{"id":"https://openalex.org/W4285198417","doi":"https://doi.org/10.1109/tii.2022.3187747","title":"Resilient Event-/Self-Triggering Leader-Following Consensus Control of Multiagent Systems Against DoS Attacks","display_name":"Resilient Event-/Self-Triggering Leader-Following Consensus Control of Multiagent Systems Against DoS Attacks","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4285198417","doi":"https://doi.org/10.1109/tii.2022.3187747"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3187747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3187747","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010883902","display_name":"Yifang Zhang","orcid":"https://orcid.org/0000-0002-6181-1144"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifang Zhang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061204419","display_name":"Zheng\u2010Guang Wu","orcid":"https://orcid.org/0000-0003-4460-9785"},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng-Guang Wu","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou, China","College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, Zhejiang, China","Institute for Advanced Study, Chengdu University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, Zhejiang, China","institution_ids":["https://openalex.org/I135237710"]},{"raw_affiliation_string":"Institute for Advanced Study, Chengdu University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100739668","display_name":"Peng Shi","orcid":"https://orcid.org/0000-0001-8218-586X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]},{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Peng Shi","raw_affiliation_strings":["School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA, Australia","College of Engineering and Science, Victoria University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, The University of Adelaide, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"College of Engineering and Science, Victoria University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010883902"],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":12.8463,"has_fulltext":false,"cited_by_count":96,"citation_normalized_percentile":{"value":0.99145586,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":"4","first_page":"5925","last_page":"5934"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7302855253219604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727947473526001},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.6406314373016357},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.5762643814086914},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5560353994369507},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5444056987762451},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.5175444483757019},{"id":"https://openalex.org/keywords/aperiodic-graph","display_name":"Aperiodic graph","score":0.44890257716178894},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41022390127182007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34753239154815674},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3090483546257019},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1480531096458435}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7302855253219604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727947473526001},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.6406314373016357},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.5762643814086914},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5560353994369507},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5444056987762451},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.5175444483757019},{"id":"https://openalex.org/C104247578","wikidata":"https://www.wikidata.org/wiki/Q4779368","display_name":"Aperiodic graph","level":2,"score":0.44890257716178894},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41022390127182007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34753239154815674},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3090483546257019},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1480531096458435},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2022.3187747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3187747","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:eprints.vu.edu.au:46678","is_oa":false,"landing_page_url":"https://orcid.org/0000-0002-6181-1144>,","pdf_url":null,"source":{"id":"https://openalex.org/S4306400215","display_name":"Victoria University Research Repository (Victoria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41156924","host_organization_name":"Victoria University of Wellington","host_organization_lineage":["https://openalex.org/I41156924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4513328056","display_name":null,"funder_award_id":"U1966202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2019166202","https://openalex.org/W2054856671","https://openalex.org/W2068740779","https://openalex.org/W2133754447","https://openalex.org/W2231268124","https://openalex.org/W2294340956","https://openalex.org/W2297764381","https://openalex.org/W2343705368","https://openalex.org/W2426532714","https://openalex.org/W2768779900","https://openalex.org/W2769728167","https://openalex.org/W2790046377","https://openalex.org/W2890551018","https://openalex.org/W2895899870","https://openalex.org/W2899962524","https://openalex.org/W2911328656","https://openalex.org/W2913078833","https://openalex.org/W2915345851","https://openalex.org/W2923584227","https://openalex.org/W2950032093","https://openalex.org/W2975268704","https://openalex.org/W2997863916","https://openalex.org/W3003152123","https://openalex.org/W3003685269","https://openalex.org/W3009622352","https://openalex.org/W3089274412","https://openalex.org/W3146711799","https://openalex.org/W3170166019","https://openalex.org/W3195371746","https://openalex.org/W3213419929"],"related_works":["https://openalex.org/W2784200061","https://openalex.org/W2784026553","https://openalex.org/W2511063373","https://openalex.org/W3127518712","https://openalex.org/W3088852461","https://openalex.org/W2113824758","https://openalex.org/W3046085425","https://openalex.org/W2118264468","https://openalex.org/W2963943213","https://openalex.org/W2335243741"],"abstract_inverted_index":{"This":[0],"article":[1],"focuses":[2],"on":[3,21],"the":[4,26,31,85,105,133,139,145,148,158,161],"problem":[5],"of":[6,77,89,147,160],"resilient":[7],"leader-following":[8,32,94],"consensus":[9,33,95],"for":[10,25,144],"multiagent":[11],"systems":[12],"against":[13],"denial-of-service":[14],"(DoS)":[15],"attacks.":[16],"Two":[17],"update":[18,163],"strategies":[19,164],"based":[20],"event/self-triggering":[22,149],"are":[23,65,91],"proposed":[24,162],"control":[27,108,166],"protocols":[28],"to":[29,46,67,111,156],"handle":[30],"in":[34],"unreliable":[35],"shared":[36],"networks.":[37,55],"We":[38],"first":[39],"propose":[40],"a":[41,120,152],"dynamic":[42,106],"event-triggered":[43],"communication":[44,57,122],"scheme":[45],"mitigate":[47],"unnecessary":[48],"information":[49],"transfer":[50],"through":[51],"energy-limited":[52],"and":[53,70,84,87,116,138,165],"vulnerable":[54],"Continuous":[56],"between":[58],"agents":[59],"can":[60,96],"be":[61,68,97],"avoided.":[62],"DoS":[63,79,102],"attacks":[64,90,103],"supposed":[66],"aperiodic":[69],"asynchronous":[71],"at":[72],"different":[73],"edges.":[74],"The":[75,93,126],"concept":[76],"valid":[78],"attack":[80],"interval":[81],"is":[82,124,130,142,154],"introduced,":[83],"frequency":[86],"duration":[88],"analyzed.":[92],"achieved":[98],"when":[99],"there":[100],"exist":[101],"using":[104],"event-based":[107],"strategy.":[109],"Then,":[110],"avoid":[112],"continuous":[113],"event":[114],"detection":[115],"save":[117],"computation":[118],"resources,":[119],"self-triggered":[121],"function":[123],"developed.":[125],"next":[127],"triggering":[128],"moment":[129],"predetermined":[131],"with":[132],"latest":[134],"received":[135],"state":[136],"information,":[137],"Zeno":[140],"behavior":[141],"eliminated":[143],"feasibility":[146],"scheme.":[150],"Finally,":[151],"simulation":[153],"provided":[155],"verify":[157],"effectiveness":[159],"protocols.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":49},{"year":2024,"cited_by_count":33},{"year":2023,"cited_by_count":8}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
