IEEE/CAA Journal of Automatica Sinica
Citation: | X. Gong, M. V. Basin, Z. G. Feng, T. W. Huang, and Y. K. Cui, “Resilient time-varying formation-tracking of multi-UAV systems against composite attacks: A two-layered framework,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 969–984, Apr. 2023. doi: 10.1109/JAS.2023.123339 |
[1] |
I. Bayezit and B. Fidan, “Distributed cohesive motion control of flight vehicle formations,” IEEE Trans. Industrial Electronics, vol. 60, no. 12, pp. 5763–5772, 2012.
|
[2] |
X. Dong, B. Yu, Z. Shi, and Y. Zhong, “Time-varying formation control for unmanned aerial vehicles: Theories and applications,” IEEE Trans. Control Systems Technology, vol. 23, no. 1, pp. 340–348, 2015. doi: 10.1109/TCST.2014.2314460
|
[3] |
X. Dong, Y. Zhou, Z. Ren, and Y. Zhong, “Time-varying formation tracking for second-order multi-agent systems subjected to switching topologies with application to quadrotor formation flying,” IEEE Trans. Industrial Electronics, vol. 64, no. 6, pp. 5014–5024, 2016.
|
[4] |
X. Dong, Y. Zhou, Z. Ren, and Y. Zhong, “Time-varying formation control for unmanned aerial vehicles with switching interaction topologies,” Control Engineering Practice, vol. 46, pp. 26–36, 2016. doi: 10.1016/j.conengprac.2015.10.001
|
[5] |
X. Dong, Y. Li, C. Lu, G. Hu, Q. Li, and Z. Ren, “Time-varying formation tracking for UAV swarm systems with switching directed topologies,” IEEE Trans. Neural Networks and Learning Systems, vol. 30, no. 12, pp. 3674–3685, 2018.
|
[6] |
L. Huang, M. Zhou, K. Hao, and E. Hou, “A survey of multi-robot regular and adversarial patrolling,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 4, pp. 894–903, 2019. doi: 10.1109/JAS.2019.1911537
|
[7] |
H. Liu, Q. Chen, N. Pan, Y. Sun, Y. An, and D. Pan, “UAV stocktaking task-planning for industrial warehouses based on improved hybrid differential evolution algorithm,” IEEE Trans. Industrial Informatics, vol. 18, no. 1, pp. 582–591, 2021.
|
[8] |
Z. Feng, G. Wen, and G. Hu, “Distributed secure coordinated control for multiagent systems under strategic attacks,” IEEE Trans. Cybernetics, vol. 47, no. 5, pp. 1273–1284, 2017. doi: 10.1109/TCYB.2016.2544062
|
[9] |
D. Zhang, L. Liu, and G. Feng, “Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and DoS attack,” IEEE Trans. Cybernetics, vol. 49, no. 4, pp. 1501–1511, 2019. doi: 10.1109/TCYB.2018.2806387
|
[10] |
Z. Feng and G. Hu, “Distributed secure average consensus for linear multi-agent systems under DoS attacks,” in Proc. American Control Conf., 2017, pp. 2261–2266.
|
[11] |
Z. Feng and G. Hu, “Distributed secure leader-following consensus of multi-agent systems under DoS attacks and directed topology,” in Proc. IEEE Int. Conf. Information and Automation, 2017, pp. 73–79.
|
[12] |
X. Guo, D. Zhang, J. Wang, and C. K. Ahn, “Adaptive memory event-triggered observer-based control for nonlinear multi-agent systems under DoS attacks,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 10, pp. 1644–1656, 2021. doi: 10.1109/JAS.2021.1004132
|
[13] |
Y. Yang, Y. Li, D. Yue, Y.-C. Tian, and X. Ding, “Distributed secure consensus control with event-triggering for multiagent systems under DoS attacks,” IEEE Trans. Cybernetics, vol. 51, no. 6, pp. 2916–2928, 2020.
|
[14] |
R. Langner, “StuxNet: Dissecting a cyberwarfare weapon,” IEEE Security Privacy, vol. 9, no. 3, pp. 49–51, 2011. doi: 10.1109/MSP.2011.67
|
[15] |
Y. Zhao, Z. Chen, C. Zhou, Y.-C. Tian, and Y. Qin, “Passivity-based robust control against quantified false data injection attacks in cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 8, pp. 1440–1450, 2021. doi: 10.1109/JAS.2021.1004012
|
[16] |
S. Zuo, F. L. Lewis, and A. Davoudi, “Resilient output containment of heterogeneous cooperative and adversarial multigroup systems,” IEEE Trans. Automatic Control, vol. 65, no. 7, pp. 3104–3111, 2019.
|
[17] |
G. De La Torre, T. Yucelen, and J. D. Peterson, “Resilient networked multiagent systems: A distributed adaptive control approachy,” in Proc. 53rd IEEE Conf. Decision and Control, 2014, pp. 5367–5372.
|
[18] |
C. Xie and G. Yang, “Decentralized adaptive fault-tolerant control for large-scale systems with external disturbances and actuator faults,” Automatica, vol. 85, pp. 83–90, 2017. doi: 10.1016/j.automatica.2017.07.037
|
[19] |
Y. Wu, J. Liu, Z. Wang, and Z. Ju, “Distributed resilient tracking of multiagent systems under actuator and sensor faults,” IEEE Trans. Cybernetics, 2021. DOI: 10.1109/TCYB.2021.3132380
|
[20] |
S. Zuo, T. Altun, F. L. Lewis, and A. Davoudi, “Distributed resilient secondary control of DC microgrids against unbounded attacks,” IEEE Trans. Smart Grid, vol. 11, no. 5, pp. 3850–3859, 2020. doi: 10.1109/TSG.2020.2992118
|
[21] |
K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults and attacks including false data injection attack in smart grid using Kalman filter,” IEEE Trans. Control of Network Systems, vol. 1, no. 4, pp. 370–379, 2014. doi: 10.1109/TCNS.2014.2357531
|
[22] |
A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design of cooperative systems against attacks,” IEEE Trans. Automatic Control, vol. 63, no. 9, pp. 3159–3166, 2018. doi: 10.1109/TAC.2018.2793164
|
[23] |
J. Zhou, Y. Lv, G. Wen, and X. Yu, “Resilient consensus of multiagent systems under malicious attacks: Appointed-time observer-based approach,” IEEE Trans. Cybernetics, vol. 52, no. 10, pp. 10 187–10 199, 2022. doi: 10.1109/TCYB.2021.3058094
|
[24] |
S. Xiao and J. Dong, “Distributed fault-tolerant containment control for nonlinear multi-agent systems under directed network topology via hierarchical approach,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 4, pp. 806–816, 2021. doi: 10.1109/JAS.2021.1003928
|
[25] |
Q. Zhu and Z. Xu, Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach. Berlin, Germany: Springer Nature, 2020, vol. 81.
|
[26] |
Y. Fan, L. Liu, G. Feng, and Y. Wang, “Self-triggered consensus for multi-agent systems with Zeno-free triggers,” IEEE Trans. Automatic Control, vol. 60, no. 10, pp. 2779–2784, 2015. doi: 10.1109/TAC.2015.2405294
|
[27] |
C. Gehrmann and M. Gunnarsson, “A digital twin based industrial automation and control system security architecture,” IEEE Trans. Industrial Informatics, vol. 16, no. 1, pp. 669–680, 2019.
|
[28] |
H. K. Khalil and J. W. Grizzle, Nonlinear Systems. Ssddle River, USA: Prentice Hall Upper, 2002.
|
[29] |
D. S. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas. NJ, USA: Princeton University Press, 2009.
|
[30] |
X. Gong, Y. Cui, J. Shen, Z. Shu, and T. Huang, “Distributed prescribed-time interval bipartite consensus of multi-agent systems on directed graphs: Theory and experiment,” IEEE Trans. Network Science Engineering, vol. 8, no. 1, pp. 613–624, 2020.
|
[31] |
X. Chen, Y. Wang, and S. Hu, “Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks,” Information Sciences, vol. 459, pp. 369–386, 2018. doi: 10.1016/j.ins.2018.05.019
|
[32] |
J. Zhang and G. Yang, “Fault-tolerant output-constrained control of unknown Euler-Lagrange systems with prescribed tracking accuracy,” Automatica, vol. 111, p. 108606, 2020. doi: 10.1016/j.automatica.2019.108606
|
[33] |
J. Zhang and G. Yang, “Robust adaptive fault-tolerant control for a class of unknown nonlinear systems,” IEEE Trans. Industrial Electronics, vol. 64, no. 1, pp. 585–594, 2016.
|
[34] |
W. Liu and J. Huang, “Leader-following consensus for linear multiagent systems via asynchronous sampled-data control,” IEEE Trans. Automatic Control, vol. 65, no. 7, pp. 3215–3222, 2019.
|
[35] |
W. E. Roth, “The equations AX – YB = C and AX – XB = C in matrices,” Proc. American Mathematical Society, vol. 3, no. 3, pp. 392–396, 1952.
|
[36] |
C. Murguia, F. Farokhi, and I. Shames, “Secure and private implementation of dynamic controllers using semihomomorphic encryption,” IEEE Trans. Automatic Control, vol. 65, no. 9, pp. 3950–3957, 2020. doi: 10.1109/TAC.2020.2992445
|
[37] |
G. Zhao and C. Hua, “Leaderless and leader-following bipartite consensus of multiagent systems with sampled and delayed information,” IEEE Trans. Neural Networks Learning Systems, 2021. DOI: 10.1109/TNNLS.2021.3106015
|
[38] |
X. Deng, F. Long, B. Li, D. Cao, and Y. Pan, “An influence model based on heterogeneous online social network for influence maximization,” IEEE Trans. Network Science and Engineering, vol. 7, no. 2, pp. 737–749, 2019.
|
[39] |
X. Zhang, J. Wu, C. Duan, M. T. Emmerich, and T. Bäck, “Towards robustness optimization of complex networks based on redundancy backup,” in Proc. IEEE Congr. Evolutionary Computation, 2015, pp. 2820–2826.
|
[40] |
D. Mellinger and V. Kumar, “Minimum snap trajectory generation and control for quadrotors,” in Proc. IEEE Int. Conf. Robotics and Automation, 2011, pp. 2520–2525.
|