Netinfo Security ›› 2025, Vol. 25 ›› Issue (12): 1889-1900.doi: 10.3969/j.issn.1671-1122.2025.12.005
Previous Articles Next Articles
XIE Xiangpeng1, SHAO Xingchen2(
)
Received:2025-09-24
Online:2025-12-10
Published:2026-01-06
Contact:
SHAO Xingchen
E-mail:1023051306@njupt.edu.cn
CLC Number:
XIE Xiangpeng, SHAO Xingchen. Secure Gain-Scheduling Method for Stochastic Nonlinear CPS Based on Dual-Domain Polynomial Framework[J]. Netinfo Security, 2025, 25(12): 1889-1900.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2025.12.005
| [1] | JIN Zengwang, JIANG Lingyang, DING Junyi, et al. A Review of Research on Industrial Control System Security[J]. Netinfo Security, 2025, 25(3): 341-363. |
| 金增旺, 江令洋, 丁俊怡, 等. 工业控制系统安全研究综述[J]. 信息网络安全, 2025, 25(3):341-363. | |
| [2] |
HUANG Penghao, KIM J, KUMAR P R, et al. Enhancing Cybersecurity for Industrial Control Systems: Innovations in Protecting PLC-Dependent Industrial Infrastructures[J]. IEEE Internet of Things Journal, 2024, 11(22): 36486-36493.
doi: 10.1109/JIOT.2024.3408098 URL |
| [3] |
AHMED I, JEON G, PICCIALLI F. From Artificial Intelligence to Explainable Artificial Intelligence in Industry 4.0: A Survey on What, How, and Where[J]. IEEE Transactions on Industrial Informatics, 2022, 18(8): 5031-5042.
doi: 10.1109/TII.2022.3146552 URL |
| [4] |
JI Zhiduo, CHEN Cailian, HE Jianping, et al. Edge Sensing and Control Co-Design for Industrial Cyber-Physical Systems: Observability Guaranteed Method[J]. IEEE Transactions on Cybernetics, 2022, 52(12): 13350-13362.
doi: 10.1109/TCYB.2021.3079149 URL |
| [5] |
FARIVAR F, HAGHIGHI M S, JOLFAEI A, et al. Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2020, 16(4): 2716-2725.
doi: 10.1109/TII.9424 URL |
| [6] | YAN Shen, GU Zhou, PARK J H. Lyapunov-Function-Based Event-Triggered Control of Nonlinear Discrete-Time Cyber-Physical Systems[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2022, 69(6): 2817-2821. |
| [7] |
YUAN Xu, YANG Bin, ZHAO Xudong. Adaptive Neural Event-Triggered Fault-Tolerant Control for Uncertain Nonlinear Cyber-Physical Systems with Sensor and Actuator Faults via Triggered Output Feedback[J]. IEEE Transactions on Cybernetics, 2025, 55(8): 3891-3901.
doi: 10.1109/TCYB.2025.3575516 pmid: 40531635 |
| [8] |
CHEN Zebin, YU Zhaoxu, LI Shugang. Output Feedback Adaptive Fuzzy Inverse Optimal Security Control against Sensor and Actuator Attacks for Nonlinear Cyber-Physical Systems[J]. IEEE Transactions on Fuzzy Systems, 2024, 32(5): 2554-2566.
doi: 10.1109/TFUZZ.2024.3353813 URL |
| [9] |
MA Jiawei, ZHANG Huaguang, ZHANG Juan, et al. Event-Based Adaptive Fault-Tolerant Control for Nonlinear Cyber-Physical Systems via Intermittent Available Signals[J]. IEEE Transactions on Automation Science and Engineering, 2025, 22: 19850-19859.
doi: 10.1109/TASE.2025.3598307 URL |
| [10] | ZHANG Meng, SHEN Chao, WU Zhengguang. Asynchronous Observer-Based Control for Exponential Stabilization of Markov Jump Systems[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2020, 67(10): 2039-2043. |
| [11] | ZHANG Yifang, WU Zhengguang. Asynchronous Control of Markov Jump Systems under Aperiodic DoS Attacks[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2023, 70(2): 685-689. |
| [12] |
WU Zhengguang, SHEN Ying, SHI Peng, et al. ${{\text{H}}_{\infty }}$ Control for 2-D Markov Jump Systems in Roesser Model[J]. IEEE Transactions on Automatic Control, 2019, 64(1): 427-432.
doi: 10.1109/TAC.2018.2831176 URL |
| [13] | SHEN Hao, WU Jiacheng, WANG Yun, et al. Reinforcement Learning-Based Robust Tracking Control for Unknown Markov Jump Systems and Its Application[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2023, 71(3): 1211-1215. |
| [14] | BEYHAN S. Fuzzy Emulated Symbolic Regression for Modelling and Control of Markov Jump Systems with Unknown Transition Rates[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2022, 69(3): 1352-1356. |
| [15] |
LIU Xinmiao, WANG Zhuping, ZHANG Hao, et al. Asynchronous Sliding Mode Control for Nonlinear Markov Jumping Systems with PDT-Switched Transition Probabilities[J]. IEEE Transactions on Fuzzy Systems, 2023, 31(10): 3598-3609.
doi: 10.1109/TFUZZ.2023.3262064 URL |
| [16] |
TAO Yueyue, CHE Weiwei, WU Zhengguang, et al. Asynchronous Control of 2-D Markov Jump Roesser Systems with Nonideal Transition Probabilities[J]. IEEE Transactions on Cybernetics, 2024, 54(11): 6643-6652.
doi: 10.1109/TCYB.2024.3433522 pmid: 39093678 |
| [17] | TAO Yueyue, WU Zhengguang. Optimal Asynchronous Control of Discrete-Time Hidden Markov Jump Systems with Complex Transition Probabilities[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2024, 54(2): 1159-1167. |
| [18] | CHEN Da, CAI Xiao, SUN Yanbin, et al. Optimization of Data Conflict and DDoS Attack Defense Mechanisms in Industrial Control Systems Based on Greedy Algorithm[J]. Netinfo Security, 2025, 25(6): 943-954. |
| 陈大, 蔡肖, 孙彦斌, 等. 基于贪心算法优化工业控制系统数据冲突与DDoS攻击防御机制[J]. 信息网络安全, 2025, 25(6):943-954. | |
| [19] |
BI Yannan, WANG Tong, QIU Jianbin, et al. Adaptive Decentralized Finite-Time Fuzzy Secure Control for Uncertain Nonlinear CPSS under Deception Attacks[J]. IEEE Transactions on Fuzzy Systems, 2023, 31(8): 2568-2580.
doi: 10.1109/TFUZZ.2022.3229487 URL |
| [20] |
CUAN Zhaoyang, DING Dawei. Fixed-Time Adaptive Fuzzy Tracking Control for Uncertain Nonlinear Cyber-Physical Systems against Malicious Attacks[J]. IEEE Transactions on Network Science and Engineering, 2024, 11(1): 128-139.
doi: 10.1109/TNSE.2023.3292843 URL |
| [21] |
LI Zhiqiang, LI Qing, DING Dawei, et al. Robust Resilient Control for Nonlinear Systems under Denial-of-Service Attacks[J]. IEEE Transactions on Fuzzy Systems, 2020, 29(11): 3415-3427.
doi: 10.1109/TFUZZ.2020.3022566 URL |
| [22] |
YAN Huaicheng, WANG Jiangning, ZHANG Hao, et al. Event-Based Security Control for Stochastic Networked Systems Subject to Attacks[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 50(11): 4643-4654.
doi: 10.1109/TSMC.6221021 URL |
| [23] |
ZENG Pengyu, DENG Feiqi, ZHANG Hongyang, et al. Event-Based $H_\infty$Control for Discrete-Time Fuzzy Markov Jump Systems Subject to DoS Attacks[J]. IEEE Transactions on Fuzzy Systems, 2022, 30(6): 1853-1863.
doi: 10.1109/TFUZZ.2021.3069345 URL |
| [1] | SHI Kaibo, DING Jia, WANG Jun, CAI Xiao. Supervised Restart-Based Cybersecurity Defense Strategy for Power Systems [J]. Netinfo Security, 2025, 25(6): 910-919. |
| [2] | CHEN Da, CAI Xiao, SUN Yanbin, DONG Chongwu. Optimization of Data Conf lict and DDoS Attack Defense Mechanisms in Industrial Control Systems Based on Greedy Algorithm [J]. Netinfo Security, 2025, 25(6): 943-954. |
| [3] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
| [4] | WANG Jian, CHEN Lin, WANG Kailun, LIU Jiqiang. Application Layer DDoS Detection Method Based on Spatio-Temporal Graph Neural Network [J]. Netinfo Security, 2024, 24(4): 509-519. |
| [5] | JIANG Kui, LU Lufan, SU Yaoyang, NIE Wei. SHDoS Attack Detection Research Based on Attention-GRU [J]. Netinfo Security, 2024, 24(3): 427-437. |
| [6] | YIN Jie, CHEN Pu, YANG Guinian, XIE Wenwei, LIANG Guangjun. Detection of DDoS Attacks in the Internet of Things Based on Artificial Intelligence [J]. Netinfo Security, 2024, 24(11): 1615-1623. |
| [7] | JIANG Yingzhao, CHEN Lei, YAN Qiao. Distributed Denial of Service Attack Detection Algorithm Based on Two-Channel Feature Fusion [J]. Netinfo Security, 2023, 23(7): 86-97. |
| [8] | FAN Mingyu, LI Ke. A Method to Distinguish DDoS Attack Types Based on RNN [J]. Netinfo Security, 2022, 22(7): 1-8. |
| [9] | LUO Wenhua, CHENG Jiaxing. Hybrid DDoS Attack Distributed Detection System Based on Hadoop Architecture [J]. Netinfo Security, 2021, 21(2): 61-69. |
| [10] | WANG Jian, WANG Yujie, HAN Lei. DDoS Attack Detection Based on Catastrophe Theory in SDN Environment [J]. Netinfo Security, 2020, 20(5): 11-20. |
| [11] | Zewen MA, Yang LIU, Hongping XU, Hang YI. DoS Traffic Identification Technology Based on Integrated Learning [J]. Netinfo Security, 2019, 19(9): 115-119. |
| [12] | Ke ZHANG, Youjie WANG, Shaoyin CHENG, Lidong WANG. Intrusion Collaborative Disposal Method of Spoofed IP Address in DDoS Attacks [J]. Netinfo Security, 2019, 19(5): 22-29. |
| [13] | Zhibin YU, Cheng MA, Siqi LI, Miao WANG. Research on DDoS Attack Model Based on Web Application Layer [J]. Netinfo Security, 2019, 19(5): 84-90. |
| [14] | ZHANG Xuebo, LIU Jinghao, FU Xiaomei. Design and Implementation of Anti Web DDoS Attack Model Based on Improved Logistic Regression Algorithm [J]. 信息网络安全, 2017, 17(6): 62-67. |
| [15] | Kunlun PENG, Wei PENG, Dongxia WANG, Qianqian XING. Research Survey on Security Issues in Cyber-Physical Systems [J]. Netinfo Security, 2016, 16(7): 20-28. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||