Journal: J. Control. Decis.

Volume 11, Issue 4

0 -- 0Xiang Ma, Zhan Li. RETRACTED ARTICLE: Balanced scheduling method of network information resources for cloud storage
545 -- 562Tengfei Zhang, Heng Wang 0002, Weiwei Che, Qing Li 0015. Adaptive event-triggered path following control for networked autonomous vehicles under aperiodic denial-of-service attacks
563 -- 571Jun-Xiao Song, Jun-Wei Gao, Hai-Sheng Yu, Hua-Bo Liu. Quadratic stability of uncertain large-scale networked systems
572 -- 589Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001. Unified optimality criteria for the Target-Attacker-Defender game
590 -- 602K. Gnaneshwar, Vinay Kumar, Sudeep Sharma, Prabin Kumar Padhy. Non-parametric fractional-order controller design for stable process based on modified relay
603 -- 613Rongsheng Xia, Han Jiang, Lei Su. Reinforcement learning based sliding mode control for two-time-scale multi-agent systems with malicious attacks
614 -- 632S. Suganthi, T. Sree Kala. A novel secure aware privacy preserved data sharing framework in an E-government system based on a consortium blockchain
633 -- 649Bandana Priya, M. Mubeen Tajudeen, M. Syed Ali 0001, Grienggrai Rajchakit, Ganesh Kumar Thakur. ∞ control of complex dynamical networks subject to stochastic cyber-attacks by new two-sided delay-dependent LKF functional
650 -- 659Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali. False data injection attacks on networked control systems
660 -- 668Xingyuan Yang, Xi Tong, Yangwang Fang. Robust control allocation method for uncertain systems based on the algorithms of maximum-minimum and improved fish swarm
669 -- 677Ling Chen, MingChu Li. Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule
678 -- 688Abdellaziz Binid, Toufik Ennouari, Bouchra Abouzaid. Stability of conformable fractional time-varying linear systems
689 -- 706Amir Mohammad Aghazamani, Mahdi Khodabandeh. Fault-tolerant adaptive fractional order sliding mode control for a quadrotor using disturbance observer
707 -- 729Ayorinde Bamimore. Application of gap metric for model selection in linear parameter varying model-based predictive control
730 -- 745Samuel B, Kasturi K. A secure authentication and collaborative data-sharing model based on a blockchain network in the cloud
746 -- 757Chandrababu Majjaru, K. Senthilkumar 0002. Secure intrusion detection system for IOT sensor data using LR-ECC and FY-SFL-DLNN algorithm
758 -- 769Thiem V. Pham, Quynh T. Thanh Nguyen. Attack on communication links analysis and detection over the clustered networks
770 -- 780Bao Jin, Chunxia Dou, Jiannan Chen, Victor Kuzin. Relative threshold event-triggered prescribed performance control for vehicle active suspension systems with uncertainty
781 -- 788Zhenhua Wang, Yanli Zhu, Ben Niu. Consensus tracking for first-order agent dynamics with distributed delay
789 -- 802Heng Kang, Minqing Xiao, Guisheng Zhai. 2 gain of nonlinear interconnected systems
803 -- 824Kariyappa Janani, Sriramulu Ramamoorthy. PIoT-blockchain-enabled security framework for strengthening IoT device identity and data access