Author of the publication

Distributed Event-Triggered Control for Multiagent Systems Under Denial-of-Service Attacked Topology: Secure Mode Strategy.

, , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6534-6544 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Summation Detector for False Data-Injection Attack in Cyber-Physical Systems., and . IEEE Trans. Cybern., 50 (6): 2338-2345 (2020)The Simulation of Benign Tumor Growth in Blood Vessels Circumstance., , , , , and . CSSE (1), page 223-227. IEEE Computer Society, (2008)Corporate Leaders Analytics and Network System (CLANS): Constructing and Mining Social Networks among Corporations and Business Elites in China., , , , and . ICONIP (1), volume 8834 of Lecture Notes in Computer Science, page 610-618. Springer, (2014)A Sub-captions Semantic-Guided Network for Image Captioning., , , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 367-379. Springer, (2022)A gender specific risk assessment of coronary heart disease based on physical examination data., , , , , , , , , and 1 other author(s). npj Digit. Medicine, (2023)Completely Event-Triggered Consensus for Multiagent Systems With Directed Switching Topologies., , and . IEEE Trans. Cybern., 52 (8): 7865-7874 (2022)Decentralized False-Data Injection Attacks Against State Omniscience: Existence and Security Analysis., , and . IEEE Trans. Autom. Control., 68 (8): 4634-4649 (August 2023)Optimal Stealthy Linear Attack on Remote State Estimation With Side Information., , and . IEEE Syst. J., 16 (1): 1499-1507 (2022)A Contour Map of the Ear's Vestibular Apparatus Based on 3D Reconstruction., , , , , and . Comput. Sci. Eng., 9 (1): 26-31 (2007)Distributed Event-Triggered Control for Multiagent Systems Under Denial-of-Service Attacked Topology: Secure Mode Strategy., , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6534-6544 (2022)