{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:25:58Z","timestamp":1762352758505,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T00:00:00Z","timestamp":1551312000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010903","name":"Key Programme","doi-asserted-by":"publisher","award":["61533010"],"award-info":[{"award-number":["61533010"]}],"id":[{"id":"10.13039\/501100010903","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Fuzzy Syst."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s40815-018-0593-1","type":"journal-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T10:04:32Z","timestamp":1551348272000},"page":"700-714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Security Control of Networked T\u2013S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor"],"prefix":"10.1007","volume":"21","author":[{"given":"Hui","family":"Ge","sequence":"first","affiliation":[]},{"given":"Dong","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Xiangpeng","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Song","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Songlin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,28]]},"reference":[{"issue":"1","key":"593_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/JPROC.2011.2160929","volume":"100","author":"P Derler","year":"2012","unstructured":"Derler, P., Lee, E.A., Vincentelli, A.S.: Modeling cyber-physical systems. Proc. IEEE 100(1), 13\u201328 (2012)","journal-title":"Proc. IEEE"},{"issue":"8","key":"593_CR2","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/JPROC.2010.2050377","volume":"98","author":"R Poovendran","year":"2010","unstructured":"Poovendran, R.: Cyber\u2013physical systems: close encounters between two parallel worlds [point of view]. Proc. IEEE 98(8), 1363\u20131366 (2010)","journal-title":"Proc. IEEE"},{"issue":"3","key":"593_CR3","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/9.119645","volume":"37","author":"J Hauser","year":"1989","unstructured":"Hauser, J., Sastry, S., Kokotovic, P.: Nonlinear control via approximate input-output linearization: the ball and beam example. IEEE Trans. Autom. Control 37(3), 392\u2013398 (1989)","journal-title":"IEEE Trans. Autom. Control"},{"key":"593_CR4","first-page":"1","volume":"16","author":"H Ma","year":"2018","unstructured":"Ma, H., Liang, H., Zhou, Q., Ahn, C.K.: Adaptive dynamic surface control design for uncertain nonlinear strict-feedback systems with unknown control direction and disturbances. IEEE Trans. Syst. Man Cybern. Syst. 16, 1\u201310 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"593_CR5","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"15","author":"T Takagi","year":"1985","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. Syst. 15, 116\u2013132 (1985)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"99","key":"593_CR6","first-page":"1","volume":"PP","author":"H Ma","year":"2018","unstructured":"Ma, H., Zhou, Q., Bai, L., Liang, H.: Observer-based adaptive fuzzy fault-tolerant control for stochastic nonstrict-feedback nonlinear systems with input quantization. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1\u201312 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"4","key":"593_CR7","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/TFUZZ.2008.928600","volume":"17","author":"HK Lam","year":"2009","unstructured":"Lam, H.K., Narimani, M.: Stability analysis and performance design for fuzzy-model-based control system under imperfect premise matching. IEEE Trans. Fuzzy Syst. 17(4), 949\u2013961 (2009)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"99","key":"593_CR8","first-page":"1","volume":"PP","author":"C Peng","year":"2018","unstructured":"Peng, C., Wu, M., Xie, X., Wang, Y.: Event-triggered predictive control for networked nonlinear systems with imperfect premise matching. IEEE Trans. Fuzzy Syst. PP(99), 1\u20131 (2018)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"593_CR9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.amc.2017.12.038","volume":"326","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Liang, H., Ma, H., Zhou, Q., Yu, Z.: Distributed adaptive consensus tracking control for nonlinear multi-agent systems with state constraints. Appl. Math. Comput. 326, 16\u201332 (2018)","journal-title":"Appl. Math. Comput."},{"issue":"1","key":"593_CR10","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TFUZZ.2012.2210049","volume":"21","author":"X Xie","year":"2013","unstructured":"Xie, X., Ma, H., Zhao, Y., Ding, D.W., Wang, Y.: Control synthesis of discrete-time TCS fuzzy systems based on a novel non-PDC control scheme. IEEE Trans. Fuzzy Syst. 21(1), 147\u2013157 (2013)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"99","key":"593_CR11","first-page":"1","volume":"PP","author":"C Peng","year":"2017","unstructured":"Peng, C., Ma, S., Xie, X.: Observer-based non-PDC control for networked T\u2013S fuzzy systems with an event-triggered communication. IEEE Trans. Cybern. PP(99), 1\u20139 (2017)","journal-title":"IEEE Trans. Cybern."},{"issue":"1","key":"593_CR12","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TFUZZ.2016.2639564","volume":"26","author":"L Wang","year":"2018","unstructured":"Wang, L., Lam, H.-K.: Local stabilization for continuous-time Takagi\u2013Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(1), 379\u2013385 (2018)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"593_CR13","doi-asserted-by":"publisher","unstructured":"Ren, Y., Li, Q., Ding, D., Xie, X.: Dissipativity-preserving model reduction for Takagi\u2013Sugeno fuzzy systems. IEEE Trans. Fuzzy Syst. (2018). https:\/\/doi.org\/10.1109\/TFUZZ.2018.2866798","DOI":"10.1109\/TFUZZ.2018.2866798"},{"issue":"2","key":"593_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40815-017-0413-z","volume":"20","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Zhou, Q., Wu, C., Li, H.: Dissipativity-based reliable interval type-2 fuzzy filter design for uncertain nonlinear systems. Int. J. Fuzzy Syst. 20(2), 1\u201313 (2018)","journal-title":"Int. J. Fuzzy Syst."},{"key":"593_CR15","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: International Conference on Distributed Computing Systems Workshops, pp.\u00a0495\u2013500 (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"issue":"3","key":"593_CR16","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TCYB.2015.2411336","volume":"46","author":"X Xie","year":"2016","unstructured":"Xie, X., Yue, D., Zhang, H., Xue, Y.: Control synthesis of discrete-time T\u2013S fuzzy systems via a multi-instant homogenous polynomial approach. IEEE Trans. Cybern 46(3), 630\u2013640 (2016)","journal-title":"IEEE Trans. Cybern"},{"issue":"5","key":"593_CR17","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TCYB.2016.2538464","volume":"47","author":"X Su","year":"2016","unstructured":"Su, X., Zhou, H., Song, Y.D.: An optimal divisioning technique to stabilization synthesis of T\u2013S fuzzy delayed systems. IEEE Trans. Cybern. 47(5), 1147\u20131156 (2016)","journal-title":"IEEE Trans. Cybern."},{"key":"593_CR18","doi-asserted-by":"crossref","unstructured":"Lam, H.K., Leung, F.H.F.: LMI-based stability and performance design of fuzzy control systems: fuzzy models and controllers with different premises. In: IEEE International Conference on Fuzzy Systems, pp. 2027\u20132034 (2006)","DOI":"10.1109\/FUZZY.2006.1681981"},{"issue":"12","key":"593_CR19","first-page":"2470","volume":"44","author":"X Su","year":"2017","unstructured":"Su, X., Peng, S., Wu, L., Basin, M.V.: Reliable filtering with strict dissipativity for T\u2013S fuzzy time-delay systems. IEEE Trans. Cybern. 44(12), 2470\u20132483 (2017)","journal-title":"IEEE Trans. Cybern."},{"issue":"99","key":"593_CR20","first-page":"1","volume":"PP","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Xia, Y., Ahn, C.K., Zhu, Y.: Exponential stabilization of Takagi\u2013Sugeno fuzzy systems with aperiodic sampling: an aperiodic adaptive event-triggered method. IEEE Trans. Syst. Man Cybernet. Syst. PP(99), 1\u201311 (2018)","journal-title":"IEEE Trans. Syst. Man Cybernet. Syst."},{"key":"593_CR21","doi-asserted-by":"crossref","unstructured":"Amin, S., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: International Conference on Hybrid Systems: Computation and Control, pp. 31\u201345 (2009)","DOI":"10.1007\/978-3-642-00602-9_3"},{"issue":"11","key":"593_CR22","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","volume":"60","author":"CD Persis","year":"2015","unstructured":"Persis, C.D., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60(11), 2930\u20132944 (2015)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"593_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","volume":"35","author":"RS Smith","year":"2015","unstructured":"Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82\u201392 (2015)","journal-title":"IEEE Control Syst."},{"issue":"1","key":"593_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","volume":"35","author":"Y Mo","year":"2015","unstructured":"Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93\u2013109 (2015)","journal-title":"IEEE Control Syst."},{"key":"593_CR25","doi-asserted-by":"publisher","first-page":"3820","DOI":"10.1109\/TFUZZ.2018.2849702","volume":"26","author":"J Liu","year":"2018","unstructured":"Liu, J., Wei, L., Xie, X., Tian, E., Fei, S.: Quantized stabilization for T\u2013S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 26, 3820 (2018). https:\/\/doi.org\/10.1109\/TFUZZ.2018.2849702","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"11","key":"593_CR26","doi-asserted-by":"publisher","first-page":"2634","DOI":"10.1016\/j.automatica.2009.07.020","volume":"45","author":"X He","year":"2009","unstructured":"He, X., Wang, Z., Zhou, D.H.: Robust fault detection for networked systems with communication delay and data missing. Automatica 45(11), 2634\u20132639 (2009)","journal-title":"Automatica"},{"issue":"9","key":"593_CR27","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TAC.2007.904284","volume":"52","author":"WA Zhang","year":"2007","unstructured":"Zhang, W.A., Yu, L.: Output feedback stabilization of networked control systems with packet dropouts. IEEE Trans. Autom. Control 52(9), 1705\u20131710 (2007)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"99","key":"593_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMC.2018.2835442","volume":"PP","author":"R Sakthivel","year":"2018","unstructured":"Sakthivel, R., Ahn, C.K., Joby, M.: Fault-tolerant resilient control for fuzzy fractional order systems. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1\u20139 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"2","key":"593_CR29","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s40815-017-0334-x","volume":"20","author":"H Ge","year":"2018","unstructured":"Ge, H., Yue, D., Xie, X.: Observer-based fault diagnosis of nonlinear systems via an improved homogeneous polynomial technique. Int. J. Fuzzy Syst. 20(2), 403\u2013415 (2018)","journal-title":"Int. J. Fuzzy Syst."},{"issue":"1","key":"593_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.automatica.2006.07.017","volume":"43","author":"J Xiong","year":"2007","unstructured":"Xiong, J., Lam, J.: Stabilization of linear systems over networks with bounded packet loss. Automatica 43(1), 80\u201387 (2007)","journal-title":"Automatica"},{"key":"593_CR31","volume-title":"Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems","author":"ED Knapp","year":"2014","unstructured":"Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, New York (2014)"},{"key":"593_CR32","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier. White Paper (2011)"},{"key":"593_CR33","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373","volume-title":"Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems","author":"T Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM, Oxford (2007)"},{"key":"593_CR34","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Gaspari, F.D., Devarajan, N.: Amplified distributed denial of service attack in software defined networking. In: IFIP International Conference on New Technologies, Mobility and Security, pp. 1\u20134 (2016)","DOI":"10.1109\/NTMS.2016.7792432"},{"issue":"4","key":"593_CR35","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/TCST.2012.2208967","volume":"21","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xia, Y., Shi, P.: Design and stability analysis of networked predictive control systems. IEEE Trans. Control Syst. Technol. 21(4), 1495\u20131501 (2013)","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"2","key":"593_CR36","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1137\/130950951","volume":"54","author":"X Yin","year":"2016","unstructured":"Yin, X., Yue, D., Hu, S., Peng, C., Xue, Y.: Model-based event-triggered predictive control for networked systems with data dropout. SIAM J. Control Optim. 54(2), 567\u2013586 (2016)","journal-title":"SIAM J. Control Optim."},{"issue":"2","key":"593_CR37","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TAC.2012.2206694","volume":"58","author":"Y Dong","year":"2013","unstructured":"Dong, Y., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475\u2013481 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"4","key":"593_CR38","doi-asserted-by":"publisher","first-page":"2460","DOI":"10.1109\/TFUZZ.2017.2752723","volume":"26","author":"L Wang","year":"2018","unstructured":"Wang, L., Lam, H.K.: A new approach to stability and stabilization analysis for continuous-time Takagi\u2013Sugeno fuzzy systems with time delay. IEEE Trans. Fuzzy Syst. 26(4), 2460\u20132465 (2018)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"593_CR39","unstructured":"Zhang, Y., Sun, J., Liang, H., Li, H.: \u201cEvent-triggered adaptive tracking control for multiagent systems with unknown disturbances,\u201d IEEE transactions on cybernetics, (2018)"},{"issue":"99","key":"593_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSMC.2016.2557222","volume":"PP","author":"Q Zhou","year":"2017","unstructured":"Zhou, Q., Li, H., Wu, C., Wang, L., Ahn, C.K.: Adaptive fuzzy control of nonlinear systems with unmodeled dynamics and input saturation using small-gain approach. IEEE Trans. Syst. Man Cybern. Syst. PP(99), 1\u201311 (2017)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"593_CR41","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1109\/CDC.1999.831330","volume":"3","author":"JP Hespanha","year":"2002","unstructured":"Hespanha, J.P., Morse, A.S.: Stability of switched systems with average dwell-time. Proc. IEEE Conf. Decis. Control 1999 3, 2655\u20132660 (2002)","journal-title":"Proc. IEEE Conf. Decis. Control 1999"},{"key":"593_CR42","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.asoc.2015.01.041","volume":"30","author":"S Hu","year":"2015","unstructured":"Hu, S., Yue, D., Peng, C., Xie, X., Yin, X.: Event-triggered controller design of nonlinear discrete-time networked control systems in T\u2013S fuzzy model. Appl. Soft Comput. 30, 400\u2013411 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"10","key":"593_CR43","doi-asserted-by":"publisher","first-page":"2620","DOI":"10.1109\/TAC.2013.2256015","volume":"58","author":"C Peng","year":"2013","unstructured":"Peng, C., Han, Q.L.: A novel event-triggered transmission scheme and $$\\cal{L}_{\\in }$$ L \u2208 control co-design for sampled-data control systems. IEEE Trans. Autom. Control 58(10), 2620\u20132626 (2013)","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["International Journal of Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-018-0593-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40815-018-0593-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-018-0593-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T19:58:13Z","timestamp":1663012693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40815-018-0593-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,28]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["593"],"URL":"https:\/\/doi.org\/10.1007\/s40815-018-0593-1","relation":{},"ISSN":["1562-2479","2199-3211"],"issn-type":[{"type":"print","value":"1562-2479"},{"type":"electronic","value":"2199-3211"}],"subject":[],"published":{"date-parts":[[2019,2,28]]},"assertion":[{"value":"18 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}