{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T20:11:45Z","timestamp":1778271105372,"version":"3.51.4"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003787","name":"Hebei Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["F2025203034"],"award-info":[{"award-number":["F2025203034"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008095","name":"Yanshan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008095","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3104900"],"award-info":[{"award-number":["2022YFB3104900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62573038"],"award-info":[{"award-number":["62573038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.ins.2026.123408","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T08:01:58Z","timestamp":1774512118000},"page":"123408","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Resilient adaptive sliding mode control for a platoon of nonlinear connected vehicles with actuator attacks"],"prefix":"10.1016","volume":"746","author":[{"given":"Yingwen","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0275-9614","authenticated-orcid":false,"given":"Zhaoxia","family":"Peng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guoguang","family":"Wen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shichun","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tingwen","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2026.123408_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2023.104138","article-title":"Safe autonomous lane changes and impact on traffic flow in a connected vehicle environment","volume":"151","author":"Monteiro","year":"2023","journal-title":"Transp. Res. Part C-Emerging Technol."},{"issue":"6","key":"10.1016\/j.ins.2026.123408_bib0010","doi-asserted-by":"crossref","first-page":"3992","DOI":"10.1109\/TAC.2024.3519638","article-title":"Robust string stabilization of connected vehicles with jerk feedforward","volume":"70","author":"Ma","year":"2025","journal-title":"IEEE Trans. Autom. Control"},{"issue":"5","key":"10.1016\/j.ins.2026.123408_bib0015","doi-asserted-by":"crossref","first-page":"3457","DOI":"10.1109\/TAC.2023.3342067","article-title":"Distributed constrained optimal formation matching for large-scale systems","volume":"69","author":"Wu","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2026.123408_bib0020","series-title":"IEEE Trans Inf Forensics Security","first-page":"4133","article-title":"Detection of message injection attacks onto the CAN bus using similarities of successive messages-sequence graphs","volume":"vol. 16","author":"Jedh","year":"2021"},{"issue":"11","key":"10.1016\/j.ins.2026.123408_bib0025","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/3570954","article-title":"AI-based intrusion detection systems for in-vehicle networks: a survey","volume":"55","author":"Rajapaksha","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.ins.2026.123408_bib0030","series-title":"2024 Global Automotive Cybersecurity Report","year":"2024"},{"issue":"2","key":"10.1016\/j.ins.2026.123408_bib0035","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TVT.2019.2961344","article-title":"SAIDuCANT: specification-based automotive intrusion detection using controller area network (CAN) timing","volume":"69","author":"Olufowobi","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.ins.2026.123408_bib0040","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TDSC.2020.2990192","article-title":"On the performance of detecting injection of fabricated messages into the CAN bus","volume":"19","author":"Othmane","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.ins.2026.123408_bib0045","series-title":"IEEE Open J Veh Technolo","first-page":"1774","article-title":"Autonomous vehicle security: hybrid threat modeling approach","volume":"vol. 6","author":"Yousseef","year":"2025"},{"issue":"10","key":"10.1016\/j.ins.2026.123408_bib0050","doi-asserted-by":"crossref","first-page":"15536","DOI":"10.1109\/TVT.2025.3570961","article-title":"A lightweight voltage-based ECU fingerprint intrusion detection system for in-vehicle CAN bus","volume":"74","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"10.1016\/j.ins.2026.123408_bib0055","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2020.2993522","article-title":"Long short-term memory neural network-based attack detection model for in-vehicle network security","volume":"4","author":"Khan","year":"2020","journal-title":"IEEE Sens. Lett."},{"issue":"2","key":"10.1016\/j.ins.2026.123408_bib0060","first-page":"2122","article-title":"In-vehicle CAN bus tampering attacks detection for connected and autonomous vehicles using an improved isolation forest method","volume":"24","author":"Duan","year":"2023","journal-title":"I.E.E.E. Trans. Intell. Transp. Syst."},{"issue":"4","key":"10.1016\/j.ins.2026.123408_bib0065","first-page":"815","article-title":"A survey on attack detection and resilience for connected and automated vehicles: from vehicle dynamics and control perspective","volume":"7","author":"Ju","year":"2022","journal-title":"I.E.E.E. Trans. Intell. Veh."},{"issue":"22","key":"10.1016\/j.ins.2026.123408_bib0070","doi-asserted-by":"crossref","first-page":"46500","DOI":"10.1109\/JIOT.2025.3612764","article-title":"A survey of resilient coordination for cyber\u2013physical systems against malicious attacks","volume":"12","author":"Liao","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.ins.2026.123408_bib0075","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1109\/TCNS.2025.3538761","article-title":"Secure formation control of multiagent system against FDI attack using fixed-time convergent reinforcement learning","volume":"12","author":"Gong","year":"2025","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"9","key":"10.1016\/j.ins.2026.123408_bib0080","doi-asserted-by":"crossref","first-page":"3821","DOI":"10.1109\/TITS.2019.2934481","article-title":"Distributed cyber attacks detection and recovery mechanism for vehicle platooning","volume":"21","author":"Mousavinejad","year":"2020","journal-title":"I.E.E.E. Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.ins.2026.123408_bib0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110531","article-title":"Secure and collision-free multi-platoon control of automated vehicles under data falsification attacks","volume":"145","author":"Xiao","year":"2022","journal-title":"Automatica"},{"issue":"13","key":"10.1016\/j.ins.2026.123408_bib0090","doi-asserted-by":"crossref","first-page":"11858","DOI":"10.1109\/JIOT.2023.3244998","article-title":"Event-based distributed fixed-time resilient control for heterogeneous vehicular platoon against attack and disturbances","volume":"10","author":"Pan","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.ins.2026.123408_bib0095","series-title":"IEEE Trans Autom Sci Eng","first-page":"8925","article-title":"Security control for cyber-physical systems with optimal dynamic stealthy actuator attacks","volume":"vol. 22","author":"Sun","year":"2025"},{"issue":"9","key":"10.1016\/j.ins.2026.123408_bib0100","doi-asserted-by":"crossref","first-page":"4648","DOI":"10.1109\/TCYB.2020.3006871","article-title":"A secure control learning framework for cyber-physical systems under sensor and actuator attacks","volume":"51","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2026.123408_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2022.110345","article-title":"Sliding mode-based adaptive resilient control for markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacks","volume":"142","author":"Yang","year":"2022","journal-title":"Automatica"},{"issue":"5","key":"10.1016\/j.ins.2026.123408_bib0110","doi-asserted-by":"crossref","first-page":"6317","DOI":"10.1109\/TII.2022.3191652","article-title":"Cloud-based underactuated resilient control for cyber-physical systems under actuator attacks","volume":"19","author":"Zhao","year":"2023","journal-title":"I.E.E.E. Trans. Ind. Inform."},{"issue":"8","key":"10.1016\/j.ins.2026.123408_bib0115","doi-asserted-by":"crossref","first-page":"6639","DOI":"10.1109\/TIE.2019.2936990","article-title":"Integral sliding mode control using a disturbance observer for vehicle platoons","volume":"67","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"6","key":"10.1016\/j.ins.2026.123408_bib0120","doi-asserted-by":"crossref","first-page":"8707","DOI":"10.1109\/TVT.2025.3536520","article-title":"A backstepping tracking control strategy based on deep reinforcement learning for vehicle platoon","volume":"74","author":"Lv","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.ins.2026.123408_bib0125","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2025.122118","article-title":"DoS-resilient event-triggering control of connected vehicles: an attack-parameter-dependent functional method","volume":"712","author":"Xu","year":"2025","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2026.123408_bib0130","series-title":"IEEE Trans Autom Sci Eng","first-page":"4382","article-title":"Adaptive fault-tolerant optimized platoon cloud tracking control for heterogeneous vehicles via dual learning mechanism","volume":"vol. 22","author":"An","year":"2025"},{"issue":"11","key":"10.1016\/j.ins.2026.123408_bib0135","doi-asserted-by":"crossref","first-page":"21259","DOI":"10.1109\/TITS.2022.3181460","article-title":"Distributed finite-time fault-tolerant control for heterogeneous vehicular platoon with saturation","volume":"23","author":"Pan","year":"2022","journal-title":"I.E.E.E. Trans. Intell. Transp. Syst."},{"issue":"7","key":"10.1016\/j.ins.2026.123408_bib0140","doi-asserted-by":"crossref","first-page":"8409","DOI":"10.1109\/TVT.2023.3247608","article-title":"Adaptive fixed-time sliding mode control of vehicular platoons with asymmetric actuator saturation","volume":"72","author":"Gao","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.ins.2026.123408_bib0145","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.automatica.2015.01.021","article-title":"Nonsingular fixed-time consensus tracking for second-order multi-agent networks","volume":"54","author":"Zuo","year":"2015","journal-title":"Automatica"},{"issue":"5","key":"10.1016\/j.ins.2026.123408_bib0150","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TITS.2014.2308535","article-title":"Adaptive bidirectional platoon control using a coupled sliding mode control method","volume":"15","author":"Kwon","year":"2014","journal-title":"I.E.E.E. Trans. Intell. Transp. Syst."},{"issue":"8","key":"10.1016\/j.ins.2026.123408_bib0155","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/TAC.2011.2179869","article-title":"Nonlinear feedback design for fixed-time stabilization of linear control systems","volume":"57","author":"Polyakov","year":"2012","journal-title":"IEEE Trans. Autom. Control"},{"issue":"9","key":"10.1016\/j.ins.2026.123408_bib0160","doi-asserted-by":"crossref","first-page":"5928","DOI":"10.1109\/TCYB.2022.3219098","article-title":"Adaptive event-triggered finite-time control for uncertain time delay nonlinear system","volume":"53","author":"Xie","year":"2023","journal-title":"IEEE Trans. Cybern."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025526003397?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025526003397?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T19:11:28Z","timestamp":1778267488000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025526003397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":32,"alternative-id":["S0020025526003397"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2026.123408","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Resilient adaptive sliding mode control for a platoon of nonlinear connected vehicles with actuator attacks","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2026.123408","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"123408"}}