Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"
DOI: 10.1109/tcsi.2022.3187725
Abstract: This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the…
read more here.
Keywords:
ion batteries;
lithium ion;
estimation;
secure estimation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3111219
Abstract: In leader-following formation, the leader plays a central role and is more vulnerable to malicious attacks. To effectively protect the leader, this article investigates an event-based formation control problem of autonomous surface vehicles (ASVs) with…
read more here.
Keywords:
event;
autonomous surface;
scheme;
formation keeping ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Network Science and Engineering"
DOI: 10.1109/tnse.2022.3225146
Abstract: This paper is concerned with the detection of malicious attacks during the operation of switched systems. A novel game-theoretic switching detection scheme is proposed where the switching between subsystems is constructed aiming to reveal the…
read more here.
Keywords:
switched systems;
game theoretic;
detection malicious;
detection ... See more keywords