{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T18:00:15Z","timestamp":1775844015441,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00034-023-02409-z","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T11:01:43Z","timestamp":1685358103000},"page":"5958-5977","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Fault Detection Filter Design for Networked Systems with Deception Attacks and Communication Delays"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6846-056X","authenticated-orcid":false,"given":"Khalid","family":"Badie","sequence":"first","affiliation":[]},{"given":"Zakaria","family":"Chalh","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Alfidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"2409_CR1","doi-asserted-by":"publisher","first-page":"33230","DOI":"10.1109\/ACCESS.2022.3161672","volume":"10","author":"W Ao","year":"2022","unstructured":"W. Ao, H. Zhang, N. Zhao, L.I. Minchala, Adaptive neural security control for networked singular systems under deception attacks. IEEE Access 10, 33230\u201333237 (2022)","journal-title":"IEEE Access"},{"issue":"10","key":"2409_CR2","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1002\/acs.3156","volume":"34","author":"K Badie","year":"2020","unstructured":"K. Badie, M. Alfidi, Z. Chalh, Reliable $$H_{\\infty }$$ control for 2-D discrete switched systems with state delays and actuator failures. Int. J. Adapt. Control Signal Process. 34(10), 1383\u20131404 (2020)","journal-title":"Int. J. Adapt. Control Signal Process."},{"issue":"9","key":"2409_CR3","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1007\/s00034-014-9771-z","volume":"33","author":"P Balasubramaniam","year":"2014","unstructured":"P. Balasubramaniam, R. Krishnasamy, Robust exponential stabilization results for impulsive neutral time-delay systems with sector-bounded nonlinearity. Circuits Syst. Signal Process. 33(9), 2741\u20132759 (2014)","journal-title":"Circuits Syst. Signal Process."},{"key":"2409_CR4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970777","volume-title":"Linear matrix inequalities in system and control theory","author":"S Boyd","year":"1994","unstructured":"S. Boyd, L. El Ghaoui, E. Feron, V. Balakrishnan, Linear matrix inequalities in system and control theory, vol. 15 (Siam, Philadelphia, 1994)"},{"key":"2409_CR5","doi-asserted-by":"crossref","unstructured":"A. Cetinkaya, H. Ishii, T. Hayakawa, An overview on denial-of-service attacks in control systems: attack models and security analyses. Entropy 21(2), 210 (2019)","DOI":"10.3390\/e21020210"},{"issue":"3","key":"2409_CR6","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TCSI.2019.2949368","volume":"67","author":"P Cheng","year":"2019","unstructured":"P. Cheng, J. Wang, S. He, X. Luan, F. Liu, Observer-based asynchronous fault detection for conic-type nonlinear jumping systems and its application to separately excited DC motor. IEEE Trans. Circuits Syst. I Regul. Pap. 67(3), 951\u2013962 (2019)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"8","key":"2409_CR7","doi-asserted-by":"publisher","first-page":"7352","DOI":"10.1109\/TCYB.2021.3050209","volume":"52","author":"P Cheng","year":"2021","unstructured":"P. Cheng, S. He, V. Stojanovic, X. Luan, F. Liu, Fuzzy fault detection for Markov jump systems with partly accessible hidden information: an event-triggered approach. IEEE Trans. Cybern. 52(8), 7352\u20137361 (2021)","journal-title":"IEEE Trans. Cybern."},{"issue":"5","key":"2409_CR8","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1109\/TFUZZ.2016.2593921","volume":"25","author":"A Chibani","year":"2016","unstructured":"A. Chibani, M. Chadli, P. Shi, N.B. Braiek, Fuzzy fault detection filter design for T-S fuzzy systems in the finite-frequency domain. IEEE Trans. Fuzzy Syst. 25(5), 1051\u20131061 (2016)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"2409_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.automatica.2018.03.024","volume":"93","author":"A Chibani","year":"2018","unstructured":"A. Chibani, M. Chadli, S.X. Ding, N.B. Braiek, Design of robust fuzzy fault detection filter for polynomial fuzzy systems with new finite frequency specifications. Automatica 93, 42\u201354 (2018)","journal-title":"Automatica"},{"key":"2409_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2021.126593","volume":"412","author":"S Dai","year":"2022","unstructured":"S. Dai, L. Zha, J. Liu, X. Xie, E. Tian, Fault detection filter design for networked systems with cyber attacks. Appl. Math. Comput. 412, 126593 (2022)","journal-title":"Appl. Math. Comput."},{"key":"2409_CR11","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"D. Ding, Q.L. Han, Y. Xiang, X. Ge, X.M. Zhang, A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275, 1674\u20131683 (2018)","journal-title":"Neurocomputing"},{"key":"2409_CR12","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ins.2018.04.085","volume":"459","author":"D Du","year":"2018","unstructured":"D. Du, C. Zhang, H. Wang, X. Li, H. Hu, T. Yang, Stability analysis of token-based wireless networked control systems under deception attacks. Inf. Sci. 459, 168\u2013182 (2018)","journal-title":"Inf. Sci."},{"key":"2409_CR13","doi-asserted-by":"publisher","first-page":"7090","DOI":"10.1109\/TSMC.2022.3150154","volume":"52","author":"Z Duan","year":"2022","unstructured":"Z. Duan, J. Fu, C.K. Ahn, Z. Xiang, I. Ghous, Mixed $${l}1\/{l}$$_fault detection for positive 2-D systems with distributed delays. IEEE Trans. Syst. Man Cybern. Syst. 52, 7090\u20137100 (2022)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"2409_CR14","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6618105","author":"R El Abbadi","year":"2021","unstructured":"R. El Abbadi, H. Jamouli, Takagi\u2013Sugeno fuzzy control for a nonlinear networked system exposed to a replay attack. Math. Probl. Eng. (2021). https:\/\/doi.org\/10.1155\/2021\/6618105","journal-title":"Math. Probl. Eng."},{"issue":"1","key":"2409_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1080\/00207721.2019.1701132","volume":"51","author":"A Elahi","year":"2020","unstructured":"A. Elahi, A. Alfi, Finite-time stabilisation of discrete networked cascade control systems under transmission delay and packet dropout via static output feedback control. Int. J. Syst. Sci. 51(1), 87\u2013101 (2020)","journal-title":"Int. J. Syst. Sci."},{"issue":"6","key":"2409_CR16","doi-asserted-by":"publisher","first-page":"3757","DOI":"10.1109\/TIE.2015.2417501","volume":"62","author":"Z Gao","year":"2015","unstructured":"Z. Gao, C. Cecati, S.X. Ding, A survey of fault diagnosis and fault-tolerant techniques-Part I: fault diagnosis with model-based and signal-based approaches. IEEE Trans. Industr. Electron. 62(6), 3757\u20133767 (2015)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"2409_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ins.2015.07.047","volume":"380","author":"X Ge","year":"2017","unstructured":"X. Ge, F. Yang, Q.L. Han, Distributed networked control systems: a brief overview. Inf. Sci. 380, 117\u2013131 (2017)","journal-title":"Inf. Sci."},{"issue":"11","key":"2409_CR18","doi-asserted-by":"publisher","first-page":"2634","DOI":"10.1016\/j.automatica.2009.07.020","volume":"45","author":"X He","year":"2009","unstructured":"X. He, Z. Wang, D.H. Zhou, Robust fault detection for networked systems with communication delay and data missing. Automatica 45(11), 2634\u20132639 (2009)","journal-title":"Automatica"},{"issue":"16","key":"2409_CR19","doi-asserted-by":"publisher","first-page":"8193","DOI":"10.1016\/j.jfranklin.2021.08.015","volume":"358","author":"Z Hu","year":"2021","unstructured":"Z. Hu, F. Deng, Y. Su, J. Zhang, S. Hu, Security control of networked systems with deception attacks and packet dropouts: a discrete-time approach. J. Franklin Inst. 358(16), 8193\u20138206 (2021)","journal-title":"J. Franklin Inst."},{"key":"2409_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3176538","author":"F Jia","year":"2022","unstructured":"F. Jia, F. Cao, G. Lyu, X. He, A novel framework of cooperative design: bringing active fault diagnosis into fault-tolerant control. IEEE Trans. Cybern. (2022). https:\/\/doi.org\/10.1109\/TCYB.2022.3176538","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"2409_CR21","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.sigpro.2012.08.018","volume":"93","author":"L Li","year":"2013","unstructured":"L. Li, F. Li, Z. Zhang, J. Xu, On mode-dependent $$H_{\\infty }$$ filtering for network-based discrete-time systems. Signal Process. 93(4), 634\u2013640 (2013)","journal-title":"Signal Process."},{"issue":"9","key":"2409_CR22","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1177\/0142331218799818","volume":"41","author":"M Li","year":"2019","unstructured":"M. Li, Y. Chen, Challenging research for networked control systems: A survey. Trans. Inst. Meas. Control. 41(9), 2400\u20132418 (2019)","journal-title":"Trans. Inst. Meas. Control."},{"issue":"17","key":"2409_CR23","doi-asserted-by":"publisher","first-page":"13125","DOI":"10.1016\/j.jfranklin.2020.09.014","volume":"357","author":"R Li","year":"2020","unstructured":"R. Li, Y. Yang, Fault detection for TS fuzzy singular systems via integral sliding modes. J. Franklin Inst. 357(17), 13125\u201313143 (2020)","journal-title":"J. Franklin Inst."},{"key":"2409_CR24","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.ins.2021.03.050","volume":"567","author":"Z Lian","year":"2021","unstructured":"Z. Lian, P. Shi, C.C. Lim, Hybrid-triggered interval type-2 fuzzy control for networked systems under attacks. Inf. Sci. 567, 332\u2013347 (2021)","journal-title":"Inf. Sci."},{"issue":"9","key":"2409_CR25","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1016\/j.jfranklin.2013.06.021","volume":"350","author":"J Liu","year":"2013","unstructured":"J. Liu, D. Yue, Event-based fault detection for networked systems with communication delay and nonlinear perturbation. J. Franklin Inst. 350(9), 2791\u20132807 (2013)","journal-title":"J. Franklin Inst."},{"issue":"3","key":"2409_CR26","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1002\/rnc.4815","volume":"30","author":"J Liu","year":"2020","unstructured":"J. Liu, W. Suo, L. Zha, E. Tian, X. Xie, Security distributed state estimation for nonlinear networked systems against DoS attacks. Int. J. Robust Nonlinear Control 30(3), 1156\u20131180 (2020)","journal-title":"Int. J. Robust Nonlinear Control"},{"issue":"14","key":"2409_CR27","doi-asserted-by":"publisher","first-page":"2410","DOI":"10.1002\/rnc.3688","volume":"27","author":"Y Long","year":"2017","unstructured":"Y. Long, J.H. Park, D. Ye, Finite frequency fault detection for networked systems with access constraint. Int. J. Robust Nonlinear Control 27(14), 2410\u20132427 (2017)","journal-title":"Int. J. Robust Nonlinear Control"},{"issue":"12","key":"2409_CR28","doi-asserted-by":"publisher","first-page":"5864","DOI":"10.1109\/TIE.2012.2233692","volume":"60","author":"Y Shi","year":"2012","unstructured":"Y. Shi, J. Huang, B. Yu, Robust tracking control of networked control systems: application to a networked DC motor. IEEE Trans. Ind. Electron. 60(12), 5864\u20135874 (2012)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"1","key":"2409_CR29","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSMC.2022.3176952","volume":"53","author":"P Shi","year":"2022","unstructured":"P. Shi, W. Sun, X. Yang, I.J. Rudas, H. Gao, Master-slave synchronous control of dual-drive gantry stage with cogging force compensation. IEEE Trans. Syst. Man. Cybern. Syst. 53(1), 216\u2013225 (2022)","journal-title":"IEEE Trans. Syst. Man. Cybern. Syst."},{"issue":"9","key":"2409_CR30","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.1109\/TSMC.2018.2866876","volume":"50","author":"T Sun","year":"2018","unstructured":"T. Sun, D. Zhou, Y. Zhu, M.V. Basin, Stability, $$ l_2 $$-gain analysis, and parity space-based fault detection for discrete-time switched systems under dwell-time switching. IEEE Trans. Syst. Man Cybern. Syst. 50(9), 3358\u20133368 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"1","key":"2409_CR31","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1002\/asjc.915","volume":"17","author":"Y Wang","year":"2015","unstructured":"Y. Wang, S. Zhang, J. Lu, F. Chen, Fault detection for networked systems with partly known distribution transmission delays. Asian J. Control 17(1), 362\u2013366 (2015)","journal-title":"Asian J. Control"},{"issue":"1","key":"2409_CR32","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1093\/imamci\/dnt035","volume":"32","author":"Y Wang","year":"2015","unstructured":"Y. Wang, S. Zhang, X. Zhang, X. Wang, Fault detection for a class of non-linear networked systems with Markovian transmission delays. IMA J. Math. Control Inf. 32(1), 141\u2013159 (2015)","journal-title":"IMA J. Math. Control Inf."},{"issue":"2","key":"2409_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1049\/iet-spr.2014.0055","volume":"9","author":"Y Wang","year":"2015","unstructured":"Y. Wang, S. Zhang, Y. Li, Fault detection for a class of non-linear networked control systems with data drift. IET Signal Proc. 9(2), 120\u2013129 (2015)","journal-title":"IET Signal Proc."},{"issue":"1","key":"2409_CR34","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/asjc.1872","volume":"21","author":"G Wang","year":"2019","unstructured":"G. Wang, X. Gao, X. Miao, Y. Cao, Fault detection for discrete-time uncertain systems with Polytopic uncertainties: a Markov approach. Asian J. Control 21(1), 277\u2013288 (2019)","journal-title":"Asian J. Control"},{"issue":"6","key":"2409_CR35","doi-asserted-by":"publisher","first-page":"3792","DOI":"10.1016\/j.jfranklin.2019.09.002","volume":"357","author":"J Wu","year":"2020","unstructured":"J. Wu, C. Peng, J. Zhang, B.L. Zhang, Event-triggered finite-time $$H_{\\infty }$$ filtering for networked systems under deception attacks. J. Franklin Inst. 357(6), 3792\u20133808 (2020)","journal-title":"J. Franklin Inst."},{"key":"2409_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3107040","author":"XP Xie","year":"2021","unstructured":"X.P. Xie, J. Lu, D. Yue, D.W. Ding, Enhanced fuzzy fault estimation of discrete-time nonlinear systems via a new real-time gain-scheduling mechanism. IEEE Trans. Cybern. (2021). https:\/\/doi.org\/10.1109\/TCYB.2021.3107040","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"2409_CR37","doi-asserted-by":"publisher","first-page":"4148","DOI":"10.1109\/TIE.2022.3176242","volume":"70","author":"Y Xu","year":"2022","unstructured":"Y. Xu, Z.G. Wu, Y.J. Pan, Observer-based dynamic event-triggered adaptive control of distributed networked systems with application to ground vehicles. IEEE Trans. Ind. Electron. 70(4), 4148\u20134157 (2022)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"3","key":"2409_CR38","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1049\/iet-cta.2012.0600","volume":"7","author":"H Yan","year":"2013","unstructured":"H. Yan, Z. Su, H. Zhang, F. Yang, Observer-based $$H_{\\infty }$$ control for discrete-time stochastic systems with quantisation and random communication delays. IET Control Theory Appl. 7(3), 372\u2013379 (2013)","journal-title":"IET Control Theory Appl."},{"issue":"5","key":"2409_CR39","doi-asserted-by":"publisher","first-page":"4427","DOI":"10.1109\/TSG.2020.2978029","volume":"11","author":"T Yang","year":"2020","unstructured":"T. Yang, Y. Zhang, W. Li, A.Y. Zomaya, Decentralized networked load frequency control in interconnected power systems based on stochastic jump system theory. IEEE Trans. Smart Grid 11(5), 4427\u20134439 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"2409_CR40","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.mechatronics.2013.11.009","volume":"24","author":"S Yin","year":"2014","unstructured":"S. Yin, G. Wang, H.R. Karimi, Data-driven design of robust fault detection system for wind turbines. Mechatronics 24(4), 298\u2013306 (2014)","journal-title":"Mechatronics"},{"key":"2409_CR41","doi-asserted-by":"publisher","first-page":"10789","DOI":"10.1109\/ACCESS.2020.3043238","volume":"9","author":"T Yin","year":"2020","unstructured":"T. Yin, Z. Gu, Security control for adaptive event-triggered networked control systems under deception attacks. IEEE Access 9, 10789\u201310796 (2020)","journal-title":"IEEE Access"},{"key":"2409_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2020.125374","volume":"386","author":"Z Zhang","year":"2020","unstructured":"Z. Zhang, W. Zheng, H.K. Lam, S. Wen, F. Sun, P. Xie, Stability analysis and output feedback control for stochastic networked systems with multiple communication delays and nonlinearities using fuzzy control technique. Appl. Math. Comput. 386, 125374 (2020)","journal-title":"Appl. Math. Comput."},{"issue":"3","key":"2409_CR43","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TAC.2013.2279896","volume":"59","author":"M Zhu","year":"2013","unstructured":"M. Zhu, S. Martinez, On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans. Autom. Control 59(3), 804\u2013808 (2013)","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02409-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02409-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02409-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T14:09:13Z","timestamp":1691762953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02409-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2409"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02409-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"9 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest relevant to this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}