{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:38:13Z","timestamp":1774021093321,"version":"3.50.1"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004498","name":"Chengdu Normal University","doi-asserted-by":"publisher","award":["YJRC202408"],"award-info":[{"award-number":["YJRC202408"]}],"id":[{"id":"10.13039\/501100004498","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Communications in Nonlinear Science and Numerical Simulation"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.cnsns.2026.109803","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T07:55:56Z","timestamp":1769586956000},"page":"109803","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Protocol-Based security control for fuzzy systems with nonhomogeneous sojourn probabilities"],"prefix":"10.1016","volume":"158","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4059-874X","authenticated-orcid":false,"given":"Yonghong","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3634-3254","authenticated-orcid":false,"given":"Shoucheng","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0405-0163","authenticated-orcid":false,"given":"Xiaoqiu","family":"Lv","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3483-747X","authenticated-orcid":false,"given":"Jun","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3133-7119","authenticated-orcid":false,"given":"Jinde","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.cnsns.2026.109803_bib0001","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/TFUZZ.2008.928600","article-title":"Stability analysis and performance design for fuzzy-model-based control system under imperfect premise matching","volume":"17","author":"Lam","year":"2008","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"13","key":"10.1016\/j.cnsns.2026.109803_bib0002","doi-asserted-by":"crossref","first-page":"6443","DOI":"10.1007\/s00500-022-06973-5","article-title":"Periodic event-triggered modified repetitive control with equivalent-input-disturbance estimator based on TS fuzzy model for nonlinear systems","volume":"26","author":"Abd-Elhaleem","year":"2022","journal-title":"Soft comput"},{"key":"10.1016\/j.cnsns.2026.109803_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2023.107752","article-title":"Improved dynamic event-triggered H\u221e control for networked fuzzy singularly perturbed systems with hidden markov fading channels","volume":"130","author":"Hu","year":"2024","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109803_bib0004","first-page":"1","article-title":"Event-based H\u221e tracking control for the t-s fuzzy-based SP-IPT system with coil misalignment","author":"Zhu","year":"2023","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109803_bib0005","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TASE.2023.3242225","article-title":"A fuzzy inference model to identify the current industry maturity stage in the transformation process to industry 4.0","volume":"21","author":"de Oliveira Gomes","year":"2023","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"5","key":"10.1016\/j.cnsns.2026.109803_bib0006","doi-asserted-by":"crossref","first-page":"3154","DOI":"10.1109\/TFUZZ.2024.3364754","article-title":"Attack-resilient dynamic-memory event-triggered control for fuzzy switched systems with persistent dwell-time","volume":"32","author":"Wei","year":"2024","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"7","key":"10.1016\/j.cnsns.2026.109803_bib0007","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TFUZZ.2025.3550864","article-title":"Distributed estimator-based fuzzy containment control for nonlinear multiagent systems with deferred constraints","volume":"33","author":"Ma","year":"2025","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"11","key":"10.1016\/j.cnsns.2026.109803_bib0008","doi-asserted-by":"crossref","first-page":"4679","DOI":"10.1109\/TFUZZ.2022.3156701","article-title":"Fuzzy-model-based asynchronous fault detection for markov jump systems with partially unknown transition probabilities: an adaptive event-triggered approach","volume":"30","author":"Ran","year":"2022","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10.1016\/j.cnsns.2026.109803_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2024.109252","article-title":"Fuzzy-model-based bipartite synchronization for nonlinear cooperation-competition networks with semi-markov switching topologies under FDI attacks","volume":"503","author":"Shi","year":"2025","journal-title":"Fuzzy Sets Syst"},{"issue":"7","key":"10.1016\/j.cnsns.2026.109803_bib0010","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1109\/TCYB.2025.3565806","article-title":"Sliding-mode control for sojourn-probability-based switching systems with cyber-attacks","volume":"55","author":"Cheng","year":"2025","journal-title":"IEEE Trans Cybern"},{"issue":"9","key":"10.1016\/j.cnsns.2026.109803_bib0011","doi-asserted-by":"crossref","first-page":"2446","DOI":"10.1109\/TAC.2015.2409909","article-title":"h\u221e Filtering for discrete-time switched systems with known sojourn probabilities","volume":"60","author":"Tian","year":"2015","journal-title":"IEEE Trans Automat Contr"},{"key":"10.1016\/j.cnsns.2026.109803_bib0012","doi-asserted-by":"crossref","DOI":"10.1109\/TSMC.2024.3378693","article-title":"Protocol-based state estimation for complex networks with nonhomogeneous sojourn probabilities","author":"Liang","year":"2024","journal-title":"IEEE Trans Syst Man Cybernetic: Syst"},{"issue":"6","key":"10.1016\/j.cnsns.2026.109803_bib0013","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1080\/00207721.2021.1885082","article-title":"A survey on sliding mode control for networked control systems","volume":"52","author":"Hu","year":"2021","journal-title":"Int J Syst Sci"},{"key":"10.1016\/j.cnsns.2026.109803_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2025.108937","article-title":"Decentralized event-triggered reinforcement learning control for partially unknown nonlinear systems with time-varying states and asymmetric input constraints","author":"Zhong","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109803_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.110144","article-title":"Event-triggered fault detection for nonlinear semi-markov jump systems based on double asynchronous filtering approach","volume":"138","author":"Zhang","year":"2022","journal-title":"Automatica"},{"issue":"10","key":"10.1016\/j.cnsns.2026.109803_bib0016","doi-asserted-by":"crossref","first-page":"4115","DOI":"10.1109\/TFUZZ.2022.3141749","article-title":"Periodic event-triggered sliding mode control for switched uncertain TS fuzzy systems with a logistic adaptive event-triggering scheme","volume":"30","author":"Wang","year":"2022","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10.1016\/j.cnsns.2026.109803_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2025.109286","article-title":"Dynamic event-triggered extended dissipative scaled consensus control for nonlinear multi-agent systems","author":"Feng","year":"2025","journal-title":"Fuzzy Sets Syst"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109803_bib0018","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1109\/TFUZZ.2024.3519186","article-title":"Dynamic event-triggered-based fuzzy adaptive pinning control for multiagent systems with output saturation","volume":"33","author":"Ren","year":"2025","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"10","key":"10.1016\/j.cnsns.2026.109803_bib0019","doi-asserted-by":"crossref","first-page":"6577","DOI":"10.1109\/TCYB.2022.3208363","article-title":"A dynamic-memory event-triggered protocol to multiarea power systems with semi-markov jumping parameter","volume":"53","author":"Xie","year":"2023","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.cnsns.2026.109803_bib0020","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TIFS.2022.3160355","article-title":"Co-design of observer-based fault detection filter and dynamic event-triggered controller for wind power system under dual alterable dos attacks","volume":"17","author":"Yang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.cnsns.2026.109803_bib0021","doi-asserted-by":"crossref","first-page":"7187","DOI":"10.1109\/TIFS.2024.3431280","article-title":"Data-driven dynamic periodic event-triggered control of cyber-physical systems under packet dropouts and dos attacks","volume":"19","author":"Li","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.cnsns.2026.109803_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.121350","article-title":"Observer-based reinforcement learning for optimal fault-tolerant consensus control of nonlinear multi-agent systems via a dynamic event-triggered mechanism","volume":"689","author":"Zhu","year":"2025","journal-title":"Inf Sci (Ny)"},{"issue":"1","key":"10.1016\/j.cnsns.2026.109803_bib0023","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TCYB.2021.3089612","article-title":"Output-feedback control for fuzzy singularly perturbed systems: a nonhomogeneous stochastic communication protocol approach","volume":"53","author":"Cheng","year":"2023","journal-title":"IEEE Trans Cybern"},{"issue":"8","key":"10.1016\/j.cnsns.2026.109803_bib0024","doi-asserted-by":"crossref","first-page":"4000","DOI":"10.1109\/TCYB.2020.3003752","article-title":"Secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack","volume":"51","author":"Liu","year":"2020","journal-title":"IEEE Trans Cybern"},{"issue":"6","key":"10.1016\/j.cnsns.2026.109803_bib0025","doi-asserted-by":"crossref","first-page":"3976","DOI":"10.1109\/TSMC.2025.3547926","article-title":"Distributed state estimation for nonlinear dynamical networks with stochastic topological structures subject to random deception attacks and bit-rate constraints","volume":"55","author":"Hu","year":"2025","journal-title":"IEEE Trans Syst Man Cybernetic: Syst"},{"key":"10.1016\/j.cnsns.2026.109803_bib0026","doi-asserted-by":"crossref","first-page":"3857","DOI":"10.1109\/TIFS.2023.3347889","article-title":"Stability analysis of networked control systems under dos attacks and security controller design with mini-batch machine learning supervision","volume":"19","author":"Cai","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.cnsns.2026.109803_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2024.109114","article-title":"Protocol-based secure guaranteed cost control of sampled-data TS fuzzy system with denial-of-service attack and input saturation","volume":"497","author":"Song","year":"2024","journal-title":"Fuzzy Sets Syst"},{"key":"10.1016\/j.cnsns.2026.109803_bib0028","doi-asserted-by":"crossref","first-page":"8059","DOI":"10.1109\/TIFS.2025.3594552","article-title":"Protocol-based PID control of switched systems with dos attacks","volume":"20","author":"Cheng","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.cnsns.2026.109803_bib0029","first-page":"1","article-title":"Sojourn-probability-based robust L2\u2212L\u221e control for uncertain SS-IPT system with time-varying delays","author":"Zhu","year":"2023","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109803_bib0030","first-page":"685","article-title":"Asynchronous control of markov jump systems under aperiodic dos attacks","volume":"70","author":"Zhang","year":"2022","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"6","key":"10.1016\/j.cnsns.2026.109803_bib0031","first-page":"1079","article-title":"Dynamic event-triggered sliding mode control: dealing with slow sampling singularly perturbed systems","volume":"67","author":"Song","year":"2019","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"10.1016\/j.cnsns.2026.109803_bib0032","series-title":"2023 6Th international symposium on autonomous systems (ISAS)","first-page":"1","article-title":"H\u221e State feedback control for fuzzy singular markovian jump systems with constant time delays and impulsive perturbations","author":"Zhu","year":"2023"},{"issue":"12","key":"10.1016\/j.cnsns.2026.109803_bib0033","doi-asserted-by":"crossref","first-page":"5156","DOI":"10.1109\/TCSI.2021.3110253","article-title":"Robust H\u221e control for ICPT process with coil misalignment and time delay: a sojourn-probability-based switching case","volume":"68","author":"Li","year":"2021","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"10.1016\/j.cnsns.2026.109803_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2023.110906","article-title":"Novel event-triggered protocol to sliding mode control for singular semi-markov jump systems","volume":"151","author":"Cheng","year":"2023","journal-title":"Automatica"},{"issue":"8","key":"10.1016\/j.cnsns.2026.109803_bib0035","doi-asserted-by":"crossref","first-page":"4346","DOI":"10.1109\/TAC.2022.3175723","article-title":"Protocol-based output-feedback control for semi-markov jump systems","volume":"67","author":"Cheng","year":"2022","journal-title":"IEEE Trans Automat Contr"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109803_bib0036","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1109\/TAC.2004.825641","article-title":"Uniform stability of switched linear systems: extensions of lasalle\u2019s invariance principle","volume":"49","author":"Hespanha","year":"2004","journal-title":"IEEE Trans Automat Contr"},{"key":"10.1016\/j.cnsns.2026.109803_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.109556","article-title":"Extended dissipative anti-disturbance control for delayed switched singular semi-markovian jump systems with multi-disturbance via disturbance observer","volume":"128","author":"Ding","year":"2021","journal-title":"Automatica"},{"issue":"3","key":"10.1016\/j.cnsns.2026.109803_bib0038","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/TAC.2018.2846594","article-title":"Asynchronous control of continuous-time nonlinear markov jump systems subject to strict dissipativity","volume":"64","author":"Dong","year":"2018","journal-title":"IEEE Trans Automat Contr"},{"issue":"6","key":"10.1016\/j.cnsns.2026.109803_bib0039","doi-asserted-by":"crossref","first-page":"3493","DOI":"10.1109\/TCYB.2021.3127888","article-title":"Finite-time dissipative fuzzy state estimation for jump systems with mixed cyber attacks: a probabilistic event-triggered approach","volume":"53","author":"Chen","year":"2021","journal-title":"IEEE Trans Cybern"}],"container-title":["Communications in Nonlinear Science and Numerical Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426001644?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426001644?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T14:31:12Z","timestamp":1774017072000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1007570426001644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":39,"alternative-id":["S1007570426001644"],"URL":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109803","relation":{},"ISSN":["1007-5704"],"issn-type":[{"value":"1007-5704","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Protocol-Based security control for fuzzy systems with nonhomogeneous sojourn probabilities","name":"articletitle","label":"Article Title"},{"value":"Communications in Nonlinear Science and Numerical Simulation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109803","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"109803"}}