{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:41:52Z","timestamp":1775562112267,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173075"],"award-info":[{"award-number":["62173075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013314","name":"Higher Education Discipline Innovation Project","doi-asserted-by":"publisher","award":["B16009"],"award-info":[{"award-number":["B16009"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018617","name":"LiaoNing Revitalization Talents Program","doi-asserted-by":"publisher","award":["XLYC1907043"],"award-info":[{"award-number":["XLYC1907043"]}],"id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N2004015"],"award-info":[{"award-number":["N2004015"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tac.2025.3552136","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T13:53:42Z","timestamp":1742219622000},"page":"5989-6004","source":"Crossref","is-referenced-by-count":9,"title":["Safety Control of Switched Systems via Multiple Barrier Functions"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2950-2410","authenticated-orcid":false,"given":"Lijun","family":"Long","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4277-0703","authenticated-orcid":false,"given":"Chunxiao","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0622-6652","authenticated-orcid":false,"given":"Zhendong","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering &amp; Automation, Shandong University of Science and Technology, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2023.3286090"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796030"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3006764"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304087"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2191835"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2648740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3217100"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2017.2714840"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(99)00113-2"},{"key":"ref11","volume-title":"Set-Theoretic Methods in Control","author":"Blanchini","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/9.664150"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6097-2","volume-title":"Optimal Control Theory","author":"Berkovitz","year":"1974"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.03.039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717115"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2001.946174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2895125"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2037848"},{"key":"ref19","volume-title":"Ordinary Differential Equations","author":"Hartman","year":"1964"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796081"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029718"},{"key":"ref22","volume-title":"Nonlinear Systems","author":"Khalil","year":"2002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1991.12000768"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0017-8","volume-title":"Switching in Systems and Control","author":"Liberzon","year":"2003"},{"issue":"8","key":"ref25","first-page":"1387","article-title":"Safety-critical control and optimization of nonlinear systems based on new forms of CLF-CBF-QP","volume":"39","author":"Long","year":"2022","journal-title":"Control Theory Appl."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2022.105176"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3135569"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110513"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.11429\/ppmsj1919.24.0_551"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524935"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3059156"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2021.3089097"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0663-7","volume-title":"Optimization: Algorithms and Consistent Approximations","author":"Polak","year":"1997"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2005.08.007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2792325"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2022.3142408"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-131-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-256-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3089639"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/120901490"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108508"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.11.152"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.10.011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24743-2_32"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2018.2871957"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.09.006"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2003.822860"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.09.038"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2024.111576"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2024.3423837"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3332570"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3274821"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2615599"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2024.3368867"},{"key":"ref55","article-title":"Reach-avoid control synthesis for a quadrotor UAV with formal safety guarantees","author":"Serry","year":"2024"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3241180"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2019.103388"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9\/11143928\/10930537.pdf?arnumber=10930537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T21:07:07Z","timestamp":1769807227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10930537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":57,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tac.2025.3552136","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"value":"0018-9286","type":"print"},{"value":"1558-2523","type":"electronic"},{"value":"2334-3303","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}