UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
Event-based obstacle avoidance control for time-varying UAV formation under cyber-attacks Journal article
Li, Jiacheng, Liu, Jason J.R., Cheng, Peng, Liu, Chenjun, Zhang, Yuchen, Chen, Bo. Event-based obstacle avoidance control for time-varying UAV formation under cyber-attacks[J]. Journal of the Franklin Institute, 2024, 361(13), 107019.
Authors:  Li, Jiacheng;  Liu, Jason J.R.;  Cheng, Peng;  Liu, Chenjun;  Zhang, Yuchen; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.7/3.5 | Submit date:2024/08/05
Artificial Potential Fields  Denial Of Service  Event-triggering  Obstacle Avoidance Control  Time-varying Uav Formation  
Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks Journal article
Li, Sheng, Zou, Wencheng, Guo, Jian, Xiang, Zhengrong. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks[J]. IEEE Systems Journal, 2022, 16(3), 4423-4432.
Authors:  Li, Sheng;  Zou, Wencheng;  Guo, Jian;  Xiang, Zhengrong
Favorite | TC[WOS]:24 TC[Scopus]:23  IF:4.0/3.9 | Submit date:2022/05/13
Actuators  Consensus Protocol  Cyber Attacks  Cyberattack  Denial-of-service Attack  Fault Tolerant Systems  Fault-tolerant Consensus  Multiagent Systems (Mas)  Security Control  Switched Systems  Switches  Topology  
Decision analysis of network-based intrusion detection systems for denial-of-service attacks Conference paper
Li M., Jia W., Zhao W.. Decision analysis of network-based intrusion detection systems for denial-of-service attacks[C], 2001, 1-6.
Authors:  Li M.;  Jia W.;  Zhao W.
Favorite | TC[WOS]:0 TC[Scopus]:15 | Submit date:2019/02/11
Denial-of-service Attacks  Detection  Network Security  Pattern Matching  Self-similar Traffic