],"Moreover,":[221,322],"how":[222],"economize":[224],"resource":[227],"improve":[229,425],"active":[231,250],"defense":[232],"ability":[233,306],"schemes":[236],"against":[237,311],"still":[241],"issue.":[244],"Motivated":[245],"points,":[248],"which":[262],"contains":[263],"novel":[270],"controller.":[272],"event-triggered":[274],"attack-sensitive":[280,400],"functions":[281,412],"determine":[283],"time":[286],"instants,":[287],"resources":[292],"utilized":[295],"more":[296,369,398],"efficiently.":[297],"By":[298],"model,":[303],"attack-defense":[305],"improved":[318],"analyzed":[320],"mathematically.":[321],"applied":[328],"topologies":[332],"dwell-time.":[336],"conclusion,":[338],"greatly":[346],"reduce":[347],"piecewise":[355],"performance":[360,428],"design,":[363],"engineers":[366],"pay":[368],"focuses":[370],"selecting":[372],"suitable":[373],"adjust":[377],"enable":[382],"above":[383,421],"advantages,":[384],"some":[385],"biases":[387,423],"involved":[389],"future":[396],"work,":[397],"accuracy":[399],"functions,":[401],"optimization":[402],"algorithms":[403],"parameters,":[405],"satisfying":[413],"Lipschitz":[414],"condition":[415],"considered":[418],"decrease":[420]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
