{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:04:59Z","timestamp":1740099899854,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022008,61973017,61673035"],"award-info":[{"award-number":["62022008,61973017,61673035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,13]]},"DOI":"10.1109\/icarcv50220.2020.9305321","type":"proceedings-article","created":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T10:23:59Z","timestamp":1610274239000},"page":"689-694","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Secure Control of Uncertain Second-order Nonlinear Cyber-physical System Against Intermittent DoS Attacks"],"prefix":"10.1109","author":[{"given":"Mengze","family":"Yu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changyun","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2409905"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1109\/TCYB.2017.2787740","article-title":"Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks","volume":"49","author":"an","year":"2018","journal-title":"IEEE Trans on Cyber"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.3013700"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.04.061"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2013.2241770"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2013.0676"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1316","DOI":"10.1109\/TSMCB.2009.2016110","article-title":"Neural-network-based decentralized adaptive control for a class of large-scale nonlinear systems with unknown time varying delays","volume":"39","author":"yoo","year":"2009","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7525075"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514278"},{"journal-title":"Safe and Secure Networked Control Systems under Denial-of-Service Attacks","year":"2009","author":"majumdar","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2652127"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160542"},{"key":"ref7","first-page":"4063","article-title":"Stackelberg-game Analysis of Correlated Attacks in Cyber-physical Systems","author":"zhu","year":"2011","journal-title":"American Control Conf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2363897"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2367362"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416924"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2582802"},{"journal-title":"Adaptive Backstepping Control of Uncertain Systems","year":"2008","author":"zhou","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9781315154862"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2650238"}],"event":{"name":"2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)","start":{"date-parts":[[2020,12,13]]},"location":"Shenzhen, China","end":{"date-parts":[[2020,12,15]]}},"container-title":["2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9305021\/9305302\/09305321.pdf?arnumber=9305321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:28Z","timestamp":1656375808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9305321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,13]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icarcv50220.2020.9305321","relation":{},"subject":[],"published":{"date-parts":[[2020,12,13]]}}}