Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/32663Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Yu, H | - |
| dc.contributor.author | Wang, Z | - |
| dc.contributor.author | Wang, Y | - |
| dc.contributor.author | Zou, L | - |
| dc.date.accessioned | 2026-01-16T17:03:20Z | - |
| dc.date.available | 2026-01-16T17:03:20Z | - |
| dc.date.issued | 2026-01-13 | - |
| dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
| dc.identifier | ORCiD: Yezheng Wang https://orcid.org/0000-0001-8952-5222 | - |
| dc.identifier | ORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941 | - |
| dc.identifier.citation | Yu H. et al. (2026) '<i>H</i><sub>∞</sub> Fuzzy Control for A Class of Cyber-Physical Systems Under Frequency-Duration-Constrained Replay Attacks', IEEE Internet of Things Journal, 0 (early access), pp. 1 - 13. doi: 10.1109/jiot.2026.3653965. | en_US |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/32663 | - |
| dc.description.abstract | In this article, the <i>H</i><sub>∞</sub> fuzzy control problem is investigated for a class of nonlinear systems subject to replay attacks with frequency-duration constraints. Owing to the vulnerability of the open shared communication network, the information transmitted from the sensor to the controller may be exposed to replay attackers. A novel yet comprehensive replay attack model is constructed to characterize the repeated replay behavior of the adversary. On the basis of the constructed model, a fuzzy controller is designed to guarantee asymptotic stability and the desired <i>H</i><sub>∞</sub> performance. By employing Lyapunov stability theory and the orthogonal decomposition technique, sufficient conditions are derived to ensure the existence of the desired controller parameter. Finally, simulation results are presented to verify the effectiveness and correctness of the proposed fuzzy controller for T-S fuzzy systems under replay attacks. | en_US |
| dc.description.sponsorship | This work was supported in part by the National Natural Science Foundation of China under Grants 62273087 and 62503235; in part by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology of China under Grant 1083142501018; in part by the Fundamental Science (Natural Science) Research Project of Higher Education Institutions of Jiangsu Province of China under Grant 25KJB413007; in part by the Royal Society of the UK; and in part by the Alexander von Humboldt Foundation of Germany. | en_US |
| dc.format.extent | 1 - 13 | - |
| dc.format.medium | Electronic | - |
| dc.language | English | - |
| dc.language.iso | en_US | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.rights | Creative Commons Attribution 4.0 International | - |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | - |
| dc.subject | T-S fuzzy systems | en_US |
| dc.subject | cyber-physical systems | en_US |
| dc.subject | <i>H</i><sub>∞</sub> control | en_US |
| dc.subject | cyber attacks | en_US |
| dc.subject | replay attacks | en_US |
| dc.subject | frequency-duration constraints | en_US |
| dc.title | <i>H</i><sub>∞</sub> Fuzzy Control for A Class of Cyber-Physical Systems Under Frequency-Duration-Constrained Replay Attacks | en_US |
| dc.type | Article | en_US |
| dc.identifier.doi | https://doi.org/10.1109/jiot.2026.3653965 | - |
| dc.relation.isPartOf | IEEE Internet of Things Journal | - |
| pubs.issue | 0 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 00 | - |
| dc.identifier.eissn | 2327-4662 | - |
| dc.rights.license | https://creativecommons.org/licenses/by/4.0/legalcode.en | - |
| dc.rights.holder | The Author(s) | - |
| dc.contributor.orcid | Wang, Zidong [0000-0002-9576-7401] | - |
| dc.contributor.orcid | Wang, Yezheng [0000-0001-8952-5222] | - |
| dc.contributor.orcid | Zou, Lei [0000-0002-0409-7941] | - |
| Appears in Collections: | Dept of Computer Science Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FullText.pdf | For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising. | 681.63 kB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License