{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:49:08Z","timestamp":1770295748819,"version":"3.49.0"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1016\/j.ins.2019.07.075","type":"journal-article","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T02:06:37Z","timestamp":1563933997000},"page":"144-156","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":82,"special_numbering":"C","title":["Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks"],"prefix":"10.1016","volume":"505","author":[{"given":"Rui","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3848-0121","authenticated-orcid":false,"given":"Jiangshuai","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2019.07.075_bib0001","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.ins.2017.09.042","article-title":"Improved adaptive resilient control against sensor and actuator attacks","volume":"423","author":"An","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0002","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1080\/00207721.2018.1435837","article-title":"Leaderless consensus for the fractional-order nonlinear multi-agent systems under directed interaction topology","volume":"49","author":"Bai","year":"2018","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0003","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.cose.2016.11.008","article-title":"Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model","volume":"65","author":"Bang","year":"2017","journal-title":"Comput. Secur."},{"key":"10.1016\/j.ins.2019.07.075_bib0004","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.ins.2016.04.037","article-title":"Consensus control for multiple AUVs under imperfect information caused by communication faults","volume":"370","author":"Chen","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0005","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1002\/rnc.3342","article-title":"Distributed consensus tracking for multi-agent systems under twotypes of attacks","volume":"26","author":"Feng","year":"2016","journal-title":"Int. J. Robust Nonlinear Control"},{"issue":"5","key":"10.1016\/j.ins.2019.07.075_bib0006","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TCYB.2016.2544062","article-title":"Distributed secure coordinated control for multiagent systems under strategic attacks","volume":"47","author":"Feng","year":"2017","journal-title":"IEEE Trans. Cybern."},{"issue":"9","key":"10.1016\/j.ins.2019.07.075_bib0007","doi-asserted-by":"crossref","first-page":"3159","DOI":"10.1109\/TAC.2018.2793164","article-title":"Competitive interaction design of cooperative systems against attacks","volume":"63","author":"Gusrialdi","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.07.075_bib0008","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.ins.2015.06.005","article-title":"Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control","volume":"380","author":"He","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0009","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.ins.2018.04.020","article-title":"Secure impulsive synchronization control of multi-agent systems under deception attacks","volume":"459","author":"He","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0010","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1080\/00207721.2016.1179817","article-title":"Consensus of multi-agent systems via intermittent event-triggered control","volume":"48","author":"Hu","year":"2017","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0011","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.automatica.2017.09.028","article-title":"State estimation under false data injection attacks: security analysis and system protection","volume":"87","author":"Hu","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2019.07.075_bib0012","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2018.2815758","article-title":"Reliable control policy of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks","author":"Huang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.07.075_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.isatra.2019.04.027","article-title":"Event-triggered adaptive control of a class of nonlinear systems","author":"Huang","year":"2019","journal-title":"ISA Trans."},{"key":"10.1016\/j.ins.2019.07.075_bib0014","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.isatra.2018.01.008","article-title":"Decentralized adaptive control of interconnected nonlinear systems with unknown control directions","volume":"74","author":"Huang","year":"2018","journal-title":"ISA Trans."},{"key":"10.1016\/j.ins.2019.07.075_bib0015","article-title":"Adaptive event-triggered control of nonlinear systems with controller and parameter estimator triggering","author":"Huang","year":"2019","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.07.075_bib0016","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.automatica.2018.03.061","article-title":"Adaptive control of a class of strict-feedback time-varying nonlinear systems with unknown control coefficients","volume":"93","author":"Huang","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2019.07.075_bib0017","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.automatica.2017.06.025","article-title":"Smooth control design for adaptive leader-following consensus control of a class of high-order nonlinear systems with time-varying reference","volume":"83","author":"Huang","year":"2017","journal-title":"Automatica"},{"issue":"8","key":"10.1016\/j.ins.2019.07.075_bib0018","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TCYB.2017.2737652","article-title":"Fully distributed adaptive consensus control of a class of high-order nonlinear systems with a directed topology and unknown control directions","volume":"48","author":"Huang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"issue":"11","key":"10.1016\/j.ins.2019.07.075_bib0019","doi-asserted-by":"crossref","first-page":"6058","DOI":"10.1109\/TAC.2017.2652127","article-title":"An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems","volume":"62","author":"Jin","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"issue":"3","key":"10.1016\/j.ins.2019.07.075_bib0020","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TCNS.2017.2648508","article-title":"Detection against linear deception attacks on multi-sensor remote state estimation","volume":"5","author":"Li","year":"2018","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"8","key":"10.1016\/j.ins.2019.07.075_bib0021","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1109\/TAC.2002.800773","article-title":"Adaptive control of nonlinearly parameterized systems: the smooth feedback case","volume":"47","author":"Liu","year":"2002","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.07.075_bib0022","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ins.2018.02.008","article-title":"Distributed consensus control for multi-agent systems under denial-of-service","volume":"439\u2013440","author":"Lu","year":"2018","journal-title":"Inf. Sci."},{"issue":"6","key":"10.1016\/j.ins.2019.07.075_bib0023","doi-asserted-by":"crossref","first-page":"1648","DOI":"10.1109\/TAC.2017.2756259","article-title":"Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks","volume":"63","author":"Qin","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.07.075_bib0024","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","article-title":"Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations","volume":"94","author":"Su","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2019.07.075_bib0025","article-title":"Full-state regulation control of asymmetric underactuated surface vehicles","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.ins.2019.07.075_bib0026","article-title":"Yaw-guided trajectory tracking control of an asymmetric underactuated surface vehicle","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.ins.2019.07.075_bib0027","article-title":"Backpropagating constraints-based trajectory tracking control of a quadrotor with constrained actuator dynamics and complex unknowns","author":"Wang","year":"2018","journal-title":"IEEE Trans. Syst. Man. Cybern."},{"key":"10.1016\/j.ins.2019.07.075_bib0028","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.ins.2016.01.043","article-title":"Distributed adaptive output consensus control of a class of heterogeneous multi-agent systems under switching directed topologies","volume":"345","author":"Yang","year":"2016","journal-title":"Inf. Sci."},{"issue":"7","key":"10.1016\/j.ins.2019.07.075_bib0029","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.neucom.2017.02.031","article-title":"Adaptive leaderless consensus of agents in jointly connected networks","volume":"241","author":"Yu","year":"2017","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2019.07.075_bib0030","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.ins.2015.12.031","article-title":"Finite-time distributed event-triggered consensus control for multi-agent systems","volume":"339","author":"Zhang","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.07.075_bib0031","article-title":"Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"issue":"11","key":"10.1016\/j.ins.2019.07.075_bib0032","doi-asserted-by":"crossref","first-page":"3023","DOI":"10.1109\/TAC.2015.2409905","article-title":"Optimal denial-of-service attack scheduling with energy constraint","volume":"60","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.07.075_bib0033","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/rnc.3855","article-title":"Sampled-data consensus of nonlinear multiagent systems subjectto cyber attacks","volume":"28","author":"Zhang","year":"2017","journal-title":"Int. J. Robust Nonlinear Control"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519306875?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519306875?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T04:51:54Z","timestamp":1758084714000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025519306875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":33,"alternative-id":["S0020025519306875"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.07.075","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.07.075","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}