Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/30328
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhu, K | - |
dc.contributor.author | Wang, Z | - |
dc.contributor.author | Ding, D | - |
dc.contributor.author | Dong, H-L | - |
dc.contributor.author | Han, Q-L | - |
dc.date.accessioned | 2024-12-06T19:15:05Z | - |
dc.date.available | 2024-12-06T19:15:05Z | - |
dc.date.issued | 2024-05-16 | - |
dc.identifier | ORCiD: Kaiqun Zhu https://orcid.org/0000-0002-0658-0806 | - |
dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
dc.identifier | ORCiD: Derui Ding https://orcid.org/0000-0001-7402-6682 | - |
dc.identifier | ORCiD: Hongli Dong https://orcid.org/0000-0001-8531-6757 | - |
dc.identifier | ORCiD: Qing-Long Han https://orcid.org/0000-0002-7207-0716 | - |
dc.identifier.citation | Zhu, K. et al. (2024) 'Privacy-Preserving Control for 2-D Systems With Guaranteed Probability', IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54 (8), pp. 4999 - 5011. doi: 10.1109/TSMC.2024.3391065. | en_US |
dc.identifier.issn | 2168-2216 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/30328 | - |
dc.description.abstract | This article addresses the privacy-preserving control issue for two-dimensional systems with probabilistic constraints. According to the exclusive or logical operation and the dynamic coding–decoding rule, a privacy-preserving mechanism (PPM) is developed, under which the transmitted data is efficiently compressed and encrypted into a ciphertext with finite bits. A PPM-based controller is designed that simultaneously guarantees a prescribed probabilistic constraint, mean-square boundedness, and privacy performance. Mathematical techniques, including mathematical induction, Chebyshev inequality, and matrix analysis, are employed to establish sufficient conditions for the presence of the desired controller gains. Additionally, the privacy and secrecy performance of the PPM is analyzed and simulation examples are presented to showcase the efficacy of the proposed controller design method. | en_US |
dc.description.sponsorship | 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61933007 and U21A2019); Shanghai Pujiang Program (Grant Number: 22PJ1411700); 10.13039/501100002858-China Postdoctoral Science Foundation (Grant Number: 2023M732322); Hainan Province Science and Technology Special Fund of China (Grant Number: ZDYF2022SHFZ105); Anhui Engineering Laboratory of Human Robot Integration System Equipment Foundation (Grant Number: RJGR202204); Royal Society of the U.K; Alexander von Humboldt Foundation of Germany. | en_US |
dc.format.extent | 4999 - 5011 | - |
dc.format.medium | Print-Electronic | - |
dc.language | en | - |
dc.language.iso | en_US | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.rights | Copyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | - |
dc.rights.uri | https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | - |
dc.subject | dynamic coding–decoding rule | en_US |
dc.subject | guaranteed probability | en_US |
dc.subject | privacy-preserving mechanism (PPM) | en_US |
dc.subject | two-dimensional (2-D) systems | en_US |
dc.title | Privacy-Preserving Control for 2-D Systems With Guaranteed Probability | en_US |
dc.type | Article | en_US |
dc.date.dateAccepted | 2024-04-08 | - |
dc.identifier.doi | https://doi.org/10.1109/TSMC.2024.3391065 | - |
dc.relation.isPartOf | IEEE Transactions on Systems, Man, and Cybernetics: Systems | - |
pubs.issue | 8 | - |
pubs.publication-status | Published | - |
pubs.volume | 54 | - |
dc.identifier.eissn | 2168-2232 | - |
dc.rights.holder | Institute of Electrical and Electronics Engineers (IEEE) | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | 5.06 MB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.