{"id":"https://openalex.org/W4414198602","doi":"https://doi.org/10.1109/tcyb.2025.3604771","title":"PSO-Algorithm-Assisted Attack-Compensated Control for 2-D Fuzzy Systems Under Cyber Attacks","display_name":"PSO-Algorithm-Assisted Attack-Compensated Control for 2-D Fuzzy Systems Under Cyber Attacks","publication_year":2025,"publication_date":"2025-09-15","ids":{"openalex":"https://openalex.org/W4414198602","doi":"https://doi.org/10.1109/tcyb.2025.3604771","pmid":"https://pubmed.ncbi.nlm.nih.gov/40953425"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2025.3604771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3604771","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012741516","display_name":"Qiongwen Zhang","orcid":"https://orcid.org/0009-0001-3729-7616"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiongwen Zhang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100625792","display_name":"Huaguang Zhang","orcid":"https://orcid.org/0000-0002-2375-9824"},"institutions":[{"id":"https://openalex.org/I4391767858","display_name":"State Key Laboratory of Synthetical Automation for Process Industries","ror":"https://ror.org/0380ng272","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767858","https://openalex.org/I9224756"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaguang Zhang","raw_affiliation_strings":["State Key Laboratory of Synthetical Automation for Process Industries and the School of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries and the School of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756","https://openalex.org/I4391767858"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390042","display_name":"Juan Zhang","orcid":"https://orcid.org/0000-0002-7545-0239"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juan Zhang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017839167","display_name":"Zhihong Liang","orcid":"https://orcid.org/0009-0004-7778-8438"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Liang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012741516"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88276425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"56","issue":"1","first_page":"357","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.5879999995231628},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5526000261306763},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.5289000272750854},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5156000256538391},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49000000953674316},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46480000019073486},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4487999975681305},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.4392000138759613}],"concepts":[{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.5879999995231628},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5526000261306763},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.5289000272750854},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5156000256538391},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49000000953674316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4693000018596649},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46480000019073486},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4487999975681305},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.4392000138759613},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.4336000084877014},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.42649999260902405},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.41359999775886536},{"id":"https://openalex.org/C60640748","wikidata":"https://www.wikidata.org/wiki/Q2337858","display_name":"Lyapunov function","level":3,"score":0.40619999170303345},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3605000078678131},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.35120001435279846},{"id":"https://openalex.org/C2776829284","wikidata":"https://www.wikidata.org/wiki/Q1341651","display_name":"Lyapunov stability","level":3,"score":0.34880000352859497},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3061000108718872},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.27379998564720154},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2599000036716461},{"id":"https://openalex.org/C167964875","wikidata":"https://www.wikidata.org/wiki/Q17011487","display_name":"Exponential stability","level":3,"score":0.2596000134944916},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2574999928474426}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2025.3604771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3604771","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:40953425","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/40953425","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1972079066","https://openalex.org/W1987532819","https://openalex.org/W2011805865","https://openalex.org/W2068362280","https://openalex.org/W2091374381","https://openalex.org/W2107704171","https://openalex.org/W2559840900","https://openalex.org/W2591842626","https://openalex.org/W2753171327","https://openalex.org/W2805054476","https://openalex.org/W2944430668","https://openalex.org/W2987086235","https://openalex.org/W3020949582","https://openalex.org/W3046635638","https://openalex.org/W3112730247","https://openalex.org/W3143195988","https://openalex.org/W3201681013","https://openalex.org/W4224246866","https://openalex.org/W4285293172","https://openalex.org/W4286424202","https://openalex.org/W4366503956","https://openalex.org/W4379033884","https://openalex.org/W4382568137","https://openalex.org/W4387305627","https://openalex.org/W4387815175","https://openalex.org/W4390081990","https://openalex.org/W4391341338","https://openalex.org/W4392454178","https://openalex.org/W4394907916","https://openalex.org/W4399423141","https://openalex.org/W4400016301","https://openalex.org/W4400905831","https://openalex.org/W4407027149","https://openalex.org/W4407736676","https://openalex.org/W4408955168","https://openalex.org/W4409494264","https://openalex.org/W4410115364","https://openalex.org/W4412487832"],"related_works":[],"abstract_inverted_index":{"The":[0],"study":[1],"investigates":[2],"the":[3,15,20,55,69,102,107,112,117,127,138,143],"problem":[4],"of":[5,22,71,106,142],"attack-compensated":[6],"control":[7,75],"for":[8],"two-dimensional":[9],"(2-D)":[10],"fuzzy":[11],"systems":[12],"modeled":[13],"by":[14,78],"Roesser":[16],"framework,":[17],"subject":[18],"to":[19,38,52,100,125,136],"constraints":[21],"limited":[23],"communication":[24,40,58,65],"channels.":[25],"A":[26],"novel":[27],"event-triggered":[28],"stochastic":[29],"protocol":[30,56],"(ETSP)":[31],"with":[32],"nonhomogeneous":[33],"sojourn":[34],"probabilities":[35],"is":[36,89,123,134],"introduced":[37],"save":[39],"resources.":[41],"By":[42],"randomly":[43],"selecting":[44],"a":[45,81,86,131],"controller":[46,128],"node":[47],"at":[48],"each":[49],"time":[50],"step":[51],"transmit":[53],"signals,":[54],"schedules":[57],"between":[59],"controllers":[60],"and":[61,130,140],"actuators,":[62],"thereby":[63],"reducing":[64],"load.":[66],"To":[67],"address":[68],"injection":[70],"false":[72],"data":[73],"into":[74],"signals":[76],"caused":[77],"network":[79],"attacks,":[80],"compensation":[82],"mechanism":[83],"based":[84,96],"on":[85,97],"sojourn-probability-based":[87],"predictor":[88],"designed.":[90],"Sufficient":[91],"conditions":[92],"are":[93],"subsequently":[94],"established,":[95],"Lyapunov":[98],"theory,":[99],"ensure":[101],"mean-square":[103],"asymptotic":[104],"stability":[105],"closed-loop":[108],"system":[109],"while":[110],"preserving":[111],"desired":[113],"performance":[114],"level.":[115],"Finally,":[116],"particle":[118],"swarm":[119],"optimization":[120],"(PSO)":[121],"algorithm":[122],"employed":[124],"enhance":[126],"design,":[129],"simulation":[132],"example":[133],"provided":[135],"verify":[137],"effectiveness":[139],"applicability":[141],"proposed":[144],"method.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
