{"id":"https://openalex.org/W2972378582","doi":"https://doi.org/10.23919/acc.2019.8814377","title":"Learning-based Intelligent Attack against Formation Control with Obstacle-avoidance","display_name":"Learning-based Intelligent Attack against Formation Control with Obstacle-avoidance","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2972378582","doi":"https://doi.org/10.23919/acc.2019.8814377","mag":"2972378582"},"language":"en","primary_location":{"id":"doi:10.23919/acc.2019.8814377","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2019.8814377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 American Control Conference (ACC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100710084","display_name":"Yushan Li","orcid":"https://orcid.org/0000-0001-8795-850X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yushan Li","raw_affiliation_strings":["Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004668792","display_name":"Jianping He","orcid":"https://orcid.org/0000-0002-6253-7802"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianping He","raw_affiliation_strings":["Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038267080","display_name":"Cailian Chen","orcid":"https://orcid.org/0000-0001-6533-8713"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cailian Chen","raw_affiliation_strings":["Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100690710","display_name":"Xinping Guan","orcid":"https://orcid.org/0009-0006-6233-8762"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinping Guan","raw_affiliation_strings":["Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Key Laboratory of System Control and Signal Processing, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100710084"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1142,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80542413,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2019","issue":null,"first_page":"2690","last_page":"2695"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obstacle-avoidance","display_name":"Obstacle avoidance","score":0.8393541574478149},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6986931562423706},{"id":"https://openalex.org/keywords/collision-avoidance","display_name":"Collision avoidance","score":0.6483604311943054},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49324101209640503},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4562664031982422},{"id":"https://openalex.org/keywords/avoidance-learning","display_name":"Avoidance learning","score":0.42794644832611084},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3880084753036499},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2615441679954529},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.2557760179042816},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.18710309267044067},{"id":"https://openalex.org/keywords/neuroscience","display_name":"Neuroscience","score":0.12323561310768127},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.11045783758163452}],"concepts":[{"id":"https://openalex.org/C6683253","wikidata":"https://www.wikidata.org/wiki/Q7075535","display_name":"Obstacle avoidance","level":4,"score":0.8393541574478149},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6986931562423706},{"id":"https://openalex.org/C2780864053","wikidata":"https://www.wikidata.org/wiki/Q5147495","display_name":"Collision avoidance","level":3,"score":0.6483604311943054},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49324101209640503},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4562664031982422},{"id":"https://openalex.org/C2993535909","wikidata":"https://www.wikidata.org/wiki/Q69887268","display_name":"Avoidance learning","level":2,"score":0.42794644832611084},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3880084753036499},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2615441679954529},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.2557760179042816},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.18710309267044067},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.12323561310768127},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.11045783758163452},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/acc.2019.8814377","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2019.8814377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 American Control Conference (ACC)","raw_type":"proceedings-article"},{"id":"mag:3042023896","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902288460036923","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1484563256","https://openalex.org/W1505808964","https://openalex.org/W1578365235","https://openalex.org/W1630241696","https://openalex.org/W1751156337","https://openalex.org/W1970786657","https://openalex.org/W2003530067","https://openalex.org/W2015299746","https://openalex.org/W2018284512","https://openalex.org/W2069038223","https://openalex.org/W2103120971","https://openalex.org/W2104332709","https://openalex.org/W2107396783","https://openalex.org/W2112668583","https://openalex.org/W2117211893","https://openalex.org/W2123332983","https://openalex.org/W2133754447","https://openalex.org/W2147326597","https://openalex.org/W2154693758","https://openalex.org/W2158930753","https://openalex.org/W2160420729","https://openalex.org/W2160806207","https://openalex.org/W2167040191","https://openalex.org/W2168904841","https://openalex.org/W2528815323","https://openalex.org/W2556022294","https://openalex.org/W2762155482","https://openalex.org/W2766912045","https://openalex.org/W6634551609","https://openalex.org/W6654872976"],"related_works":["https://openalex.org/W2913749762","https://openalex.org/W2321940404","https://openalex.org/W2140606111","https://openalex.org/W2991662304","https://openalex.org/W2794689129","https://openalex.org/W2975575631","https://openalex.org/W2785353696","https://openalex.org/W2355860162","https://openalex.org/W2022120107","https://openalex.org/W2624388109"],"abstract_inverted_index":{"Formation":[0],"control":[1],"has":[2,72],"attracted":[3],"considerable":[4],"attention":[5],"for":[6,41,137],"its":[7,24],"wide":[8],"applications,":[9],"e.g,":[10],"military":[11],"reconnaissance,":[12],"environment":[13],"exploration.":[14],"However,":[15],"the":[16,62,70,78,82,127,138,146,149,153,192,195,200,203],"formation":[17,79,130],"suffers":[18],"additional":[19],"security":[20],"vulnerabilities":[21],"due":[22],"to":[23,31,77,99,118,190],"distributed":[25],"fashion,":[26],"networked":[27],"communication":[28],"and":[29,39,51,61,122,156,164],"openness":[30],"outside":[32],"environments.":[33],"Existing":[34],"works":[35],"focus":[36],"on":[37,66],"detection":[38,154],"countermeasures":[40],"some":[42,73],"classic":[43],"attacks,":[44],"e.g.,":[45],"Denial":[46],"of":[47,129,145,159,194,202],"Service":[48],"(DoS),":[49],"replay":[50],"deception":[52],"attacks.":[53],"Nevertheless,":[54],"those":[55],"attacks":[56],"are":[57,64,90],"generally":[58],"from":[59],"cyberspace":[60],"methods":[63],"based":[65],"an":[67,94,108,160],"assumption":[68],"that":[69],"attacker":[71,150],"knowledge":[74],"or":[75,87,104],"access":[76],"system,":[80],"like":[81],"system":[83,147],"dynamics":[84],"is":[85,170,188],"known":[86],"internal":[88],"nodes":[89],"compromised.":[91],"It":[92],"remains":[93],"open":[95],"issue":[96],"given":[97],"how":[98],"design":[100,119],"a":[101,120,185],"feasible":[102,121],"attack":[103,109,124,182,205],"under":[105],"what":[106],"conditions":[107],"can":[110,151],"be":[111],"implemented.":[112],"In":[113],"this":[114],"paper,":[115],"we":[116],"aim":[117],"intelligent":[123,196],"scheme":[125],"against":[126],"obstacle-avoidance":[128,168],"control.":[131],"We":[132],"describe":[133],"it":[134],"as":[135],"\u201cintelligent\u201d":[136],"following:":[139],"i)":[140],"Without":[141],"any":[142],"prior":[143],"information":[144],"dynamics,":[148],"learn":[152],"area":[155],"goal":[157],"position":[158],"agent":[161],"by":[162],"trial":[163],"observation;":[165],"ii)":[166],"The":[167,179],"mechanism":[169],"regressed":[171],"using":[172],"support":[173],"vector":[174],"regress":[175],"(SVR)":[176],"method;":[177],"iii)":[178],"strategy":[180],"exhibits":[181],"efficiency.":[183],"Furthermore,":[184],"sufficient":[186],"condition":[187],"obtained":[189],"guarantee":[191],"success":[193],"attack.":[197],"Simulations":[198],"illustrate":[199],"effectiveness":[201],"proposed":[204],"scheme.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
