These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 35086672)

  • 1. Distributed interval state estimation with l
    Xie J; Zhu S; Zhang D
    ISA Trans; 2022 Aug; 127():22-31. PubMed ID: 35086672
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Secure State Estimation of Nonlinear Cyber-Physical Systems Against DoS Attacks: A Multiobserver Approach.
    Yan JJ; Yang GH
    IEEE Trans Cybern; 2023 Mar; 53(3):1447-1459. PubMed ID: 34473637
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.
    Zhang Q; Liu K; Pang Z; Xia Y; Liu T
    IEEE Trans Cybern; 2022 Jun; 52(6):4926-4934. PubMed ID: 33119521
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Robust fuzzy filter design for nonlinear systems with persistent bounded disturbances.
    Tseng CS
    IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):940-5. PubMed ID: 16903377
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Event-triggering control scheme for discrete time Cyberphysical Systems in the presence of simultaneous hybrid stochastic attacks.
    Hamdan MM; Mahmoud MS; Baroudi UA
    ISA Trans; 2022 Mar; 122():1-12. PubMed ID: 33934902
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Event-triggered interval estimation method for cyber-physical systems with unknown inputs.
    Huang J; Fan J; Dinh TN; Zhao X; Zhang Y
    ISA Trans; 2023 Apr; 135():1-12. PubMed ID: 36175187
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.
    Ren XX; Yang GH
    IEEE Trans Cybern; 2022 Nov; 52(11):11539-11548. PubMed ID: 33872173
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Finite-horizon tracking control for a class of stochastic systems subject to input constraints and hybrid cyber attacks.
    Zhao X; Liu C; Tian E
    ISA Trans; 2020 Sep; 104():93-100. PubMed ID: 30902497
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure platooning control of automated vehicles under cyber attacks.
    Mousavinejad E; Vlacic L
    ISA Trans; 2022 Aug; 127():229-238. PubMed ID: 35292170
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.
    Huang X; Dong J
    IEEE Trans Cybern; 2018 Dec; 48(12):3432-3439. PubMed ID: 29994296
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Distributed fault detection and estimation in cyber-physical systems subject to actuator faults.
    Xu D; Zhu F; Zhou Z; Yan X
    ISA Trans; 2020 Sep; 104():162-174. PubMed ID: 31864636
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Event-Triggered Distributed State Estimation for Cyber-Physical Systems Under DoS Attacks.
    Liu Y; Yang GH
    IEEE Trans Cybern; 2022 May; 52(5):3620-3631. PubMed ID: 32915758
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optimal Stealthy Deception Attack Against Cyber-Physical Systems.
    Zhang Q; Liu K; Xia Y; Ma A
    IEEE Trans Cybern; 2020 Sep; 50(9):3963-3972. PubMed ID: 31071059
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks.
    Ao W; Song Y; Wen C
    IEEE Trans Cybern; 2020 Jan; 50(1):259-269. PubMed ID: 30575552
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Resilient Tracking Control of Networked Control Systems Under Cyber Attacks.
    Mousavinejad E; Ge X; Han QL; Yang F; Vlacic L
    IEEE Trans Cybern; 2021 Apr; 51(4):2107-2119. PubMed ID: 31722506
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Observer-based H
    Wang M; Liu Y; Xu B
    ISA Trans; 2020 Sep; 104():1-14. PubMed ID: 31955945
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.