Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Networked Predictive Control Based on State-Space Model","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_6","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_6","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Preliminaries for Networked Predictive Control","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_2","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_2","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Secure Networked Predictive Control Under DoS Attacks","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_12","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_12","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116236728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Secure Networked Control Under Deception Attacks","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_9","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_9","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114388845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"A Data Secure Transmission Scheme for Deception Attacks","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_8","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_8","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114761498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Networked Predictive Control Based on Nonlinear Input–Output Model","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_5","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_5","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117146305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Incremental Networked Predictive Control Based on Linear Input–Output Model","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_4","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_4","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_11","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_11","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Networked Predictive Output Tracking Control Based on State-Space Model","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_7","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_7","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129186052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
{"title":"Secure Networked Predictive Control Under Deception Attacks","authors":"Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun","doi":"10.1007/978-981-13-0520-7_10","DOIUrl":"https://doi.org/10.1007/978-981-13-0520-7_10","url":null,"abstract":"","PeriodicalId":247490,"journal":{"name":"Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125299100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}