default search action
IEEE Transactions on Industrial Informatics, Volume 19
Volume 19, Number 1, January 2023
- Yue Zhuo, Zhenqin Yin, Zhiqiang Ge:
Attack and Defense: Adversarial Security of Data-Driven FDC Systems. 5-19 - Yanjiao Chen, Xiaotian Zhu, Xueluan Gong, Xinjing Yi, Shuyang Li:
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions. 20-28 - Jingxin Zhang, Donghua Zhou, Maoyin Chen:
Self-Learning Sparse PCA for Multimode Process Monitoring. 29-39 - Chao Jiang, Yusheng Lu, Weimin Zhong, Biao Huang, Dayu Tan, Wenjiang Song, Feng Qian:
Deep Bayesian Slow Feature Extraction With Application to Industrial Inferential Modeling. 40-51 - Felipe Arraño-Vargas, Georgios Konstantinou:
Modular Design and Real-Time Simulators Toward Power System Digital Twins Implementation. 52-61 - Xin Liu, Jian Yang, Wenshuo Li, Panpan Huang, Lei Guo:
Tightly Coupled Modeling and Reliable Fusion Strategy for Polarization-Based Attitude and Heading Reference System. 62-73 - Runqi Chai, Antonios Tsourdos, Senchun Chai, Yuanqing Xia, Al Savvaris, C. L. Philip Chen:
Multiphase Overtaking Maneuver Planning for Autonomous Ground Vehicles Via a Desensitized Trajectory Optimization Approach. 74-87 - Hang Yu, Kwan-Wu Chin:
Learning Algorithms for Data Collection in RF-Charging IIoT Networks. 88-97 - Jinli Zhao, Ziqi Zhang, Hao Yu, Haoran Ji, Peng Li, Wei Xi, Jinyue Yan, Chengshan Wang:
Cloud-Edge Collaboration-Based Local Voltage Control for DGs With Privacy Preservation. 98-108 - Qingmian Chai, Cuo Zhang, Ziyuan Tong, Shuai Lu, Wen Chen, Zhao Yang Dong:
PV Inverter Reliability Constrained Volt/Var Control With Power Smoothing via a Convex-Concave Programming Method. 109-120 - Shiguang Wu, Zhiqiang Pu, Tenghai Qiu, Jianqiang Yi, Tianle Zhang:
Deep-Reinforcement-Learning-Based Multitarget Coverage With Connectivity Guaranteed. 121-132 - Yachao Zhang, Shiwei Xie, Shengwen Shu:
Decentralized Optimization of Multiarea Interconnected Traffic-Power Systems With Wind Power Uncertainty. 133-143 - Mohammed Abdulaziz Aide Al-qaness, Abdelghani Dahou, Mohamed Abd Elaziz, Ahmed Helmi:
Multi-ResAtt: Multilevel Residual Network With Attention for Human Activity Recognition Using Wearable Sensors. 144-152 - Ahmed S. Musleh, Guo Chen, Zhao Yang Dong, Chen Wang, Shiping Chen:
Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders. 153-165 - Xiaoli Zhao, Jianyong Yao, Wenxiang Deng, Peng Ding, Jichao Zhuang, Zheng Liu:
Multiscale Deep Graph Convolutional Networks for Intelligent Fault Diagnosis of Rotor-Bearing System Under Fluctuating Working Conditions. 166-176 - Chensheng Liu, Wangli He, Ruilong Deng, Yu-Chu Tian, Wenli Du:
False-Data-Injection-Enabled Network Parameter Modifications in Power Systems: Attack and Detection. 177-188 - Zhiyuan Chen, Xiangyang Xing, Xiaoyan Li, Xianzhe Pang, Chenghui Zhang:
The Zero-Sequence Circulating Current Suppression Method for Parallel Three-Level Rectifiers System Under the Open-Circuit Fault of Neutral-Point Switches. 189-199 - Issam A. Smadi, Haya Altabbal, Bayan H. Bany Fawaz:
A Phase-Locked Loop With Inherent DC Offset Rejection for Single-Phase Applications. 200-209 - Muhammad Zohaib Hassan Shah, Zahoor Ahmed, Hu Lisheng:
Weighted Linear Local Tangent Space Alignment via Geometrically Inspired Weighted PCA for Fault Detection. 210-219 - Sarah M. Azzam, Tallal Elshabrawy, Mohamed Ashour:
A Bi-Level Framework for Supply and Demand Side Energy Management in an Islanded Microgrid. 220-231 - Weihua Liu, Yuanming Zhang, Xinghu Yu:
A Novel Subpixel Industrial Chip Detection Method Based on the Dual-Edge Model for Surface Mount Equipment. 232-242 - Bakkiam David Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Weizheng Wang, Nawab Muhammad Faseeh Qureshi:
TAB-SAPP: A Trust-Aware Blockchain-Based Seamless Authentication for Massive IoT-Enabled Industrial Applications. 243-250 - Kaixiang Yang, Yifan Shi, Zhiwen Yu, Qinmin Yang, Arun Kumar Sangaiah, Huanqiang Zeng:
Stacked One-Class Broad Learning System for Intrusion Detection in Industry 4.0. 251-260 - Zongyuan Ding, Tao Wang, Quansen Sun, Fuhua Chen:
Rethinking Click Embedding for Deep Interactive Image Segmentation. 261-273 - Moloud Abdar, Mohammad Amin Fahami, Leonardo Rundo, Petia Radeva, Alejandro F. Frangi, U. Rajendra Acharya, Abbas Khosravi, Hak-Keung Lam, Alexander Jung, Saeid Nahavandi:
Hercules: Deep Hierarchical Attentive Multilevel Fusion Model With Uncertainty Quantification for Medical Image Classification. 274-285 - Ons Aouedi, Kandaraj Piamrat, Guillaume Muller, Kamal Deep Singh:
Federated Semisupervised Learning for Attack Detection in Industrial Internet of Things. 286-295 - Hasan Asy'ari Arief, Peter James Thomas, Tomasz Wiktorski:
Better Modeling Out-of-Distribution Regression on Distributed Acoustic Sensor Data Using Anchored Hidden State Mixup. 296-305 - He Li, Shihui Zhang, Weihang Kong:
RGB-D Crowd Counting With Cross-Modal Cycle-Attention Fusion and Fine-Coarse Supervision. 306-316 - Yong Zhang, Ping Zhou, Donghao Lv, Sen Zhang, Guimei Cui, Hong Wang:
Inverse Calculation of Burden Distribution Matrix Using B-Spline Model Based PDF Control in Blast Furnace Burden Charging Process. 317-327 - Junjie Jiang, Zaixing He, Xinyue Zhao, Shuyou Zhang, Chenrui Wu, Yang Wang:
REG-Net: Improving 6DoF Object Pose Estimation With 2D Keypoint Long-Short-Range-Aware Registration. 328-338 - Tripti Gangwar, Narayana Prasad Padhy, Premalata Jena:
Storage Allocation in Active Distribution Networks Considering Life Cycle and Uncertainty. 339-350 - Dajun Du, Changda Zhang, Xue Li, Minrui Fei, Huiyu Zhou:
Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking. 351-361 - Heshou Wang, Ka Wai Eric Cheng:
Analysis, Design, and Validation of a Decoupled Double-Receiver Wireless Power Transfer System With Constant Voltage Outputs for Industrial Power Supplies. 362-370 - Amirhossein Ahmadi, Mojtaba Nabipour, Saman Taheri, Behnam Mohammadi-Ivatloo, Vahid Vahidinasab:
A New False Data Injection Attack Detection Model for Cyberattack Resilient Energy Forecasting. 371-381 - Jianwen Sun, Lu Gao, Xiaoxuan Shen, Sannyuya Liu, Ruxia Liang, Shangheng Du, Shengyingjie Liu:
Separated Graph Neural Networks for Recommendation Systems. 382-393 - Yan Zhang, Guojiang Shen, Xiao Han, Wei Wang, Xiangjie Kong:
Spatio-Temporal Digraph Convolutional Network-Based Taxi Pickup Location Recommendation. 394-403 - Binyi Su, Zhong Zhou, Haiyong Chen:
PVEL-AD: A Large-Scale Open-World Dataset for Photovoltaic Cell Anomaly Detection. 404-413 - Dimas A. Schuetz, Caio Ruviaro Dantas Osório, Luiz Antonio Maccari, Daniel Martins Lima, Fernanda de M. Carnielutti, Vinicius Foletto Montagner, Humberto Pinheiro:
Space Vector Modulated Model Predictive Control for Grid-Tied Converters. 414-425 - Ruiqi Jiang, Shaoxiong Zeng, Qing Song, Zhou Wu:
Deep-Chain Echo State Network With Explainable Temporal Dependence for Complex Building Energy Prediction. 426-435 - Keke Huang, Shijun Tao, Dehao Wu, Chunhua Yang, Weihua Gui, Shiyan Hu:
Trustworthiness of Process Monitoring in IIoT Based on Self-Weighted Dictionary Learning. 436-446 - Zhe Chen, Shiqing Tian, Xiaotao Shi, Huimin Lu:
Multiscale Shared Learning for Fault Diagnosis of Rotating Machinery in Transportation Infrastructures. 447-458 - Tiange Wang, Zijun Zhang, Kwok-Leung Tsui:
A Deep Generative Approach for Rail Foreign Object Detections via Semisupervised Learning. 459-468 - Haoyang Yan, Zhiyong Cui, Xinqiang Chen, Xiaolei Ma:
Distributed Multiagent Deep Reinforcement Learning for Multiline Dynamic Bus Timetable Optimization. 469-479 - Xingxia Dai, Zhu Xiao, Hongbo Jiang, Mamoun Alazab, John C. S. Lui, Schahram Dustdar, Jiangchuan Liu:
Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things. 480-490 - Junhuai Li, Ruijie Wang, Kan Wang:
Service Function Chaining in Industrial Internet of Things With Edge Intelligence: A Natural Actor-Critic Approach. 491-502 - Ship Peng Xu, Ke Wang, Md. Rafiul Hassan, Mohammad Mehedi Hassan, Chien-Ming Chen:
An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems. 503-510 - Rahim Khan, Jason Teo, Mian Ahmad Jan, Sahil Verma, Ryan Alturki, Abdullah Gani:
A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things. 511-518 - Tharaka Hewa, Pawani Porambage, Ivana Kovacevic, Nisita Weerasinghe, Erkki Harjula, Madhusanka Liyanage, Mika Ylianttila:
Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service. 519-530 - Zhuoran Lu, Yingjie Wang, Xiangrong Tong, Chunxiao Mu, Yu Chen, Yingshu Li:
Data-Driven Many-Objective Crowd Worker Selection for Mobile Crowdsourcing in Industrial IoT. 531-540 - Fanhui Kong, Jianqiang Li, Bin Jiang, Huihui Wang, Houbing Song:
Integrated Generative Model for Industrial Anomaly Detection via Bidirectional LSTM and Attention Mechanism. 541-550 - Yen-Ting Chen, Chia-Yi Hsu, Chia-Mu Yu, Mahmoud Barhamgi, Charith Perera:
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things. 551-560 - Xingjuan Cai, Yang Lan, Zhixia Zhang, Jie Wen, Zhihua Cui, Wensheng Zhang:
A Many-Objective Optimization Based Federal Deep Generation Model for Enhancing Data Processing Capability in IoT. 561-569 - Xiaokang Zhou, Yiyong Hu, Jiayi Wu, Wei Liang, Jianhua Ma, Qun Jin:
Distribution Bias Aware Collaborative Generative Adversarial Network for Imbalanced Deep Learning in Industrial IoT. 570-580 - Chinmay Chakraborty, João Manuel R. S. Tavares, Shaohua Wan, Houbing Herbert Song:
Guest Editorial: Augmented Intelligence of Things for Smart Enterprise Systems. 581-585 - Rahul Mishra, Hari Prabhat Gupta, Ramakant Kumar, Tanima Dutta:
Leveraging Augmented Intelligence of Things to Enhance Lifetime of UAV-Enabled Aerial Networks. 586-593 - Guangsheng Chen, Weitao Zou, Weipeng Jing, Wei Wei, Rafal Scherer:
Improving the Efficiency of the EMS-Based Smart City: A Novel Distributed Framework for Spatial Data. 594-604 - Yanchen Qiao, Weizhe Zhang, Zhicheng Tian, Laurence T. Yang, Yang Liu, Mamoun Alazab:
Adversarial ELF Malware Detection Method Using Model Interpretation. 605-615 - Jing Yang, Laurence Tianruo Yang, Hao Wang, Yuan Gao:
Multirelational Tensor Graph Attention Networks for Knowledge Fusion in Smart Enterprise Systems. 616-625 - Sushil Kumar Singh, Jong Hyuk Park:
TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. 626-634 - Yuwen Liu, Huiping Wu, Khosro Rezaee, Mohammad Reza Khosravi, Osamah Ibrahim Khalaf, Arif Ali Khan, Dharavath Ramesh, Lianyong Qi:
Interaction-Enhanced and Time-Aware Graph Convolutional Network for Successive Point-of-Interest Recommendation in Traveling Enterprises. 635-643 - Hao Ran Chi, Ayman Radwan:
Fully-Decentralized Fairness-Aware Federated MEC Small-Cell Peer-Offloading for Enterprise Management Networks. 644-652 - Long Chen, Lingyan Xue, Haiping Huang, Wenming Wang, Mengxun Cao, Fu Xiao:
Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things. 653-661 - Xingxia Dai, Zhu Xiao, Hongbo Jiang, Mamoun Alazab, John C. S. Lui, Geyong Min, Schahram Dustdar, Jiangchuan Liu:
Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems. 662-672 - Zheng Li, Muhammad Bilal, Xiaolong Xu, Jielin Jiang, Yan Cui:
Federated Learning-Based Cross-Enterprise Recommendation With Graph Neural Networks. 673-682 - Mohammed M. Alani, Ali Ismail Awad:
An Intelligent Two-Layer Intrusion Detection System for the Internet of Things. 683-692 - Peng Li, Asif Ali Laghari, Mamoon Rashid, Jing Gao, Thippa Reddy Gadekallu, Abdul Rehman Javed, Shoulin Yin:
A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System. 693-702 - Sanjay Kumar, Akshi Kumar, B. S. Panda:
Identifying Influential Nodes for Smart Enterprises Using Community Structure With Integrated Feature Ranking. 703-711 - Yang Shi, Stamatis Karnouskos, Thilo Sauter, Huazhen Fang:
Guest Editorial: New Advancements in Industrial Cyber-Physical Systems. 712-715 - Kunwu Zhang, Yang Shi, Stamatis Karnouskos, Thilo Sauter, Huazhen Fang, Armando Walter Colombo:
Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives. 716-729 - Jing Chen, Yuan Tian, Guangbo Zhang, Zhengtao Cao, Lingling Zhu, Dawei Shi:
IoT-Enabled Intelligent Dynamic Risk Assessment of Acute Mountain Sickness: The Role of Event-Triggered Signal Processing. 730-738 - Kaja Balzereit, Oliver Niggemann:
AutoConf: New Algorithm for Reconfiguration of Cyber-Physical Production Systems. 739-749 - Xiang Huo, Mingxi Liu:
Encrypted Decentralized Multi-Agent Optimization for Privacy Preservation in Cyber-Physical Systems. 750-761 - Guangxing Niu, Enhui Liu, Xuan Wang, Paul Ziehl, Bin Zhang:
Enhanced Discriminate Feature Learning Deep Residual CNN for Multitask Bearing Fault Diagnosis With Information Fusion. 762-770 - Jiamin Xu, Haobin Ke, Zhiwen Chen, Xinyu Fan, Tao Peng, Chunhua Yang:
Oversmoothing Relief Graph Convolutional Network-Based Fault Diagnosis Method With Application to the Rectifier of High-Speed Trains. 771-779 - Fang Fang, Jiayu Li, Yajuan Liu, Ju H. Park:
Resilient Control for Multiagent Systems With a Sampled-Data Model Against DoS Attacks. 780-789 - Li Qiu, Longcheng Dai, Usama Ahsan, Chen Fang, Marzieh Najariyan, Jian Fei Pan:
Model Predictive Control for Networked Multiple Linear Motors System Under DoS Attack and Time Delay. 790-799 - Jiang Wei, Dan Ye:
Multisensor Scheduling for Remote State Estimation Over a Temporally Correlated Channel. 800-808 - Ashish Singh, Abhinav Kumar, Zahid Akhtar, Muhammad Khurram Khan:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. 809-812 - Khosro Rezaee, Hossein Ghayoumi Zadeh, Chinmay Chakraborty, Mohammad Reza Khosravi, Gwanggil Jeon:
Smart Visual Sensing for Overcrowding in COVID-19 Infected Cities Using Modified Deep Transfer Learning. 813-820 - Sangjukta Das, Suyel Namasudra:
Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure. 821-829 - Preeti Soni, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam:
Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System. 830-840 - Yang Li, Jiachen Yang, Zhuo Zhang, Jiabao Wen, Prabhat Kumar:
Healthcare Data Quality Assessment for Cybersecurity Intelligence. 841-848 - Ashima Anand, Amit Kumar Singh, Huiyu Zhou:
ViMDH: Visible-Imperceptible Medical Data Hiding for Internet of Medical Things. 849-856 - Huadong Liu, Tianlong Gu, Mohammad Shojafar, Mamoun Alazab, Yi-Ning Liu:
OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems. 857-866 - Prosanta Gope, Biplab Sikdar, Neetesh Saxena:
Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges. 867-869 - Mu-Yen Chen, Hsin-Te Wu:
An Automatic-Identification-System-Based Vessel Security System. 870-879 - Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Haitham S. Cruickshank, Anish Jindal, Nazri Kama:
TRUTH: Trust and Authentication Scheme in 5G-IIoT. 880-889 - Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Ikhyun Lee, Wali Ullah Khan, Weizheng Wang, Nawab Muhammad Faseeh Qureshi, Maurizio Magarini:
A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G. 890-899 - Chao Qiu, Gagangeet Singh Aujla, Jing Jiang, Wu Wen, Peiying Zhang:
Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT Using Proof of Learning Consensus Protocol. 900-909 - Laizhong Cui, Jiating Ma, Yipeng Zhou, Shui Yu:
Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses. 910-920 - Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan:
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks. 921-929 - Yaguang Lin, Xiaoming Wang, Hongguang Ma, Liang Wang, Fei Hao, Zhipeng Cai:
An Efficient Approach to Sharing Edge Knowledge in 5G-Enabled Industrial Internet of Things. 930-939 - Ta Li, Youliang Tian, Jinbo Xiong, Md. Zakirul Alam Bhuiyan:
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT. 940-950 - Syed Atif Moqurrab, Adeel Anjum, Noshina Tariq, Gautam Srivastava:
Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT. 951-959 - Husnain Rafiq, Nauman Aslam, Usman Ahmed, Jerry Chun-Wei Lin:
Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things. 960-968 - Md. Zakirul Alam Bhuiyan, Sy-Yen Kuo, Guojun Wang:
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications. 969-972 - Qiwei Xie, Xiyuan Hu, Lei Ren, Lianyong Qi, Zhao Sun:
A Binocular Vision Application in IoT: Realtime Trustworthy Road Condition Detection System in Passable Area. 973-983 - Xintao Ding, Yongqiang Cheng, Yonglong Luo, Qingde Li, Prosanta Gope:
Consensus Adversarial Defense Method Based on Augmented Examples. 984-994 - Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash:
Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. 995-1005 - Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam:
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. 1006-1017 - Zhe Li, Honglong Chen, Zhichen Ni, Xiaogang Deng, Baodi Liu, Weifeng Liu:
ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation. 1018-1029 - Fazlullah Khan, Ryan Alturki, Md. Arafatur Rahman, Spyridon Mastorakis, Imran Razzak, Syed Tauhid Ullah Shah:
Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT. 1030-1038 - Pedram Asef, Rahim Taheri, Mohammad Shojafar, Iosif Mporas, Rahim Tafazolli:
SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications. 1039-1050 - Ashima Anand, Amit Kumar Singh:
A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security. 1051-1058 - Geetanjali Rathee, Sahil Garg, Georges Kaddoum, Bong Jun Choi, Mohammad Mehedi Hassan, Salman A. AlQahtani:
TrustSys: Trusted Decision Making Scheme for Collaborative Artificial Intelligence of Things. 1059-1068 - Zhaoyang Wang, Song Wang, Zhiyao Zhao, Muyi Sun:
Trustworthy Localization With EM-Based Federated Control Scheme for IIoTs. 1069-1079 - Jafar Ahmad Abed Alzubi, Omar A. Alzubi, Ashish Singh, Manikandan Ramachandran:
Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning. 1080-1087 - Xu Zheng, Ling Tian, Zhipeng Cai:
A Fair and Rational Data Sharing Strategy Toward Two-Stage Industrial Internet of Things. 1088-1096 - Tao Zhang, Changqiao Xu, Ping Zou, Haijiang Tian, Xiaohui Kuang, Shujie Yang, Lujie Zhong, Dusit Niyato:
How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach. 1097-1106 - Zhibin Yang, Linquan Xing, Zonghua Gu, Yingmin Xiao, Yong Zhou, Zhiqiu Huang, Lei Xue:
Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems. 1107-1116
Volume 19, Number 2, February 2023
- Boda Ning, Qing-Long Han, Zongyu Zuo, Lei Ding, Qiang Lu, Xiaohua Ge:
Fixed-Time and Prescribed-Time Consensus Control of Multiagent Systems and Its Applications: A Survey of Recent Trends and Methodologies. 1121-1135