Adaptive control of bilateral teleoperation systems with false data injection attacks and attacks detection
暂无分享,去创建一个
[1] Toshiyuki Murakami,et al. Admittance Control-based Bilateral Control System Considering Position Error , 2021, 2021 IEEE International Conference on Mechatronics (ICM).
[2] Xinyu Cai,et al. Adaptive control of bilateral teleoperation system under denial of service attacks , 2020, 2020 39th Chinese Control Conference (CCC).
[3] Meidong Li,et al. Parameter Identification of DC Motor based on Compound Least Square Method , 2020, 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC).
[4] Nikhil Chopra,et al. False Data Injection Attacks in Bilateral Teleoperation Systems , 2020, IEEE Transactions on Control Systems Technology.
[5] Kittipong Yaovaja,et al. Teleoperation of an Industrial Robot using a Non-Standalone 5G Mobile Network , 2019, 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE).
[6] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[7] Daisuke Yashiro,et al. Design of adaptive controller on task coordinate system for bilateral control system with communication delay , 2018, 2018 IEEE 15th International Workshop on Advanced Motion Control (AMC).
[8] Yijun Zhang,et al. Stability analysis of bilateral teleoperation system based on data sampling with time delay , 2017, 2017 Eighth International Conference on Intelligent Control and Information Processing (ICICIP).
[9] Shiyan Hu,et al. Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[10] B. Sinopoli,et al. Secure State Estimation of Cyber-Physical Systems Under Switching Attacks , 2017 .
[11] Yen-Chen Liu,et al. Event-triggered control for bilateral teleoperation with time delays , 2016, 2016 IEEE International Conference on Advanced Intelligent Mechatronics (AIM).
[12] George Loukas,et al. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[13] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[14] Byeong-Yeon Kim,et al. A design of bilateral teleoperation systems using composite adaptive controller , 2013 .
[15] Yana Yang,et al. Neural network-based adaptive position tracking control for bilateral teleoperation under constant time delay , 2013, Neurocomputing.
[16] F. Bullo,et al. Attack Detection and Identification in Cyber-Physical Systems , 2013, IEEE Transactions on Automatic Control.
[17] R. Ortega,et al. A Globally Stable PD Controller for Bilateral Teleoperators , 2008, IEEE Transactions on Robotics.
[18] Mark W. Spong,et al. Bilateral teleoperation: An historical survey , 2006, Autom..
[19] Zheng Chen,et al. Adaptive Fuzzy Backstepping Control for Stable Nonlinear Bilateral Teleoperation Manipulators With Enhanced Transparency Performance , 2020, IEEE Transactions on Industrial Electronics.