Author of the publication

A Novel Networked Predictive Control Method for Systems with Random Communication Constraints.

, , , , and . J. Syst. Sci. Complex., 34 (4): 1364-1378 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of stealthy false data injection attacks against networked control systems via active data modification., , , , and . Inf. Sci., (2021)A Prediction-Based Approach Realizing Finite-Time Convergence of Networked Control Systems., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (7): 2445-2449 (July 2023)Networked Active Fault-Tolerant Predictive Control for Systems With Random Communication Constraints and Actuator/Sensor Faults., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (4): 2166-2170 (2022)Cloud-Based Time-Varying Formation Predictive Control of Multi-Agent Systems With Random Communication Constraints and Quantized Signals., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (3): 1282-1286 (2022)Distance- and Velocity-Based Collision Avoidance for Time-Varying Formation Control of Second-Order Multi-Agent Systems., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (4): 1253-1257 (2021)Data-Based Predictive Control for Networked Nonlinear Systems With Network-Induced Delay and Packet Dropout., , , and . IEEE Trans. Ind. Electron., 63 (2): 1249-1257 (2016)Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems., , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (1): 206-210 (January 2024)Stealthy FDI Attacks Against Networked Control Systems Using Two Filters With an Arbitrary Gain., , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (7): 3219-3223 (2022)Two networked predictive control methods for output tracking of networked systems with plant-model mismatch., , , , and . Int. J. Syst. Sci., 54 (10): 2073-2088 (July 2023)Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems., , , and . IEEE Trans. Cybern., 53 (10): 6714-6724 (October 2023)