{"id":"https://openalex.org/W4408017555","doi":"https://doi.org/10.1109/tvt.2025.3546500","title":"Resource-Constrained Adaptive Neural Output Feedback Security Control for Networked USVs Under Dual-Channel Malicious Attacks","display_name":"Resource-Constrained Adaptive Neural Output Feedback Security Control for Networked USVs Under Dual-Channel Malicious Attacks","publication_year":2025,"publication_date":"2025-02-27","ids":{"openalex":"https://openalex.org/W4408017555","doi":"https://doi.org/10.1109/tvt.2025.3546500"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2025.3546500","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2025.3546500","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Guibing Zhu","orcid":"https://orcid.org/0000-0002-8267-9437"},"institutions":[{"id":"https://openalex.org/I31847773","display_name":"Zhejiang Ocean University","ror":"https://ror.org/03mys6533","country_code":"CN","type":"education","lineage":["https://openalex.org/I31847773"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guibing Zhu","raw_affiliation_strings":["School of Naval Architecture and Maritime, Zhejiang Ocean University, Zhoushan, China"],"raw_orcid":"https://orcid.org/0000-0002-8267-9437","affiliations":[{"raw_affiliation_string":"School of Naval Architecture and Maritime, Zhejiang Ocean University, Zhoushan, China","institution_ids":["https://openalex.org/I31847773"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084273919","display_name":"Chen Wu","orcid":"https://orcid.org/0000-0002-3283-411X"},"institutions":[{"id":"https://openalex.org/I31847773","display_name":"Zhejiang Ocean University","ror":"https://ror.org/03mys6533","country_code":"CN","type":"education","lineage":["https://openalex.org/I31847773"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Wu","raw_affiliation_strings":["School of Naval Architecture and Maritime, Zhejiang Ocean University, Zhoushan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Naval Architecture and Maritime, Zhejiang Ocean University, Zhoushan, China","institution_ids":["https://openalex.org/I31847773"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085082937","display_name":"Yong Ma","orcid":"https://orcid.org/0000-0003-0418-9210"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ma","raw_affiliation_strings":["State Key Laboratory of Maritime Technology and Safety, School of Navigation, Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China","State Key Laboratory of Maritime Technology and Safety the School of Navigation Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0003-0418-9210","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Maritime Technology and Safety, School of Navigation, Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]},{"raw_affiliation_string":"State Key Laboratory of Maritime Technology and Safety the School of Navigation Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102820325","display_name":"Songlin Hu","orcid":"https://orcid.org/0000-0001-8559-1740"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songlin Hu","raw_affiliation_strings":["Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-8559-1740","affiliations":[{"raw_affiliation_string":"Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I31847773"],"apc_list":null,"apc_paid":null,"fwci":40.6227,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.99836699,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"74","issue":"7","first_page":"10109","last_page":"10121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6483480334281921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6187527179718018},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5545309782028198},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5090138912200928},{"id":"https://openalex.org/keywords/adaptive-control","display_name":"Adaptive control","score":0.49162012338638306},{"id":"https://openalex.org/keywords/feedback-control","display_name":"Feedback control","score":0.4706871807575226},{"id":"https://openalex.org/keywords/output-feedback","display_name":"Output feedback","score":0.45593470335006714},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4362756013870239},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.4259617328643799},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.41163161396980286},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38074973225593567},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.31513383984565735},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.24145883321762085},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15038195252418518}],"concepts":[{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6483480334281921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6187527179718018},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5545309782028198},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5090138912200928},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.49162012338638306},{"id":"https://openalex.org/C3018651601","wikidata":"https://www.wikidata.org/wiki/Q183635","display_name":"Feedback control","level":2,"score":0.4706871807575226},{"id":"https://openalex.org/C3018623182","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Output feedback","level":3,"score":0.45593470335006714},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4362756013870239},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.4259617328643799},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.41163161396980286},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38074973225593567},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.31513383984565735},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.24145883321762085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15038195252418518},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2025.3546500","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2025.3546500","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3431986428","display_name":null,"funder_award_id":"62073251","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6970364634","display_name":null,"funder_award_id":"52261160383","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W2009257627","https://openalex.org/W2068740779","https://openalex.org/W2094437443","https://openalex.org/W2099823866","https://openalex.org/W2345644119","https://openalex.org/W2492811885","https://openalex.org/W2902508352","https://openalex.org/W3004943475","https://openalex.org/W3009622352","https://openalex.org/W3022305970","https://openalex.org/W3095091775","https://openalex.org/W3101619763","https://openalex.org/W3134785541","https://openalex.org/W3141197660","https://openalex.org/W3148904405","https://openalex.org/W3187593522","https://openalex.org/W3213092112","https://openalex.org/W4224228808","https://openalex.org/W4224258070","https://openalex.org/W4224932126","https://openalex.org/W4283321896","https://openalex.org/W4285193805","https://openalex.org/W4285219563","https://openalex.org/W4285287000","https://openalex.org/W4286429205","https://openalex.org/W4294310681","https://openalex.org/W4294811206","https://openalex.org/W4312547357","https://openalex.org/W4315784456","https://openalex.org/W4319777210","https://openalex.org/W4323345609","https://openalex.org/W4361029976","https://openalex.org/W4367016675","https://openalex.org/W4376104328","https://openalex.org/W4378804916","https://openalex.org/W4386634595","https://openalex.org/W4386766450","https://openalex.org/W4387009999","https://openalex.org/W4387010630","https://openalex.org/W4389230724","https://openalex.org/W4390871537","https://openalex.org/W4391460524","https://openalex.org/W4391676797","https://openalex.org/W4391797285","https://openalex.org/W4400679363","https://openalex.org/W4400991184","https://openalex.org/W4403918018","https://openalex.org/W4406457599"],"related_works":["https://openalex.org/W2334516743","https://openalex.org/W2486306719","https://openalex.org/W2106487132","https://openalex.org/W2369282358","https://openalex.org/W2482257683","https://openalex.org/W3022029778","https://openalex.org/W2019249007","https://openalex.org/W4287553357","https://openalex.org/W2800406697","https://openalex.org/W2139918612"],"abstract_inverted_index":{"This":[0,120],"article":[1],"focuses":[2],"on":[3],"the":[4,9,16,20,36,39,46,55,71,76,87,91,97,124,139,146],"security":[5,115],"control":[6,81,92,116,150],"problem":[7,48],"for":[8],"networked":[10],"unmanned":[11],"surface":[12],"vehicles":[13],"(USVs)":[14],"under":[15],"network":[17],"environment,":[18],"where":[19],"malicious":[21,127],"attacks":[22],"(DoS":[23],"attack":[24],"and":[25,28,58,99,138,156],"FDI":[26],"attack)":[27],"external/internal":[29],"uncertainties":[30],"are":[31,136],"taken":[32],"into":[33],"account.":[34],"In":[35,75,90],"sensor-control":[37],"channel,":[38,78],"event-sampled":[40,61],"unit":[41],"is":[42,67,83,118,152],"involved":[43],"to":[44,69,85],"overcome":[45],"design":[47],"of":[49,73,96,126,148],"intermittent":[50],"transmission":[51],"signal":[52],"caused":[53],"by":[54,154],"DoS":[56],"attack,":[57],"a":[59,79,105,109],"novel":[60,110],"adaptive":[62,101,111],"neural":[63,102,112],"state":[64],"observer":[65],"(ESANSO)":[66],"developed":[68],"recover":[70],"velocity":[72],"USVs.":[74],"control-actuator":[77],"self-triggering":[80],"mechanism":[82],"proposed":[84,149],"save":[86],"communication":[88],"resources.":[89],"design,":[93],"with":[94],"aid":[95],"ESANSO":[98],"an":[100],"approach":[103,121],"utilizing":[104],"single-parameter":[106],"leaning":[107],"technique,":[108],"output":[113],"feedback":[114],"solution":[117],"developed.":[119],"effectively":[122],"mitigates":[123],"impact":[125],"attacks.":[128],"The":[129],"theoretical":[130],"analysis":[131],"shows":[132],"that":[133],"all":[134],"signals":[135],"bounded,":[137],"Zeno":[140],"phenomenon":[141],"can":[142],"be":[143],"avoided.":[144],"Finally,":[145],"effectiveness":[147],"scheme":[151],"validated":[153],"simulation":[155],"experiments.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":25}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
