{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T22:43:20Z","timestamp":1773701000221,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11432-023-3929-3","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T21:02:03Z","timestamp":1715806923000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Resilient sliding mode control for 2D CPSs under denial-of-service attacks"],"prefix":"10.1007","volume":"67","author":[{"given":"Lingling","family":"Li","sequence":"first","affiliation":[]},{"given":"Rongni","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Ligang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"3929_CR1","doi-asserted-by":"publisher","first-page":"4886","DOI":"10.1109\/TCYB.2019.2944956","volume":"50","author":"A Y Lu","year":"2020","unstructured":"Lu A Y, Yang G H. Observer-based control for cyber-physical systems under denial-of-service with a decentralized event-triggered scheme. IEEE Trans Cybern, 2020, 50: 4886\u20134895","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR2","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1109\/TCNS.2016.2549640","volume":"4","author":"Y Li","year":"2017","unstructured":"Li Y, Quevedo D E, Dey S, et al. SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans Control Netw Syst, 2017, 4: 632\u2013642","journal-title":"IEEE Trans Control Netw Syst"},{"key":"3929_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ins.2022.04.033","volume":"602","author":"Y C Sun","year":"2022","unstructured":"Sun Y C, Yang G H. Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks. Inf Sci, 2022, 602: 43\u201356","journal-title":"Inf Sci"},{"key":"3929_CR4","doi-asserted-by":"publisher","first-page":"10034","DOI":"10.1109\/TII.2022.3232768","volume":"19","author":"H Chen","year":"2023","unstructured":"Chen H, Zong G, Zhao X, et al. Secure filter design of fuzzy switched CPSs with mismatched modes and application: a multidomain event-triggered strategy. IEEE Trans Ind Inf, 2023, 19: 10034\u201310044","journal-title":"IEEE Trans Ind Inf"},{"key":"3929_CR5","doi-asserted-by":"publisher","first-page":"7803","DOI":"10.1109\/TAC.2023.3246429","volume":"68","author":"H Chen","year":"2023","unstructured":"Chen H, Zong G, Gao F, et al. Probabilistic event-triggered policy for extended dissipative finite-time control of MJSs under cyber-attacks and actuator failures. IEEE Trans Automat Contr, 2023, 68: 7803\u20137810","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR6","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1137\/21M1442036","volume":"61","author":"D Yang","year":"2023","unstructured":"Yang D, Zong G, Shi Y, et al. Adaptive tracking control of hybrid switching markovian systems with its aplications. SIAM J Control Optim, 2023, 61: 434\u2013457","journal-title":"SIAM J Control Optim"},{"key":"3929_CR7","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","volume":"59","author":"H Fawzi","year":"2014","unstructured":"Fawzi H, Tabuada P, Diggavi S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Automat Contr, 2014, 59: 1454\u20131467","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR8","doi-asserted-by":"publisher","first-page":"3420","DOI":"10.1109\/TCYB.2018.2825984","volume":"48","author":"C Wu","year":"2018","unstructured":"Wu C, Hu Z, Liu J, et al. Secure estimation for cyber-physical systems via sliding mode. IEEE Trans Cybern, 2018, 48: 3420\u20133431","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR9","doi-asserted-by":"publisher","first-page":"6058","DOI":"10.1109\/TAC.2017.2652127","volume":"62","author":"X Jin","year":"2017","unstructured":"Jin X, Haddad W M, Yucelen T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Trans Automat Contr, 2017, 62: 6058\u20136064","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR10","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","volume":"60","author":"C de Persis","year":"2015","unstructured":"de Persis C, Tesi P. Input-to-state stabilizing control under denial-of-service. IEEE Trans Automat Contr, 2015, 60: 2930\u20132944","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.automatica.2017.01.031","volume":"79","author":"S Feng","year":"2017","unstructured":"Feng S, Tesi P. Resilient control under denial-of-service: robust design. Automatica, 2017, 79: 42\u201351","journal-title":"Automatica"},{"key":"3929_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TIFS.2019.2917373","volume":"15","author":"C Wu","year":"2019","unstructured":"Wu C, Wu L, Liu J, et al. Active defense-based resilient sliding mode control under denial-of-service attacks. IEEE TransInformForensic Secur, 2019, 15: 237\u2013249","journal-title":"IEEE TransInformForensic Secur"},{"key":"3929_CR13","doi-asserted-by":"publisher","first-page":"3299","DOI":"10.1109\/TAC.2015.2416926","volume":"60","author":"G K Befekadu","year":"2015","unstructured":"Befekadu G K, Gupta V, Antsaklis P J. Risk-sensitive control under Markov modulated denial-of-service (DoS) attack strategies. IEEE Trans Automat Contr, 2015, 60: 3299\u20133304","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR14","doi-asserted-by":"publisher","first-page":"2306","DOI":"10.1109\/TCYB.2020.2975089","volume":"51","author":"R Ma","year":"2021","unstructured":"Ma R, Shi P, Wu L. Dissipativity-based sliding-mode control of cyber-physical systems under denial-of-service attacks. IEEE Trans Cybern, 2021, 51: 2306\u20132318","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR15","doi-asserted-by":"publisher","first-page":"3714","DOI":"10.1109\/TAC.2019.2953210","volume":"65","author":"Y Zhu","year":"2019","unstructured":"Zhu Y, Zheng W X. Observer-based control for cyber-physical systems with periodic DoS attacks via a cyclic switching strategy. IEEE Trans Automat Contr, 2019, 65: 3714\u20133721","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR16","doi-asserted-by":"publisher","first-page":"4271","DOI":"10.1109\/TCYB.2018.2861834","volume":"49","author":"S Hu","year":"2019","unstructured":"Hu S, Yue D, Xie X, et al. Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Trans Cybern, 2019, 49: 4271\u20134281","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TCNS.2016.2613445","volume":"4","author":"V S Dolk","year":"2017","unstructured":"Dolk V S, Tesi P, Persis C D, et al. Event-triggered control systems under denial-of-service attacks. IEEE Trans Control Netw Syst, 2017, 4: 93\u2013105","journal-title":"IEEE Trans Control Netw Syst"},{"key":"3929_CR18","doi-asserted-by":"publisher","first-page":"162203","DOI":"10.1007\/s11432-021-3375-5","volume":"65","author":"Y X Tian","year":"2022","unstructured":"Tian Y X, Li X, Dong B, et al. Event-based sliding mode control under denial-of-service attacks. Sci China Inf Sci, 2022, 65: 162203","journal-title":"Sci China Inf Sci"},{"key":"3929_CR19","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/81.668870","volume":"45","author":"D R Liu","year":"1998","unstructured":"Liu D R. Lyapunov stability of two-dimensional digital filters with overflow nonlinearities. IEEE Trans Circuits Syst I, 1998, 45: 574\u2013577","journal-title":"IEEE Trans Circuits Syst I"},{"key":"3929_CR20","volume-title":"Multidimensional Systems Theory and Applications","author":"N K Bose","year":"2003","unstructured":"Bose N K. Multidimensional Systems Theory and Applications. Dordrecht: Kluwer, 2003"},{"key":"3929_CR21","volume-title":"Two-Dimensional Digital Filters","author":"W S Lu","year":"1992","unstructured":"Lu W S, Antoniou A. Two-Dimensional Digital Filters. New York: Marcel Dekker, 1992"},{"key":"3929_CR22","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.automatica.2010.01.017","volume":"46","author":"C E de Souza","year":"2010","unstructured":"de Souza C E, Xie L, Coutinho D F. Robust filtering for 2-D discrete-time linear systems with convex-bounded parameter uncertainty. Automatica, 2010, 46: 673\u2013681","journal-title":"Automatica"},{"key":"3929_CR23","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1109\/TAC.2015.2398887","volume":"60","author":"C K Ahn","year":"2015","unstructured":"Ahn C K, Shi P, Basin M V. Two-dimensional dissipative control and filtering for Roesser model. IEEE Trans Automat Contr, 2015, 60: 1745\u20131759","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR24","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.automatica.2015.06.008","volume":"59","author":"L Wu","year":"2015","unstructured":"Wu L, Yang R, Shi P, et al. Stability analysis and stabilization of 2-D switched systems under arbitrary and restricted switchings. Automatica, 2015, 59: 206\u2013215","journal-title":"Automatica"},{"key":"3929_CR25","doi-asserted-by":"publisher","first-page":"5463","DOI":"10.1109\/TAC.2017.2697210","volume":"62","author":"Y Wang","year":"2017","unstructured":"Wang Y, Zhao D, Li Y, et al. Unbiased minimum variance fault and state estimation for linear discrete time-varying two-dimensional systems. IEEE Trans Automat Contr, 2017, 62: 5463\u20135469","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13698-1","volume-title":"Filtering and Control for Classes of Two-Dimensional Systems","author":"L Wu","year":"2015","unstructured":"Wu L, Wang Z. Filtering and Control for Classes of Two-Dimensional Systems. London: Springer, 2015"},{"key":"3929_CR27","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TAC.2018.2831176","volume":"64","author":"Z G Wu","year":"2019","unstructured":"Wu Z G, Shen Y, Shi P, et al. H\u221e control for 2D Markov jump systems in Roesser model. IEEE Trans Automat Contr, 2019, 64: 427\u2013432","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR28","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1109\/TCYB.2020.3006329","volume":"52","author":"Y Y Tao","year":"2022","unstructured":"Tao Y Y, Wu Z G, Guo Y. Two-dimensional asynchronous sliding-mode control of Markov jump Roesser systems. IEEE Trans Cybern, 2022, 52: 2543\u20132552","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR29","doi-asserted-by":"publisher","first-page":"2737","DOI":"10.1109\/TSMC.2019.2916417","volume":"51","author":"R Yang","year":"2021","unstructured":"Yang R, Li L, Shi P. Dissipativity-based two-dimensional control and filtering for a class of switched systems. IEEE Trans Syst Man Cybern Syst, 2021, 51: 2737\u20132750","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"3929_CR30","doi-asserted-by":"publisher","first-page":"4153","DOI":"10.1109\/TAC.2019.2895245","volume":"64","author":"J Liang","year":"2019","unstructured":"Liang J, Wang F, Wang Z, et al. Minimum-variance recursive filtering for two-dimensional systems with degraded measurements: boundedness and monotonicity. IEEE Trans Automat Contr, 2019, 64: 4153\u20134166","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR31","doi-asserted-by":"publisher","first-page":"110416","DOI":"10.1016\/j.automatica.2022.110416","volume":"143","author":"K Zhu","year":"2022","unstructured":"Zhu K, Wang Z, Dong H, et al. Set-membership filtering for two-dimensional systems with dynamic event-triggered mechanism. Automatica, 2022, 143: 110416","journal-title":"Automatica"},{"key":"3929_CR32","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1002\/rnc.5310","volume":"31","author":"R Ma","year":"2021","unstructured":"Ma R, Shi P, Wu L. Active resilient control for two-dimensional systems under denial-of-service attacks. Intl J Robust Nonlinear, 2021, 31: 759\u2013771","journal-title":"Intl J Robust Nonlinear"},{"key":"3929_CR33","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/TNSE.2021.3130297","volume":"9","author":"F Wang","year":"2022","unstructured":"Wang F, Wang Z, Liang J, et al. A recursive algorithm for secure filtering for two-dimensional state-saturated systems under network-based deception attacks. IEEE Trans Netw Sci Eng, 2022, 9: 678\u2013688","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"3929_CR34","doi-asserted-by":"publisher","first-page":"3624","DOI":"10.1109\/TFUZZ.2023.3262609","volume":"31","author":"Y Luo","year":"2023","unstructured":"Luo Y, Wang Z, Hu J, et al. Security-guaranteed fuzzy networked state estimation for 2-D systems with multiple sensor arrays subject to deception attacks. IEEE Trans Fuzzy Syst, 2023, 31: 3624\u20133638","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"3929_CR35","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TAC.2012.2211456","volume":"58","author":"L Wu","year":"2013","unstructured":"Wu L, Zheng W X, Gao H. Dissipativity-based sliding mode control of switched stochastic systems. IEEE Trans Automat Contr, 2013, 58: 785\u2013791","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR36","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.automatica.2019.01.029","volume":"103","author":"J Liu","year":"2019","unstructured":"Liu J, Wu L, Wu C, et al. Event-triggering dissipative control of switched stochastic systems via sliding mode. Automatica, 2019, 103: 261\u2013273","journal-title":"Automatica"},{"key":"3929_CR37","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TAC.2019.2926156","volume":"65","author":"Z Cao","year":"2020","unstructured":"Cao Z, Niu Y, Song J. Finite-time sliding-mode control of Markovian jump cyber-physical systems against randomly occurring injection attacks. IEEE Trans Automat Contr, 2020, 65: 1264\u20131271","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR38","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1109\/TAC.2018.2867340","volume":"64","author":"J Song","year":"2019","unstructured":"Song J, Wang Z, Niu Y. On sliding mode control under stochastic communication protocol. IEEE Trans Automat Contr, 2019, 64: 2174\u20132181","journal-title":"IEEE Trans Automat Contr"},{"key":"3929_CR39","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.automatica.2018.06.035","volume":"96","author":"A K Behera","year":"2018","unstructured":"Behera A K, Bandyopadhyay B, Yu X. Periodic event-triggered sliding mode control. Automatica, 2018, 96: 61\u201372","journal-title":"Automatica"},{"key":"3929_CR40","doi-asserted-by":"publisher","first-page":"108813","DOI":"10.1016\/j.automatica.2020.108813","volume":"114","author":"R Yang","year":"2020","unstructured":"Yang R, Zheng W X, Yu Y. Event-triggered sliding mode control of discrete-time two-dimensional systems in Roesser model. Automatica, 2020, 114: 108813","journal-title":"Automatica"},{"key":"3929_CR41","doi-asserted-by":"publisher","first-page":"4581","DOI":"10.1109\/TCYB.2019.2959139","volume":"51","author":"J Song","year":"2021","unstructured":"Song J, Niu Y. Co-design of 2-D event generator and sliding mode controller for 2-D Roesser model via genetic algorithm. IEEE Trans Cybern, 2021, 51: 4581\u20134590","journal-title":"IEEE Trans Cybern"},{"key":"3929_CR42","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1016\/j.jfranklin.2018.11.017","volume":"356","author":"R Yang","year":"2019","unstructured":"Yang R, Zheng W X. Model transformation based sliding mode control of discrete-time two-dimensional Fornasin-Marchesini systems. J Franklin Inst, 2019, 356: 2463\u20132473","journal-title":"J Franklin Inst"},{"key":"3929_CR43","first-page":"1228","volume":"69","author":"X Lv","year":"2022","unstructured":"Lv X, Niu Y, Song J. Sliding mode control for uncertain 2D systems under stochastic communication protocol: the Roesser model case. IEEE Trans Circuits Syst II, 2022, 69: 1228\u20131232","journal-title":"IEEE Trans Circuits Syst II"},{"key":"3929_CR44","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.sigpro.2013.11.006","volume":"97","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Shi P, Nguang S K, et al. Observer-based finite-time fuzzy H\u221e control for discrete-time systems with stochastic jumps and time-delays. Signal Processing, 2014, 97: 252\u2013261","journal-title":"Signal Processing"},{"key":"3929_CR45","doi-asserted-by":"publisher","first-page":"4743","DOI":"10.3390\/ijerph17134743","volume":"17","author":"T S Lee","year":"2020","unstructured":"Lee T S, Chen I F, Chang T J, et al. Forecasting weekly influenza outpatient visits using a two-dimensional hierarchical decision tree scheme. Int J Environ Res Public Health, 2020, 17: 4743","journal-title":"Int J Environ Res Public Health"},{"key":"3929_CR46","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1002\/fld.1650140602","volume":"14","author":"J V Soulis","year":"1992","unstructured":"Soulis J V. Computation of two-dimensional dam-break flood flows. Numer Methods Fluids, 1992, 14: 631\u2013664","journal-title":"Numer Methods Fluids"},{"key":"3929_CR47","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00521-019-04566-2","volume":"32","author":"X Li","year":"2020","unstructured":"Li X, Sun Y. Stock intelligent investment strategy based on support vector machine parameter optimization algorithm. Neural Comput Applic, 2020, 32: 1765\u20131775","journal-title":"Neural Comput Applic"},{"key":"3929_CR48","doi-asserted-by":"publisher","first-page":"5066","DOI":"10.1109\/TAC.2019.2907888","volume":"64","author":"L van Hien","year":"2019","unstructured":"van Hien L, Trinh H, Lan-Huong N T. Delay-dependent energy-to-peak stability of 2-D time-delay Roesser systems with multiplicative stochastic noises. IEEE Trans Automat Contr, 2019, 64: 5066\u20135073","journal-title":"IEEE Trans Automat Contr"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3929-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-3929-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3929-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T21:32:50Z","timestamp":1757107970000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-3929-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["3929"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-3929-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"13 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"162202"}}