{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:11:30Z","timestamp":1770682290522,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T00:00:00Z","timestamp":1752796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T00:00:00Z","timestamp":1752796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62003124, 62103129"],"award-info":[{"award-number":["62003124, 62103129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2024202009, F2019202363, F2022202046"],"award-info":[{"award-number":["F2024202009, F2019202363, F2022202046"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["22JCYBJC01740"],"award-info":[{"award-number":["22JCYBJC01740"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00034-025-03237-z","type":"journal-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T17:12:01Z","timestamp":1752858721000},"page":"9039-9064","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Variable-Step Predictive Compensation for Networked Control Systems Subject to Hybrid Attacks"],"prefix":"10.1007","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2112-1069","authenticated-orcid":false,"given":"Li","family":"Hongchao","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Jianchao","sequence":"additional","affiliation":[]},{"given":"Zuo","family":"Zhiqiang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yapeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,18]]},"reference":[{"issue":"12","key":"3237_CR1","doi-asserted-by":"publisher","first-page":"10095","DOI":"10.1007\/s11071-024-09599-4","volume":"112","author":"CJ Zhang","year":"2024","unstructured":"C.J. Zhang, L.H. Ji, S.S. Yang, X. Guo, H.Q. Li, Time-varying formation optimization tracking of multi-agent systems with semi-Markov switching topology. Nonlinear Dyn. 112(12), 10095\u201310108 (2024)","journal-title":"Nonlinear Dyn."},{"key":"3237_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.future.2021.03.008","volume":"122","author":"RX Qi","year":"2021","unstructured":"R.X. Qi, S. Ji, J. Shen, P. Vijayakumar, N. Kumar, Security preservation in industrial medical CPS using Chebyshev map: An AI approach. Futur. Gener. Comp. Syst. 122, 52\u201362 (2021)","journal-title":"Futur. Gener. Comp. Syst."},{"issue":"5","key":"3237_CR3","doi-asserted-by":"publisher","first-page":"7502","DOI":"10.1109\/TII.2024.3357194","volume":"20","author":"X Lin","year":"2024","unstructured":"X. Lin, R. Xu, W. Yao et al., Observer-based prescribed performance speed control for PMSMs: a data-driven RBF neural network approach[J]. IEEE Trans. Ind. Inform. 20(5), 7502\u20137512 (2024)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"3237_CR4","doi-asserted-by":"publisher","first-page":"107204","DOI":"10.1016\/j.compeleceng.2021.107204","volume":"93","author":"I Priyadarshini","year":"2021","unstructured":"I. Priyadarshini, R. Kumar, R. Sharma, K.P. Singh, S.C. Satapathy, Identifying cyber insecurities in trustworthy space and energy sector for smart grids. Comput. Electr. Eng. 93, 107204 (2021)","journal-title":"Comput. Electr. Eng."},{"issue":"23","key":"3237_CR5","doi-asserted-by":"publisher","first-page":"21627","DOI":"10.1007\/s11071-023-08906-9","volume":"111","author":"WX Wang","year":"2023","unstructured":"W.X. Wang, J.B. Peng, S.S. Xie, Z.F. Zhang, G.R. Wen, Y. Zhang, H. Wang, Exponential stabilization of aero-engine T-S fuzzy system with decentralized dynamic event-triggered mechanism. Nonlinear Dyn. 111(23), 21627\u201321646 (2023)","journal-title":"Nonlinear Dyn."},{"key":"3237_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1051\/mmnp\/2022040","volume":"17","author":"A Arbi","year":"2022","unstructured":"A. Arbi, Controllability of delayed discret Fornasini-Marchesini model via quantization and random packet dropouts. Math. Model. Natural Phenomena 17, 38 (2022)","journal-title":"Math. Model. Natural Phenomena"},{"issue":"10","key":"3237_CR7","doi-asserted-by":"publisher","first-page":"6187","DOI":"10.1007\/s00034-024-02738-7","volume":"43","author":"XY Han","year":"2024","unstructured":"X.Y. Han, B.W. Wu, L.L. Liu, W.Z. Li, L.Q. Huang, Master-Slave Synchronization of Switched Nonlinear Systems Based on Quantization and Switching Event-Triggered Strategy[J]. Circuits Syst. Signal Process. 43(10), 6187\u20136210 (2024)","journal-title":"Circuits Syst. Signal Process."},{"key":"3237_CR8","doi-asserted-by":"crossref","unstructured":"M. Hosseinzadeh, B. Sinopoli, E. Garone, Feasibility and detection of replay attack in networked constrained cyber-physical systems[C]. Annu. Allerton Conf. Commun., Control, Comput., Allerton, IEEE, 712-717 (2019)","DOI":"10.1109\/ALLERTON.2019.8919762"},{"issue":"13","key":"3237_CR9","doi-asserted-by":"publisher","first-page":"12253","DOI":"10.1007\/s11071-023-08492-w","volume":"111","author":"ZY Duan","year":"2023","unstructured":"Z.Y. Duan, A.R. Wei, X.F. Zhang, R. Mu, Sampled-data consensus control for nonlinear time-delay multi-agent systems under false data injection attacks. Nonlinear Dyn. 111(13), 12253\u201312266 (2023)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"3237_CR10","first-page":"1636","volume":"9","author":"A Ashok","year":"2016","unstructured":"A. Ashok, M. Govindarasu, V. Ajjarapu, Online detection of stealthy false data injection attacks in power system state estimation. IEEE Trans. Smart Grid 9(3), 1636\u20131646 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"3237_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2024.106774","volume":"361","author":"S Barchinezhad","year":"2024","unstructured":"S. Barchinezhad, M.S. Haghighi, V. Puig, Identification and analysis of stochastic deception attacks on cyber-physical systems. J. Franklin Inst. 361(8), 106774 (2024)","journal-title":"J. Franklin Inst."},{"issue":"7","key":"3237_CR12","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1080\/00207721.2020.1858205","volume":"52","author":"A Kazemy","year":"2021","unstructured":"A. Kazemy, J. Lam, Z. Chang, Adaptive event-triggered mechanism for networked control systems under deception attacks with uncertain occurring probability. Int. J. Syst. Sci. 52(7), 1426\u20131439 (2021)","journal-title":"Int. J. Syst. Sci."},{"issue":"2","key":"3237_CR13","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TCNS.2022.3210858","volume":"10","author":"XY Zheng","year":"2022","unstructured":"X.Y. Zheng, H. Zhang, L.K. Wang, H.C. Yan, Dynamic event-based distributed piecewise filtering over sensor networks under periodic DoS attacks. IEEE Trans. Control Netw. Syst. 10(2), 853\u2013864 (2022)","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"3237_CR14","doi-asserted-by":"publisher","first-page":"109278","DOI":"10.1016\/j.ijepes.2023.109278","volume":"153","author":"M Fallahnejad","year":"2023","unstructured":"M. Fallahnejad, A. Kazemy, M. Shafiee, Event-triggered $$\\cal{H} _{\\infty }$$ stabilization of networked cascade control systems under periodic DoS attack: A switching approach. Int. J. Electr. Power Energy Syst. 153, 109278 (2023)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"3237_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.isatra.2021.10.030","volume":"128","author":"JQ Wang","year":"2022","unstructured":"J.Q. Wang, J.F. Gao, P. Wu, Attack-resilient event-triggered formation control of multi-agent systems under periodic DoS attacks using complex Laplacian. ISA Trans. 128, 10\u201316 (2022)","journal-title":"ISA Trans."},{"issue":"8","key":"3237_CR16","doi-asserted-by":"publisher","first-page":"3714","DOI":"10.1109\/TAC.2019.2953210","volume":"65","author":"YZ Zhu","year":"2019","unstructured":"Y.Z. Zhu, W.X. Zheng, Observer-based control for cyber-physical systems with periodic DoS attacks via a cyclic switching strategy. IEEE Trans. Autom. Control 65(8), 3714\u20133721 (2019)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"5","key":"3237_CR17","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1007\/s00034-021-01910-7","volume":"41","author":"J Liu","year":"2022","unstructured":"J. Liu, L. Kang, Secure control for cyber-physical systems with positive constraint under DoS attack. Circuits Syst. Signal Process. 41(5), 2947\u20132962 (2022)","journal-title":"Circuits Syst. Signal Process."},{"issue":"3","key":"3237_CR18","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.1007\/s00034-021-01853-z","volume":"41","author":"QY Wang","year":"2022","unstructured":"Q.Y. Wang, F.Z. Zhu, L. Peng, Robust $$\\cal{H} _{\\infty }$$ filtering for semi-Markov jump systems encountering denial-of-service jamming attacks[J]. Circuits Syst. Signal Process. 41(3), 1453\u20131474 (2022)","journal-title":"Circuits Syst. Signal Process."},{"issue":"2","key":"3237_CR19","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s11071-022-07901-w","volume":"111","author":"L Zou","year":"2023","unstructured":"L. Zou, X.B. Liu, Robust adaptive control for a class of networked nonlinear systems under denial-of-service attacks. Nonlinear Dyn. 111(2), 1385\u20131398 (2023)","journal-title":"Nonlinear Dyn."},{"key":"3237_CR20","unstructured":"S.H. Hu, D. Yue, X.L. Chen, X.P. Xie, Resilient $$mathcal H _{\\infty }$$ filtering for event-triggered networked systems under nonperiodic DoS jamming attacks. IEEE Trans. Syst., Man, and Cybern.: Syst. 51(3), 1392\u20131403 (2019)"},{"issue":"3","key":"3237_CR21","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1002\/rnc.7041","volume":"34","author":"SS Zhao","year":"2024","unstructured":"S.S. Zhao, H.Y. Zhang, L.L. Xiong, S.P. Wen, J.D. Cao, Y. Zhang, Resilient adaptive event-triggered synchronization control of piecewise-homogeneous Markov jump delayed neural networks under aperiodic DoS attacks. Int. J. Robust Nonlinear Control 34(3), 1493\u20131521 (2024)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"3237_CR22","first-page":"127419","volume":"434","author":"QX Chen","year":"2022","unstructured":"Q.X. Chen, X.H. Chang, Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber attack. Appl. Math. Comput. 434, 127419 (2022)","journal-title":"Appl. Math. Comput."},{"issue":"8","key":"3237_CR23","doi-asserted-by":"publisher","first-page":"4000","DOI":"10.1109\/TCYB.2020.3003752","volume":"51","author":"JL Liu","year":"2020","unstructured":"J.L. Liu, Y.D. Wang, J.D. Cao, D. Yue, X.P. Xie, Secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. IEEE T. Cybern. 51(8), 4000\u20134010 (2020)","journal-title":"IEEE T. Cybern."},{"issue":"1","key":"3237_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.15388\/NA.2018.1.7","volume":"23","author":"A Arbi","year":"2018","unstructured":"A. Arbi, J. Cao, A. Alsaedi, Improved synchronization analysis of competitive neural networks with time-varying delays. Nonlinear Anal. Modell. Control 23(1), 82\u2013107 (2018)","journal-title":"Nonlinear Anal. Modell. Control"},{"issue":"1","key":"3237_CR25","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s13540-023-00226-4","volume":"27","author":"A Arbi","year":"2024","unstructured":"A. Arbi, Robust model predictive control for fractional-order descriptor systems with uncertainty. Frac. Calculus App. Anal. 27(1), 173\u2013189 (2024)","journal-title":"Frac. Calculus App. Anal."},{"issue":"9","key":"3237_CR26","doi-asserted-by":"publisher","first-page":"4303","DOI":"10.1109\/TAC.2020.3032598","volume":"66","author":"TX Li","year":"2020","unstructured":"T.X. Li, B. Chen, L. Yu, W.A. Zhang, Active security control approach against DoS attacks in cyber-physical systems[J]. IEEE Trans. Autom. Control 66(9), 4303\u20134310 (2020)","journal-title":"IEEE Trans. Autom. Control"},{"key":"3237_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2020.07.004","volume":"542","author":"YR Deng","year":"2021","unstructured":"Y.R. Deng, X.X. Yin, S.L. Hu, Event-triggered predictive control for networked control systems with DoS attacks. Inf. Sci. 542, 71\u201391 (2021)","journal-title":"Inf. Sci."},{"issue":"1","key":"3237_CR28","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/JSYST.2022.3171751","volume":"17","author":"X Li","year":"2022","unstructured":"X. Li, C. Jiang, D.J. Du, W.T. Li, M.R. Fei, L. Wu, A novel state estimation method for smart grid under consecutive denial of service attacks. IEEE Syst. J. 17(1), 513\u2013524 (2022)","journal-title":"IEEE Syst. J."},{"issue":"14","key":"3237_CR29","doi-asserted-by":"publisher","first-page":"8475","DOI":"10.1002\/rnc.6831","volume":"33","author":"HC Li","year":"2023","unstructured":"H.C. Li, H.J. Gao, Z.Q. Zuo, J. Liu, Security control based on variable-step predictive approach for networked control system with denial-of-service attacks. Int. J. Robust Nonlinear Control 33(14), 8475\u20138489 (2023)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"3237_CR30","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.ins.2022.08.093","volume":"612","author":"B Li","year":"2022","unstructured":"B. Li, X. Zhou, Z. Ning, X.Y. Guan, K. Yiu, Dynamic event-triggered security control for networked control systems with cyber-attacs: A model predictive control approach[J]. Inf. Sci. 612, 384\u2013398 (2022)","journal-title":"Inf. Sci."},{"key":"3237_CR31","doi-asserted-by":"crossref","unstructured":"X. Lin, J. Liu, Z. Liu, et\u00a0al. Model-free current predictive control for PMSMs With ultra-local model employing fixed-time observer and extremum-seeking method[J]. IEEE Trans. Power Electron., (2025)","DOI":"10.1109\/TPEL.2025.3553685"},{"issue":"6","key":"3237_CR32","doi-asserted-by":"publisher","first-page":"3820","DOI":"10.1109\/TFUZZ.2018.2849702","volume":"26","author":"JL Liu","year":"2018","unstructured":"J.L. Liu, L.L. Wei, X.P. Xie, E.G. Tian, S.M. Fei, Quantized stabilization for T-S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 26(6), 3820\u20133834 (2018)","journal-title":"IEEE Trans. Fuzzy Syst."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03237-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03237-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03237-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T03:28:53Z","timestamp":1764473333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03237-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,18]]},"references-count":32,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["3237"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03237-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,18]]},"assertion":[{"value":"6 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}