Results 291 to 300 of about 75,612 (338)
Some of the next articles are maybe not open access.

Resilient Formation Tracking for Networked Swarm Systems Under Malicious Data Deception Attacks

International Journal of Robust and Nonlinear Control
A distributed time‐varying formation tracking method for a leader‐following networked swarm system in the presence of malicious deception attacks is proposed in this paper.
Yishi Liu   +3 more
semanticscholar   +1 more source

An adaptive torus‐event‐based ℋ∞ controller design for networked T‐S fuzzy systems under deception attacks

International Journal of Robust and Nonlinear Control, 2021
This article addresses the adaptive torus‐event‐based ℋ∞ control problem for a class of networked Takagi‐Sugeno (T‐S) fuzzy systems under deception attacks.
Shuangxin Zhu   +3 more
semanticscholar   +1 more source

Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks

IEEE/CAA Journal of Automatica Sinica, 2020
Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of
Wangli He, Zekun Mo, Q. Han, F. Qian
semanticscholar   +1 more source

Assessing Deception Differences with Mimicry Deception Theory

Journal of Personality Assessment, 2021
Mimicry Deception Theory (MDT) argues that deception varies along a long- to short-term continuum. Long-term deception involves complex deception, community integration, slow resource extraction, and low detectability, whereas short-term deception is the opposite.
Melissa S, de Roos, Daniel N, Jones
openaire   +2 more sources

Observer-Based Adaptive Fuzzy Consensus Control of Nonlinear Multiagent Systems Encountering Deception Attacks

IEEE Transactions on Industrial Informatics
This article investigates the fuzzy adaptive output-feedback consensus control problem for nonlinear multiagent systems with network communication encountering deception attacks.
Lexin Chen, Shaocheng Tong
semanticscholar   +1 more source

Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks

IEEE Transactions on Cybernetics, 2020
This paper is concerned with secure ${\ell _{1}}$ -gain performance analysis and distributed finite-time filter design for a positive discrete-time linear system over a sensor network in the presence of deception attacks.
Shunyuan Xiao   +3 more
semanticscholar   +1 more source

Resilient Cooperative Source Seeking of Double-Integrator Multi-Robot Systems Under Deception Attacks

IEEE transactions on industrial electronics (1982. Print), 2021
The resilient cooperative source seeking problem of double-integrator multi-robot systems under $\mathbf {d}$-local deception attacks is investigated. In this article, we first propose a resilient cooperative control algorithm and present a necessary and
Weiming Fu   +4 more
semanticscholar   +1 more source

Target Detection for Multistatic Radar in the Presence of Deception Jamming

IEEE Sensors Journal, 2021
This study investigates the target detection problem of multistatic radar in the presence of deception jamming. A detection algorithm based on non-coherent integration is presented to determine whether a target exists in each probed spatial resolution ...
Shiyu Zhang   +4 more
semanticscholar   +1 more source

Self-deception

The Philosophical Quarterly, 1983
Philosophical work on self-deception revolves around a trio of questions. What is self-deception? Is self-deception possible? How are instances of self-deception to be explained? The extent to which self-deception is analogous to interpersonal deception is controversial, partly because certain analogies threaten to render the possibility of self ...
openaire   +1 more source

Resilient control of networked control systems under deception attacks: A memory‐event‐triggered communication scheme

International Journal of Robust and Nonlinear Control, 2019
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication ...
Kunyu Wang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy