Author of the publication

Fault Detection for Unmanned Marine Vehicles Under Replay Attack.

, , , , and . IEEE Trans. Fuzzy Syst., 31 (5): 1716-1728 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DSC and MLP based robust adaptive NN tracking control for underwater vehicle., , and . Neurocomputing, (2013)A novel single fuzzy approximation based adaptive control for a class of uncertain strict-feedback discrete-time nonlinear systems., , and . Neurocomputing, (2015)Composite Adaptive Fuzzy Output Feedback Control Design for Uncertain Nonlinear Strict-Feedback Systems With Input Saturation., , and . IEEE Trans. Cybern., 45 (10): 2299-2308 (2015)Direct Robust Adaptive NN Tracking Control for Double Inverted Pendulums., , and . ICONIP (5), volume 7667 of Lecture Notes in Computer Science, page 428-436. Springer, (2012)True Coalition Formation of Bio-inspired Mobile Sensors or Robots on Intrusion Detection - Part 1: Theoretical Modeling., , , and . Ad Hoc Sens. Wirel. Networks, 44 (3-4): 173-196 (2019)A Novel Robust Adaptive-Fuzzy-Tracking Control for a Class of NonlinearMulti-Input/Multi-Output Systems., , and . IEEE Trans. Fuzzy Syst., 18 (1): 150-160 (2010)Event-Triggered Finite-Time Control for Networked Switched Linear Systems With Asynchronous Switching., , and . IEEE Trans. Syst. Man Cybern. Syst., 48 (11): 1874-1884 (2018)Adaptive fuzzy modular backstepping output feedback control of uncertain nonlinear systems in the presence of input saturation., , and . Int. J. Machine Learning & Cybernetics, 4 (5): 527-536 (2013)Distributed Optimal Energy Management for We-Energy Considering Operation Security., , , , , and . IEEE Trans. Netw. Sci. Eng., 11 (1): 225-235 (January 2024)Attacks detection and security control for cyber-physical systems under false data injection attacks., , , and . J. Frankl. Inst., 360 (14): 10476-10498 (September 2023)