Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/32441
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang, Y-A-
dc.contributor.authorWang, Z-
dc.contributor.authorZou, L-
dc.contributor.authorWang, F-
dc.date.accessioned2025-12-04T13:35:09Z-
dc.date.available2025-12-04T13:35:09Z-
dc.date.issued2025-10-01-
dc.identifierORCiD: Yu-Ang Wang https://orcid.org/0000-0002-0952-1465-
dc.identifierORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401-
dc.identifierORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941-
dc.identifierORCiD: Fan Wang https://orcid.org/0000-0002-0772-9801-
dc.identifier.citationWang, Y.-A. et al. (2025) 'State Estimation for Nonlinear Cyber-Physical Systems With Sensor Failures and Token Bucket Protocol Under False Data Injection Attacks', IEEE Transactions on Cybernetics, 0 (early access), pp. 1 - 13. doi: 10.1109/TCYB.2025.3612502.en_US
dc.identifier.issn2168-2267-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/32441-
dc.description.abstractThis article is concerned with the recursive state estimation issue for a class of nonlinear cyber-physical systems (CPSs) with token bucket protocols (TBPs) subject to sensor failures and false data injection (FDI) attacks. In the system under consideration, measurement signals are transmitted to the remote estimator only when there are sufficient tokens in the bucket to meet the token consumption. During network transmissions, the signals are exposed to FDI attacks, which occur randomly and follow a Bernoulli distribution. The primary objective is to develop a state estimation algorithm that can handle the TBP, sensor failures, and FDI attacks simultaneously. Initially, the upper bound of the EEC is derived using an intensive stochastic technique and the induction approach. Subsequently, the desired estimator gains are recursively computed to minimize this upper bound. Finally, an example is presented to demonstrate the effectiveness of the proposed estimation scheme.en_US
dc.description.sponsorship10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61933007 and 62273087); Shanghai Pujiang Program of China (Grant Number: 22PJ1400400); Royal Society of the UK; Alexander von Humboldt Foundation of Germany.en_US
dc.format.extent1 - 13-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).-
dc.rights.urihttps://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.subjectCPSen_US
dc.subjectFDI attacksen_US
dc.subjectnonlinear systemsen_US
dc.subjectrecursive state estimationen_US
dc.subjectsensor failuresen_US
dc.subjectTBPen_US
dc.titleState Estimation for Nonlinear Cyber-Physical Systems With Sensor Failures and Token Bucket Protocol Under False Data Injection Attacksen_US
dc.typeArticleen_US
dc.date.dateAccepted2025-09-16-
dc.identifier.doihttps://doi.org/10.1109/TCYB.2025.3612502-
dc.relation.isPartOfIEEE Transactions on Cybernetics-
pubs.issue0-
pubs.publication-statusPublished-
pubs.volume00-
dc.identifier.eissn2168-2275-
dcterms.dateAccepted2025-09-16-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).1.05 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.