{"id":"https://openalex.org/W4390204366","doi":"https://doi.org/10.1109/tcst.2023.3342132","title":"Secure Control of Networked Inverted Pendulum Visual Servo System With Adverse Effects of Image Computation","display_name":"Secure Control of Networked Inverted Pendulum Visual Servo System With Adverse Effects of Image Computation","publication_year":2023,"publication_date":"2023-12-25","ids":{"openalex":"https://openalex.org/W4390204366","doi":"https://doi.org/10.1109/tcst.2023.3342132"},"language":"en","primary_location":{"id":"doi:10.1109/tcst.2023.3342132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcst.2023.3342132","pdf_url":null,"source":{"id":"https://openalex.org/S133363738","display_name":"IEEE Transactions on Control Systems Technology","issn_l":"1063-6536","issn":["1063-6536","1558-0865","2374-0159"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control Systems Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Secure_Control_of_Networked_Inverted_Pendulum_Visual_Servo_System_with_Adverse_Effects_of_Image_Computation/24653964","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100735340","display_name":"Dajun Du","orcid":"https://orcid.org/0000-0003-2979-1507"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dajun Du","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018162700","display_name":"Changda Zhang","orcid":"https://orcid.org/0000-0002-1948-6691"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changda Zhang","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070831901","display_name":"Qianjiang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianjiang Lu","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051175363","display_name":"Minrui Fei","orcid":"https://orcid.org/0000-0002-7804-077X"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minrui Fei","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066119228","display_name":"Huiyu Zhou","orcid":"https://orcid.org/0000-0003-1634-9840"},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Huiyu Zhou","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Leicester, Leicester, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Leicester, Leicester, U.K","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100735340"],"corresponding_institution_ids":["https://openalex.org/I113940042"],"apc_list":null,"apc_paid":null,"fwci":0.2765,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60775736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"32","issue":"3","first_page":"1074","last_page":"1081"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11328","display_name":"Ocular Oncology and Treatments","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/2731","display_name":"Ophthalmology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11328","display_name":"Ocular Oncology and Treatments","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/2731","display_name":"Ophthalmology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11377","display_name":"Retinal and Macular Surgery","score":0.9675999879837036,"subfield":{"id":"https://openalex.org/subfields/2741","display_name":"Radiology, Nuclear Medicine and Imaging"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11600","display_name":"Brain Metastases and Treatment","score":0.9559999704360962,"subfield":{"id":"https://openalex.org/subfields/2740","display_name":"Pulmonary and Respiratory Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8684154152870178},{"id":"https://openalex.org/keywords/inverted-pendulum","display_name":"Inverted pendulum","score":0.679750919342041},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6526716947555542},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5858170390129089},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5750311017036438},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5157399773597717},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.4464362859725952},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.424804151058197},{"id":"https://openalex.org/keywords/servo-control","display_name":"Servo control","score":0.4188547730445862},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.41593849658966064},{"id":"https://openalex.org/keywords/servomechanism","display_name":"Servomechanism","score":0.41541406512260437},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4084670841693878},{"id":"https://openalex.org/keywords/servo","display_name":"Servo","score":0.3896218240261078},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38170695304870605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37030988931655884},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24813899397850037},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.23932194709777832},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.20918557047843933},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18974429368972778},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.16068100929260254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14251789450645447},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.12813466787338257}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8684154152870178},{"id":"https://openalex.org/C192921069","wikidata":"https://www.wikidata.org/wiki/Q550134","display_name":"Inverted pendulum","level":3,"score":0.679750919342041},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6526716947555542},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5858170390129089},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5750311017036438},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5157399773597717},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.4464362859725952},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.424804151058197},{"id":"https://openalex.org/C32731416","wikidata":"https://www.wikidata.org/wiki/Q7455930","display_name":"Servo control","level":3,"score":0.4188547730445862},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.41593849658966064},{"id":"https://openalex.org/C49503481","wikidata":"https://www.wikidata.org/wiki/Q640815","display_name":"Servomechanism","level":2,"score":0.41541406512260437},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4084670841693878},{"id":"https://openalex.org/C107354338","wikidata":"https://www.wikidata.org/wiki/Q1937153","display_name":"Servo","level":2,"score":0.3896218240261078},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38170695304870605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37030988931655884},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24813899397850037},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.23932194709777832},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.20918557047843933},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18974429368972778},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.16068100929260254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14251789450645447},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.12813466787338257},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcst.2023.3342132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcst.2023.3342132","pdf_url":null,"source":{"id":"https://openalex.org/S133363738","display_name":"IEEE Transactions on Control Systems Technology","issn_l":"1063-6536","issn":["1063-6536","1558-0865","2374-0159"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control Systems Technology","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/24653964","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Secure_Control_of_Networked_Inverted_Pendulum_Visual_Servo_System_with_Adverse_Effects_of_Image_Computation/24653964","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/24653964","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Secure_Control_of_Networked_Inverted_Pendulum_Visual_Servo_System_with_Adverse_Effects_of_Image_Computation/24653964","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G1991376625","display_name":null,"funder_award_id":"62273224","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3837850091","display_name":null,"funder_award_id":"D18003","funder_id":"https://openalex.org/F4320327912","funder_display_name":"Higher Education Discipline Innovation Project"},{"id":"https://openalex.org/G7080948407","display_name":null,"funder_award_id":"92067106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327912","display_name":"Higher Education Discipline Innovation Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1607385133","https://openalex.org/W1892798954","https://openalex.org/W2000757515","https://openalex.org/W2025266594","https://openalex.org/W2091754720","https://openalex.org/W2148668168","https://openalex.org/W2151676530","https://openalex.org/W2161304138","https://openalex.org/W2337917776","https://openalex.org/W2343409113","https://openalex.org/W2605078163","https://openalex.org/W2770515540","https://openalex.org/W2898533271","https://openalex.org/W2912268535","https://openalex.org/W2913712393","https://openalex.org/W2919566737","https://openalex.org/W2921325762","https://openalex.org/W2941123498","https://openalex.org/W2944538238","https://openalex.org/W2948535117","https://openalex.org/W3011797753","https://openalex.org/W3032058562","https://openalex.org/W3107651008","https://openalex.org/W3115892855","https://openalex.org/W3199647054","https://openalex.org/W4236213393","https://openalex.org/W4283697209","https://openalex.org/W4295934653","https://openalex.org/W4386555103","https://openalex.org/W6856598403"],"related_works":["https://openalex.org/W2080331776","https://openalex.org/W2133614587","https://openalex.org/W161603712","https://openalex.org/W2045478930","https://openalex.org/W2382504547","https://openalex.org/W2360974923","https://openalex.org/W1490629594","https://openalex.org/W2384182507","https://openalex.org/W2378363272","https://openalex.org/W2384578230"],"abstract_inverted_index":{"When":[0],"visual":[1,34],"image":[2,13,42,46,63,73,104,114],"information":[3,99],"is":[4,53,77,135,141],"transmitted":[5],"via":[6],"communication":[7],"networks,":[8],"it":[9],"easily":[10],"suffers":[11],"from":[12],"attacks,":[14],"leading":[15],"to":[16,143],"system":[17,36,145],"performance":[18],"degradation":[19],"or":[20],"even":[21],"crashes.":[22],"This":[23],"brief":[24],"investigates":[25],"the":[26,45,50,70,95,110,149,153,157,162],"secure":[27],"control":[28],"of":[29,41,49,97,109,132,152,161],"a":[30,66,127,138],"networked":[31],"inverted":[32],"pendulum":[33],"servo":[35],"(NIPVSS)":[37],"with":[38,69],"adverse":[39,107],"effects":[40,108],"computation.":[43],"First,":[44],"security":[47,92],"limitation":[48],"traditional":[51],"NIPVSS":[52,68,134,155],"revealed,":[54],"where":[55],"its":[56],"stability":[57],"will":[58,119],"be":[59],"destroyed":[60],"by":[61,85,93,102],"eavesdropping-based":[62,103],"attacks.":[64,105],"Then,":[65,126],"new":[67,133,154],"fast":[71],"scaled-selective":[72],"encryption":[74],"(F2SIE)":[75],"algorithm":[76,112],"proposed,":[78],"which":[79,118],"not":[80],"only":[81],"meets":[82],"real-time":[83],"requirement":[84],"reducing":[86,94],"computational":[87,122],"complexity,":[88],"but":[89],"also":[90],"improve":[91],"probability":[96],"valuable":[98],"being":[100],"compromised":[101],"Second,":[106],"F2SIE":[111],"and":[113,124,137,159],"attacks":[115],"are":[116],"analyzed,":[117],"produce":[120],"extra":[121],"delay":[123],"errors.":[125],"closed-loop":[128],"uncertain":[129],"time-delay":[130],"model":[131],"established,":[136],"robust":[139],"controller":[140],"designed":[142],"guarantee":[144],"asymptotic":[146],"stability.":[147],"Finally,":[148],"experimental":[150],"results":[151],"demonstrate":[156],"feasibility":[158],"effectiveness":[160],"proposed":[163],"method.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
