Author of the publication

Finite-time attack detection for nonlinear complex cyber-physical networks under false data injection attacks.

, , and . J. Frankl. Inst., 359 (18): 10510-10524 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The sequence and de novo assembly of the giant panda genome, , , , , , , , , and 113 other author(s). Nature, 463 (7279): 311--317 (January 2010)Tonal Target and Peak Delay in Mandarin Neutral Tone., , , and . O-COCOSDA, page 95-100. IEEE, (2018)Effective acquisition of a phase-coherent DSFH satellite telemetry signal., , , and . ICCC Workshops, page 88-93. IEEE, (2015)Fault detection of discrete-time delay Markovian jump systems with delay term modes partially available., , , , and . J. Frankl. Inst., 356 (5): 3045-3071 (2019)Stabilization of Discrete-Time Systems via a Partially Disabled Controller Experiencing Forced Dwell Times., and . IEEE Access, (2018)Optimal Control of Logical Control Networks., , and . IEEE Trans. Automat. Contr., 56 (8): 1766-1776 (2011)GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications., , , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 264-280. Springer, (2018)Controller synthesis for switched positive linear systems by output feedback., , and . Int. J. Systems Science, 49 (16): 3261-3271 (2018)High-Order Numerical Methods for Solving Time Fractional Partial Differential Equations., , and . J. Sci. Comput., 71 (2): 785-803 (2017)A Control Strategy for Four-Switch Three-Phase Brushless DC Motor Using Single Current Sensor., , and . IEEE Trans. Ind. Electron., 56 (6): 2058-2066 (2009)