A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 12 Issue 12
Dec.  2025

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 19.2, Top 1 (SCI Q1)
    CiteScore: 28.2, Top 1% (Q1)
    Google Scholar h5-index: 95, TOP 5
Turn off MathJax
Article Contents
J. Liu, J. Tang, L. Zha, and E. Tian, “Non-fragile filtering for discrete-time networked systems subject to fading measurements: An encryption and decryption scheme,” IEEE/CAA J. Autom. Sinica, vol. 12, no. 12, pp. 2618–2620, Dec. 2025. doi: 10.1109/JAS.2025.125402
Citation: J. Liu, J. Tang, L. Zha, and E. Tian, “Non-fragile filtering for discrete-time networked systems subject to fading measurements: An encryption and decryption scheme,” IEEE/CAA J. Autom. Sinica, vol. 12, no. 12, pp. 2618–2620, Dec. 2025. doi: 10.1109/JAS.2025.125402

Non-Fragile Filtering for Discrete-Time Networked Systems Subject to Fading Measurements: An Encryption and Decryption Scheme

doi: 10.1109/JAS.2025.125402
More Information
  • loading
  • [1]
    H. Guo, J. Sun, Z.-H. Pang, and G.-P. Liu, “Event-based optimal stealthy false data-injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, 2023. doi: 10.1109/TCYB.2023.3255583
    [2]
    H. Guo, J. Sun, and Z.-H. Pang, “Analysis of replay attacks with countermeasure for state estimation of cyber-physical systems,” IEEE Trans. Circuits and Systems II: Express Briefs, vol. 71, no. 1, pp. 206–210, 2024.
    [3]
    C. Lu, X.-M. Zhang, M. Wu, Q.-L. Han, and Y. He, “Energy-to-peak state estimation for static neural networks with interval time-varying delays,” IEEE Trans. Cybern., vol. 48, no. 10, pp. 2823–2835, 2018. doi: 10.1109/TCYB.2018.2836977
    [4]
    L. Zou, Z. Wang, H. Dong, and Q.-L. Han, “Energy-to-peak state estimation with intermittent measurement outliers: The single-output case,” IEEE Trans. Cybern., vol. 52, no. 11, pp. 504–515, 2022.
    [5]
    Q. Zheng, S. Xu, and Z. Zhang, “Nonfragile H control for uncertain takagi-sugeno fuzzy systems under digital communication channels and its application,” IEEE Trans. Systems, Man, and Cybern.: Systems, vol. 52, no. 6, pp. 3638–3647, 2021.
    [6]
    L. Zou, Z. Wang, B. Shen, H. Dong, and G. Lu, “Encrypted finitehorizon energy-to-peak state estimation for time-varying systems under eavesdropping attacks: Tackling secrecy capacity,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 985–996, 2023. doi: 10.1109/JAS.2023.123393
    [7]
    L. Wang, Z. Wang, D. Zhao, and G. Wei, “Event-based state estimation under constrained bit rate: An encoding-decoding approach,” Automatica, vol. 143, p. 110421, 2022. doi: 10.1016/j.automatica.2022.110421
    [8]
    L. Zou, Z. Wang, B. Shen, and H. Dong, “Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: A recursive minimum-variance approach,” IEEE Trans. Autom. Control, vol. 68, no. 12, pp. 8111–8118, 2023. doi: 10.1109/TAC.2023.3288624
    [9]
    W. Chen, Z. Wang, J. Hu, and G.-P. Liu, “Differentially private average consensus with logarithmic dynamic encoding-decoding scheme,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6725–6736, 2023. doi: 10.1109/TCYB.2022.3233296
    [10]
    Z. Zhang, P. Cheng, J. Wu, and J. Chen, “Secure state estimation using hybrid homomorphic encryption scheme,” IEEE Trans. Control Systems Technology, vol. 29, no. 4, pp. 1704–1720, 2021. doi: 10.1109/TCST.2020.3019501
    [11]
    K. Reif, S. Gunther, E. Yaz, and R. Unbehauen, “Stochastic stability of the discrete-time extended kalman filter,” IEEE Trans. Autom. control, vol. 44, no. 4, pp. 714–728, 1999. doi: 10.1109/9.754809

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)

    Article Metrics

    Article views (9) PDF downloads(1) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return