{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T07:19:49Z","timestamp":1725434389793},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Automatica"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.automatica.2023.110982","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T19:01:48Z","timestamp":1678561308000},"page":"110982","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":15,"special_numbering":"C","title":["Attack-model-independent stabilization of networked control systems under a jump-like TOD scheduling protocol"],"prefix":"10.1016","volume":"152","author":[{"given":"Hongchenyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhiru","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.automatica.2023.110982_b1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.neucom.2017.11.067","article-title":"State estimation for delayed neural networks with stochastic communication protocol: The finite-time case","volume":"281","author":"Alsaadi","year":"2018","journal-title":"Neurocomputing"},{"issue":"5","key":"10.1016\/j.automatica.2023.110982_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-019-2637-9","article-title":"How often should one update control and estimation: Review of networked triggering techniques","volume":"63","author":"Chen","year":"2020","journal-title":"Science China. Information Sciences"},{"key":"10.1016\/j.automatica.2023.110982_b3","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2022.05.026","article-title":"Peak-to-peak fuzzy filtering of nonlinear discrete-time systems with Markov communication protocol","volume":"607","author":"Cheng","year":"2022","journal-title":"Information Sciences"},{"key":"10.1016\/j.automatica.2023.110982_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110525","article-title":"An event-triggered Round-Robin protocol to dynamic output feedback control for nonhomogeneous Markov switching systems","volume":"145","author":"Cheng","year":"2022","journal-title":"Automatica"},{"issue":"4","key":"10.1016\/j.automatica.2023.110982_b5","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/TCYB.2017.2771560","article-title":"An overview of recent advances in event-triggered consensus of multiagent systems","volume":"48","author":"Ding","year":"2017","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"9","key":"10.1016\/j.automatica.2023.110982_b6","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1109\/TAC.2011.2107631","article-title":"Stability analysis of networked control systems using a switched linear systems approach","volume":"56","author":"Donkers","year":"2011","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"5","key":"10.1016\/j.automatica.2023.110982_b7","doi-asserted-by":"crossref","first-page":"3643","DOI":"10.1137\/070679132","article-title":"Stabilization of networked control systems via dynamic output-feedback controllers","volume":"48","author":"Gao","year":"2010","journal-title":"SIAM Journal on Control and Optimization"},{"key":"10.1016\/j.automatica.2023.110982_b8","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TSP.2022.3144945","article-title":"Outlier-resistant filtering with dead-zone-like censoring under try-once-discard protocol","volume":"70","author":"Geng","year":"2022","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"6","key":"10.1016\/j.automatica.2023.110982_b9","doi-asserted-by":"crossref","first-page":"3595","DOI":"10.1109\/TII.2021.3126644","article-title":"Secure control of multi-agent systems against malicious attacks: A brief survey","volume":"18","author":"He","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"8","key":"10.1016\/j.automatica.2023.110982_b10","doi-asserted-by":"crossref","first-page":"1781","DOI":"10.1109\/TAC.2010.2042352","article-title":"Networked control systems with communication constraints: Tradeoffs between transmission intervals, delays and performance","volume":"55","author":"Heemels","year":"2010","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"3","key":"10.1016\/j.automatica.2023.110982_b11","first-page":"1392","article-title":"Resilient H\u221e filtering for event-triggered networked systems under nonperiodic DoS jamming attacks","volume":"51","author":"Hu","year":"2019","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"12","key":"10.1016\/j.automatica.2023.110982_b12","doi-asserted-by":"crossref","first-page":"4271","DOI":"10.1109\/TCYB.2018.2861834","article-title":"Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks","volume":"49","author":"Hu","year":"2018","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"1","key":"10.1016\/j.automatica.2023.110982_b13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/TVT.2021.3128635","article-title":"Robust H\u221e dynamic output-feedback control for CACC with ROSSs subject to RODAs","volume":"71","author":"Huang","year":"2021","journal-title":"IEEE Transactions on Vehicular Technology"},{"journal-title":"IEEE Transactions on Neural Networks and Learning Systems","article-title":"Learning-based DoS attack power allocation in multiprocess systems","year":"2022","author":"Huang","key":"10.1016\/j.automatica.2023.110982_b14"},{"issue":"6","key":"10.1016\/j.automatica.2023.110982_b15","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1080\/00207179.2019.1652853","article-title":"Neural-network-based adaptive control for bilateral teleoperation with multiple slaves under Round-Robin scheduling protocol","volume":"94","author":"Li","year":"2021","journal-title":"International Journal of Control"},{"key":"10.1016\/j.automatica.2023.110982_b16","series-title":"2012 IEEE 51st IEEE conference on decision and control","first-page":"3886","article-title":"Network-based control via a novel analysis of hybrid systems with time-varying delays","author":"Liu","year":"2012"},{"issue":"11","key":"10.1016\/j.automatica.2023.110982_b17","doi-asserted-by":"crossref","first-page":"3071","DOI":"10.1109\/TAC.2015.2414812","article-title":"Networked control with stochastic scheduling","volume":"60","author":"Liu","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"year":"2020","series-title":"Networked control under communication constraints","author":"Liu","key":"10.1016\/j.automatica.2023.110982_b18"},{"issue":"8","key":"10.1016\/j.automatica.2023.110982_b19","doi-asserted-by":"crossref","first-page":"3571","DOI":"10.1109\/TCYB.2019.2897366","article-title":"Distributed secure filtering for discrete-time systems under Round-Robin protocol and deception attacks","volume":"50","author":"Liu","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"18","key":"10.1016\/j.automatica.2023.110982_b20","doi-asserted-by":"crossref","first-page":"7927","DOI":"10.1002\/rnc.5205","article-title":"Protocol-based extended Kalman filtering with quantization effects: The Round-Robin case","volume":"30","author":"Liu","year":"2020","journal-title":"International Journal of Robust and Nonlinear Control"},{"issue":"2","key":"10.1016\/j.automatica.2023.110982_b21","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1002\/rnc.4800","article-title":"Frequency-dependent fault detection for networked systems under uniform quantization and try-once-discard protocol","volume":"30","author":"Long","year":"2020","journal-title":"International Journal of Robust and Nonlinear Control"},{"issue":"9","key":"10.1016\/j.automatica.2023.110982_b22","doi-asserted-by":"crossref","first-page":"3943","DOI":"10.1109\/TAC.2020.2989773","article-title":"Switching-like event-triggered control for networked control systems under malicious denial of service attacks","volume":"65","author":"Peng","year":"2020","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"10.1016\/j.automatica.2023.110982_b23","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TIE.2017.2726965","article-title":"Adaptive event-triggering H\u221e load frequency control for network-based power systems","volume":"65","author":"Peng","year":"2017","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"10.1016\/j.automatica.2023.110982_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110257","article-title":"Transmission power allocation for remote estimation with multi-packet reception capabilities","volume":"140","author":"Pezzutto","year":"2022","journal-title":"Automatica"},{"issue":"9","key":"10.1016\/j.automatica.2023.110982_b25","doi-asserted-by":"crossref","first-page":"2860","DOI":"10.1016\/j.automatica.2013.05.030","article-title":"Wirtinger-based integral inequality: Application to time-delay systems","volume":"49","author":"Seuret","year":"2013","journal-title":"Automatica"},{"issue":"1","key":"10.1016\/j.automatica.2023.110982_b26","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/TFUZZ.2019.2939965","article-title":"H\u221e filtering for fuzzy jumping genetic regulatory networks with Round-Robin protocol: A hidden-Markov-model-based approach","volume":"28","author":"Shen","year":"2019","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"4","key":"10.1016\/j.automatica.2023.110982_b27","doi-asserted-by":"crossref","first-page":"2113","DOI":"10.1109\/TSMC.2020.2979992","article-title":"Resilient load frequency control of cyber-physical power systems under QoS-dependent event-triggered communication","volume":"51","author":"Sun","year":"2020","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"11","key":"10.1016\/j.automatica.2023.110982_b28","doi-asserted-by":"crossref","first-page":"4610","DOI":"10.1109\/TCYB.2020.2972384","article-title":"Memory-based event-triggering H\u221e load frequency control for power systems under deception attacks","volume":"50","author":"Tian","year":"2020","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.automatica.2023.110982_b29","doi-asserted-by":"crossref","first-page":"181032","DOI":"10.1109\/ACCESS.2019.2959083","article-title":"Dynamic output feedback control of cyber-physical systems under DoS attacks","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.automatica.2023.110982_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.109519","article-title":"Event-driven receding horizon control for distributed persistent monitoring in network systems","volume":"127","author":"Welikala","year":"2021","journal-title":"Automatica"},{"issue":"1","key":"10.1016\/j.automatica.2023.110982_b31","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/TCYB.2016.2635122","article-title":"Finite-time distributed state estimation over sensor networks with Round-Robin protocol and fading channels","volume":"48","author":"Xu","year":"2016","journal-title":"IEEE Transactions on Cybernetics"},{"journal-title":"IEEE Transactions on Cybernetics","article-title":"Sliding-mode control for interval type-2 fuzzy systems: Event-triggering WTOD scheme","year":"2022","author":"Yang","key":"10.1016\/j.automatica.2023.110982_b32"},{"key":"10.1016\/j.automatica.2023.110982_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110394","article-title":"Output-feedback control for stochastic impulsive systems under Round-Robin protocol","volume":"143","author":"Yao","year":"2022","journal-title":"Automatica"},{"issue":"2","key":"10.1016\/j.automatica.2023.110982_b34","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TAC.2012.2206694","article-title":"A delay system method for designing event-triggered controllers of networked control systems","volume":"58","author":"Yue","year":"2012","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.1016\/j.automatica.2023.110982_b35","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.automatica.2019.05.064","article-title":"Networked H\u221e filtering under a weighted TOD protocol","volume":"107","author":"Zhang","year":"2019","journal-title":"Automatica"},{"issue":"6","key":"10.1016\/j.automatica.2023.110982_b36","doi-asserted-by":"crossref","first-page":"2851","DOI":"10.1109\/TCYB.2019.2894294","article-title":"Output feedback stabilization of networked control systems under a stochastic scheduling protocol","volume":"50","author":"Zhang","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.automatica.2023.110982_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.109517","article-title":"Optimal DoS attack schedules on remote state estimation under multi-sensor Round-Robin protocol","volume":"127","author":"Zhang","year":"2021","journal-title":"Automatica"},{"issue":"12","key":"10.1016\/j.automatica.2023.110982_b38","doi-asserted-by":"crossref","first-page":"6582","DOI":"10.1109\/TAC.2017.2713353","article-title":"Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects","volume":"62","author":"Zou","year":"2017","journal-title":"IEEE Transactions on Automatic Control"}],"container-title":["Automatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109823001358?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109823001358?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T04:18:50Z","timestamp":1723263530000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0005109823001358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":38,"alternative-id":["S0005109823001358"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.automatica.2023.110982","relation":{},"ISSN":["0005-1098"],"issn-type":[{"type":"print","value":"0005-1098"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Attack-model-independent stabilization of networked control systems under a jump-like TOD scheduling protocol","name":"articletitle","label":"Article Title"},{"value":"Automatica","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.automatica.2023.110982","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"110982"}}