Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/30609
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhu, K-
dc.contributor.authorWang, Z-
dc.contributor.authorDing, D-
dc.contributor.authorDong, H-
dc.contributor.authorWei, G-
dc.date.accessioned2025-01-29T16:11:13Z-
dc.date.available2025-01-29T16:11:13Z-
dc.date.issued2025-01-07-
dc.identifierORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401-
dc.identifierORCiD: Derui Ding https://orcid.org/0000-0001-7402-6682-
dc.identifierORCiD: Hongli Dong https://orcid.org/0000-0001-8531-6757-
dc.identifierORCiD: Guoliang Wei https://orcid.org/0000-0003-4957-3267-
dc.identifier112091-
dc.identifier.citationZhu, K. et al. (2025) ‘Encryption-decryption-based set-membership filtering for two-dimensional systems: on security and boundedness’, Automatica, 173, pp. 1 - 10. doi: 10.1016/j.automatica.2024.112091.en_US
dc.identifier.issn0005-1098-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/30609-
dc.description.abstractIn this paper, the encryption-decryption-based set-membership filtering issue is considered for a class of networked two-dimensional systems with unknown-but-bounded noises. In order to preserve data privacy and reduce communication burden, an encryption-decryption mechanism is put forward based on the exclusive or logical operation technique and the one-time pad method, under which the data is encrypted into a ciphertext with finite bits before being transmitted through the networks. The aim of the addressed problem is to develop an encryption-decryption-based set-membership filter (EDSMF) that is capable of generating an ellipsoidal set that contains the true system state and ensuring the security performance. Sufficient conditions are established for the existence of the desired ellipsoidal set, and the corresponding EDSMF gains are obtained by applying the Lagrange multiplier method. Moreover, the uniform boundedness of the ellipsoidal shape-defining matrix is thoroughly studied. Finally, the effectiveness of the proposed filter design method is demonstrated by a practical example of a heat exchanger.en_US
dc.description.sponsorshipNational Natural Science Foundation of China under Grants 61933007, 62403318, and U21A2019; in part by the Shanghai Pujiang Program of China under Grant 22PJ1411700; in part by the China Postdoctoral Science Foundation under Grant 2023M732322; in part by the Royal Society of the UK; and in part by the Alexander von Humboldt Foundation of Germany .en_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International-
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0-
dc.subjectencryption-decryption mechanismen_US
dc.subjecttwo-dimensional systemsen_US
dc.subjectunknown-but-bounded noisesen_US
dc.subjectset-membership filteringen_US
dc.subjectuniform boundednessen_US
dc.titleEncryption-decryption-based set-membership filtering for two-dimensional systems: on security and boundednessen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1016/j.automatica.2024.112091-
dc.relation.isPartOfAutomatica-
pubs.publication-statusPublished-
pubs.volume173-
dc.identifier.eissn1873-2836-
dc.rights.licensehttps://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.en-
dcterms.dateAccepted2024-11-14-
dc.rights.holderThe Author(s)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2024 The Author(s). This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nc-nd/4.0/). The authors rights in this accepted manuscript are retained in fulfilment of the funders' requirements.705.07 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons