Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/32441Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Wang, Y-A | - |
| dc.contributor.author | Wang, Z | - |
| dc.contributor.author | Zou, L | - |
| dc.contributor.author | Wang, F | - |
| dc.date.accessioned | 2025-12-04T13:35:09Z | - |
| dc.date.available | 2025-12-04T13:35:09Z | - |
| dc.date.issued | 2025-10-01 | - |
| dc.identifier | ORCiD: Yu-Ang Wang https://orcid.org/0000-0002-0952-1465 | - |
| dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
| dc.identifier | ORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941 | - |
| dc.identifier | ORCiD: Fan Wang https://orcid.org/0000-0002-0772-9801 | - |
| dc.identifier.citation | Wang, Y.-A. et al. (2025) 'State Estimation for Nonlinear Cyber-Physical Systems With Sensor Failures and Token Bucket Protocol Under False Data Injection Attacks', IEEE Transactions on Cybernetics, 0 (early access), pp. 1 - 13. doi: 10.1109/TCYB.2025.3612502. | en_US |
| dc.identifier.issn | 2168-2267 | - |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/32441 | - |
| dc.description.abstract | This article is concerned with the recursive state estimation issue for a class of nonlinear cyber-physical systems (CPSs) with token bucket protocols (TBPs) subject to sensor failures and false data injection (FDI) attacks. In the system under consideration, measurement signals are transmitted to the remote estimator only when there are sufficient tokens in the bucket to meet the token consumption. During network transmissions, the signals are exposed to FDI attacks, which occur randomly and follow a Bernoulli distribution. The primary objective is to develop a state estimation algorithm that can handle the TBP, sensor failures, and FDI attacks simultaneously. Initially, the upper bound of the EEC is derived using an intensive stochastic technique and the induction approach. Subsequently, the desired estimator gains are recursively computed to minimize this upper bound. Finally, an example is presented to demonstrate the effectiveness of the proposed estimation scheme. | en_US |
| dc.description.sponsorship | 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61933007 and 62273087); Shanghai Pujiang Program of China (Grant Number: 22PJ1400400); Royal Society of the UK; Alexander von Humboldt Foundation of Germany. | en_US |
| dc.format.extent | 1 - 13 | - |
| dc.format.medium | Print-Electronic | - |
| dc.language | English | - |
| dc.language.iso | en_US | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.rights | Creative Commons Attribution 4.0 International | - |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | - |
| dc.subject | CPS | en_US |
| dc.subject | FDI attacks | en_US |
| dc.subject | nonlinear systems | en_US |
| dc.subject | recursive state estimation | en_US |
| dc.subject | sensor failures | en_US |
| dc.subject | TBP | en_US |
| dc.title | State Estimation for Nonlinear Cyber-Physical Systems With Sensor Failures and Token Bucket Protocol Under False Data Injection Attacks | en_US |
| dc.type | Article | en_US |
| dc.date.dateAccepted | 2025-09-16 | - |
| dc.identifier.doi | https://doi.org/10.1109/TCYB.2025.3612502 | - |
| dc.relation.isPartOf | IEEE Transactions on Cybernetics | - |
| pubs.issue | 0 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 00 | - |
| dc.identifier.eissn | 2168-2275 | - |
| dc.rights.license | https://creativecommons.org/licenses/by/4.0/legalcode.en | - |
| dcterms.dateAccepted | 2025-09-16 | - |
| dc.rights.holder | The Author(s) | - |
| Appears in Collections: | Dept of Computer Science Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FullText.pdf | “For the purpose of open access, the author(s) has applied a Creative Commons Attribution (CC BY) license to any Accepted Manuscript version arising.” | 1.7 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License