Loading [MathJax]/extensions/MathMenu.js
Shuai Feng - IEEE Xplore Author Profile

Showing 1-11 of 11 results

Filter Results

Show

Results

This paper studies distributed Nash equilibrium (NE) seeking under Denial-of-Service (DoS) attacks and quantization. The players can only exchange information with their own direct neighbors. The transmitted information is subject to quantization and packet losses induced by malicious DoS attacks. We propose a quantized distributed NE seeking strategy based on the approach of dynamic quantized con...Show More
This article deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by denial-of-service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with the agent's output, an observer is implemented at each node. The state of the observer is quantized by a ...Show More
In this paper, to jointly study the energy dynamic behavior of humans and the corresponding physical dynamics of the microgrid, we bridge two disciplines: systems & control and environmental psychology. Firstly, we develop second order motivation-behavior mathematical models inspired by opinion dynamics models for describing and predicting human activities related to the use of energy, where psych...Show More
This article is concerned with the quantized consensus problem for uncertain nonlinear multiagent systems under data-rate constraints and denial-of-service (DoS) attacks. The agents are modeled in strict-feedback form with unknown nonlinear dynamics and external disturbance. Extended state observers (ESOs) are leveraged to estimate agents' total uncertainties along with their states. To mitigate t...Show More
In this article, we study multiagent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader–follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the dat...Show More
In this paper, we investigate a networked control problem in the presence of Denial-of-Service (DoS) attacks, which prevent transmissions over the communication network. The communication between the process and controller is also subject to bit rate constraints. For mitigating the influences of DoS attacks and bit rate constraints, we develop a variable bit rate (VBR) encoding-decoding protocol a...Show More
In this article, we study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Our article aims at exploring the tradeoffs between system resilience and network bandwidth capacity. Given a class of DoS attacks, we characterize the bit-rate ...Show More
This paper investigates the multi-agent leader- follower consensus problem under Denial-of-Service (DoS) attacks with data rate constraints. In our analysis, we first derive a lower bound on the data rate for the leader-follower consensus problem, which can guarantee the quantizers of the leader and followers do not overflow at any time, even in the presence of DoS attacks. The main contribution o...Show More
We study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Our work aims at exploring the relationship between system resilience and network bandwidth. Given a class of DoS attacks, we characterize the bit-rate bounds that are dependent ...Show More
In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. First, we consider a simple and typical scenario where communication sequence is purely Round-robin and we explicitly calculate a bound of attack frequency and duration under which the interconnected large-scale syste...Show More
In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not destroyed. Analog and digital predictor-based controllers with state resetting are proposed, which achie...Show More