Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/23449
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, D | - |
dc.contributor.author | Wang, Z | - |
dc.contributor.author | Han, Q-L | - |
dc.contributor.author | Wei, G | - |
dc.date.accessioned | 2021-11-04T15:43:52Z | - |
dc.date.available | 2021-11-04T15:43:52Z | - |
dc.date.issued | 2021-10-12 | - |
dc.identifier.citation | Zhao, D., Wang, Z., Han, Q.-L. and Wei, G. (2021) 'Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant Approach', IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021, 0 (in press), pp. 1 - 13 (13). doi: 10.1109/TSMC.2021.3117742. | en_US |
dc.identifier.issn | 2168-2216 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/23449 | - |
dc.description.sponsorship | National Natural Science Foundation of China (Grant Number: 61873148, 61873169, 61933007 and 62103281); Royal Society of the U.K.; Alexander von Humboldt Foundation of Germany. | en_US |
dc.format.extent | 1 - 13 (13) | - |
dc.format.medium | Print-Electronic | - |
dc.language | en | - |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.rights | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | - |
dc.subject | observers | en_US |
dc.subject | uncertain systems | en_US |
dc.subject | estimation error | en_US |
dc.subject | delay effects | en_US |
dc.subject | security | en_US |
dc.subject | delays | en_US |
dc.subject | technological innovation | en_US |
dc.title | Proportional-Integral Observer Design for Uncertain Time-Delay Systems Subject to Deception Attacks: An Outlier-Resistant Approach | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1109/TSMC.2021.3117742 | - |
dc.relation.isPartOf | IEEE Transactions on Systems, Man, and Cybernetics: Systems | - |
pubs.issue | in press | - |
pubs.publication-status | Published | - |
pubs.volume | 0 | - |
dc.identifier.eissn | 2168-2232 | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | 799.63 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.