Results 291 to 300 of about 75,612 (338)
Some of the next articles are maybe not open access.
Resilient Formation Tracking for Networked Swarm Systems Under Malicious Data Deception Attacks
International Journal of Robust and Nonlinear ControlA distributed time‐varying formation tracking method for a leader‐following networked swarm system in the presence of malicious deception attacks is proposed in this paper.
Yishi Liu +3 more
semanticscholar +1 more source
International Journal of Robust and Nonlinear Control, 2021
This article addresses the adaptive torus‐event‐based ℋ∞ control problem for a class of networked Takagi‐Sugeno (T‐S) fuzzy systems under deception attacks.
Shuangxin Zhu +3 more
semanticscholar +1 more source
This article addresses the adaptive torus‐event‐based ℋ∞ control problem for a class of networked Takagi‐Sugeno (T‐S) fuzzy systems under deception attacks.
Shuangxin Zhu +3 more
semanticscholar +1 more source
Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks
IEEE/CAA Journal of Automatica Sinica, 2020Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of
Wangli He, Zekun Mo, Q. Han, F. Qian
semanticscholar +1 more source
Assessing Deception Differences with Mimicry Deception Theory
Journal of Personality Assessment, 2021Mimicry Deception Theory (MDT) argues that deception varies along a long- to short-term continuum. Long-term deception involves complex deception, community integration, slow resource extraction, and low detectability, whereas short-term deception is the opposite.
Melissa S, de Roos, Daniel N, Jones
openaire +2 more sources
IEEE Transactions on Industrial Informatics
This article investigates the fuzzy adaptive output-feedback consensus control problem for nonlinear multiagent systems with network communication encountering deception attacks.
Lexin Chen, Shaocheng Tong
semanticscholar +1 more source
This article investigates the fuzzy adaptive output-feedback consensus control problem for nonlinear multiagent systems with network communication encountering deception attacks.
Lexin Chen, Shaocheng Tong
semanticscholar +1 more source
IEEE Transactions on Cybernetics, 2020
This paper is concerned with secure ${\ell _{1}}$ -gain performance analysis and distributed finite-time filter design for a positive discrete-time linear system over a sensor network in the presence of deception attacks.
Shunyuan Xiao +3 more
semanticscholar +1 more source
This paper is concerned with secure ${\ell _{1}}$ -gain performance analysis and distributed finite-time filter design for a positive discrete-time linear system over a sensor network in the presence of deception attacks.
Shunyuan Xiao +3 more
semanticscholar +1 more source
IEEE transactions on industrial electronics (1982. Print), 2021
The resilient cooperative source seeking problem of double-integrator multi-robot systems under $\mathbf {d}$-local deception attacks is investigated. In this article, we first propose a resilient cooperative control algorithm and present a necessary and
Weiming Fu +4 more
semanticscholar +1 more source
The resilient cooperative source seeking problem of double-integrator multi-robot systems under $\mathbf {d}$-local deception attacks is investigated. In this article, we first propose a resilient cooperative control algorithm and present a necessary and
Weiming Fu +4 more
semanticscholar +1 more source
Target Detection for Multistatic Radar in the Presence of Deception Jamming
IEEE Sensors Journal, 2021This study investigates the target detection problem of multistatic radar in the presence of deception jamming. A detection algorithm based on non-coherent integration is presented to determine whether a target exists in each probed spatial resolution ...
Shiyu Zhang +4 more
semanticscholar +1 more source
The Philosophical Quarterly, 1983
Philosophical work on self-deception revolves around a trio of questions. What is self-deception? Is self-deception possible? How are instances of self-deception to be explained? The extent to which self-deception is analogous to interpersonal deception is controversial, partly because certain analogies threaten to render the possibility of self ...
openaire +1 more source
Philosophical work on self-deception revolves around a trio of questions. What is self-deception? Is self-deception possible? How are instances of self-deception to be explained? The extent to which self-deception is analogous to interpersonal deception is controversial, partly because certain analogies threaten to render the possibility of self ...
openaire +1 more source
International Journal of Robust and Nonlinear Control, 2019
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication ...
Kunyu Wang +4 more
semanticscholar +1 more source
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication ...
Kunyu Wang +4 more
semanticscholar +1 more source

