Resilient model predictive reset control for cyber-physical systems subject to hybrid attacks
This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly...
        Saved in:
      
    
          | Published in | Information sciences Vol. 706; p. 122002 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            Elsevier Inc
    
        01.07.2025
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0020-0255 | 
| DOI | 10.1016/j.ins.2025.122002 | 
Cover
| Abstract | This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly injects fault signals to manipulate the control inputs. A channel reset strategy is proposed to ensure that the auxiliary controller can safely transmit the prediction signals to the buffer for storage. The primary controller exerts its utility in the absence of a jamming attack, whereas once the false data attack is detected, compensation and computation are performed using predictive values computed by the auxiliary controller, which can improve the system control performance. The predictive signals computed by the auxiliary controller are only used when an attack is detected in the MPC strategy proposed in this article. Furthermore, the feasibility of the proposed reset control strategy is discussed. Finally, the effectiveness and benefits of the model predictive reset control strategy proposed in this paper are verified through a numerical example. | 
    
|---|---|
| AbstractList | This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly injects fault signals to manipulate the control inputs. A channel reset strategy is proposed to ensure that the auxiliary controller can safely transmit the prediction signals to the buffer for storage. The primary controller exerts its utility in the absence of a jamming attack, whereas once the false data attack is detected, compensation and computation are performed using predictive values computed by the auxiliary controller, which can improve the system control performance. The predictive signals computed by the auxiliary controller are only used when an attack is detected in the MPC strategy proposed in this article. Furthermore, the feasibility of the proposed reset control strategy is discussed. Finally, the effectiveness and benefits of the model predictive reset control strategy proposed in this paper are verified through a numerical example. | 
    
| ArticleNumber | 122002 | 
    
| Author | Geng, Qing Wu, Defu Hua, Changchun Liu, Fucai  | 
    
| Author_xml | – sequence: 1 givenname: Qing orcidid: 0000-0002-9198-8688 surname: Geng fullname: Geng, Qing email: gq@ysu.edu.cn – sequence: 2 givenname: Defu surname: Wu fullname: Wu, Defu – sequence: 3 givenname: Fucai surname: Liu fullname: Liu, Fucai – sequence: 4 givenname: Changchun surname: Hua fullname: Hua, Changchun  | 
    
| BookMark | eNp9kE1LAzEQhnOoYFv9Ad7yB7Ymu03WxZMUv6AgiB4lJLOzNOt2UzKxsP_elHr2MgMDz8u8z4LNxjAiYzdSrKSQ-rZf-ZFWpSjVSpalEOWMzfMURb6oS7Yg6oUQ61rrOft6R_KDxzHxfWhx4IeIrYfkj8gjEiYOYUwxDLwLkcPkMBaH3UQe7MBpooR74vTjeoTEU-C7yUXfcpuShW-6YhedHQiv__aSfT49fmxeiu3b8-vmYVtAuW5SAVBp3aFs1FpWbddAJcFplNBI51xrHVjROalaXSuhtKp0U9dVbe8qC1ahqpZMnnMhBqKInTlEv7dxMlKYkxPTm-zEnJyYs5PM3J8ZzI8dPUZDkD1Arh9zGdMG_w_9CxRzcAw | 
    
| Cites_doi | 10.1109/TAC.2018.2800789 10.1109/TCYB.2020.3006095 10.1016/j.ins.2020.08.124 10.1007/s11432-020-3289-1 10.1002/rnc.4654 10.1016/j.ins.2022.09.018 10.1016/j.automatica.2021.110004 10.1109/TAC.2021.3084237 10.1109/TCNS.2021.3094782 10.1109/LCSYS.2019.2920507 10.1109/TCYB.2018.2817249 10.1109/TCYB.2022.3151880 10.1109/TSMC.2019.2896323 10.1016/j.ins.2023.03.088 10.1109/TCST.2023.3236470 10.1016/j.ins.2022.07.010 10.1002/rnc.6148 10.1109/TSG.2021.3050203 10.1109/TAC.2022.3153275 10.1109/JAS.2022.105845 10.1109/COMST.2022.3159185 10.1109/TCYB.2018.2825984 10.1016/j.automatica.2013.09.031 10.1109/TAC.2020.3032598 10.1109/TCYB.2019.2956137 10.1109/TDSC.2015.2509994 10.1109/COMST.2019.2944748  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2025 Elsevier Inc. | 
    
| Copyright_xml | – notice: 2025 Elsevier Inc. | 
    
| DBID | AAYXX CITATION  | 
    
| DOI | 10.1016/j.ins.2025.122002 | 
    
| DatabaseName | CrossRef | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Library & Information Science  | 
    
| ExternalDocumentID | 10_1016_j_ins_2025_122002 S0020025525001343  | 
    
| GroupedDBID | --K --M --Z -~X .DC .~1 0R~ 1B1 1OL 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AATTM AAXKI AAXUO AAYFN ABAOU ABBOA ABEFU ABFNM ABJNI ABMAC ABTAH ABUCO ABWVN ABXDB ACDAQ ACGFS ACNNM ACRLP ACRPL ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADNMO ADTZH ADVLN AEBSH AECPX AEIPS AEKER AENEX AFFNX AFJKZ AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APLSM ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC BNPGV CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM LG9 LY1 M41 MHUIS MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSH SST SSV SSW SSZ T5K TN5 TWZ UHS WH7 WUQ XPP YYP ZMT ZY4 ~02 ~G- 77I AAYWO AAYXX ACLOT ACVFH ADCNI AEUPX AFPUW AGQPQ AIGII AIIUN AKBMS AKYEP APXCP CITATION EFKBS EFLBG ~HD  | 
    
| ID | FETCH-LOGICAL-c249t-cc366fe195413df9c31cb6e1c91bbbdabca0fb15d67505653697737a83aca5e53 | 
    
| IEDL.DBID | .~1 | 
    
| ISSN | 0020-0255 | 
    
| IngestDate | Wed Oct 01 06:35:47 EDT 2025 Sat Apr 05 15:37:25 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Keywords | Cyber-physical systems False data injection attack Resilient model predictive control Jamming attack  | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c249t-cc366fe195413df9c31cb6e1c91bbbdabca0fb15d67505653697737a83aca5e53 | 
    
| ORCID | 0000-0002-9198-8688 | 
    
| ParticipantIDs | crossref_primary_10_1016_j_ins_2025_122002 elsevier_sciencedirect_doi_10_1016_j_ins_2025_122002  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | July 2025 2025-07-00  | 
    
| PublicationDateYYYYMMDD | 2025-07-01 | 
    
| PublicationDate_xml | – month: 07 year: 2025 text: July 2025  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Information sciences | 
    
| PublicationYear | 2025 | 
    
| Publisher | Elsevier Inc | 
    
| Publisher_xml | – name: Elsevier Inc | 
    
| References | Guan, Ge (br0200) 2018; 4 Zhou, Wang, Dong, Ota (br0020) 2020; 50 Lian, Shi, Lim, Yuan (br0180) 2022; 53 Hassan, Rehmani, Chen (br0010) 2020; 22 Goldsmith (br0270) 2005 Zhao, Xu, Zhang, Yang (br0130) 2022; 52 Sun, Chen, Shi (br0230) 2022; 65 Franzè, Lucia, Tedesco (br0250) 2022; 67 Gao, Peng, Tse (br0030) 2023; 70 Song, Ding, Dong, Yi (br0090) 2022; 135 Wu, Hu, Liu, Wu (br0120) 2018; 48 Cetinkaya, Ishii, Hayakawa (br0110) 2023; 68 Lin, Lam, Wang (br0190) 2021; 546 Tedesco, Akram, Forouzanfar, Casavola, Famularo (br0280) 2020; 32 Yang, Shi, Xia, Zhang (br0260) 2019; 49 Nourian, Madnick (br0070) 2018; 15 Wu, Yao, Pan, Sun, Liu, Wu (br0160) 2022; 9 Khler, Mller, Allgwer (br0210) 2019; 64 Sun, Yang (br0220) 2019; 29 Pirayesh, Zeng (br0060) 2022; 24 Ge, Han, Wu, Zhang (br0040) 2023; 10 Zhang, Han, Ge, Ding (br0150) 2020; 50 Shi, Chen, Shahidehpour, Zhou, Wen (br0170) 2021; 12 Nemati, Peimani, Mobayen, Sayyedfattahi (br0080) 2022; 612 Ma, Li (br0050) 2023; 633 Zhao, Du, Zhou, Tian (br0100) 2022; 608 Franzè, Tedesco, Lucia (br0240) 2019; 3 Li, Chen, Yu, Zhang (br0140) 2021; 66 Romagnoli, Krogh, Niz, Hristozov, Sinopoli (br0300) 2023; 31 Zhu, Martínez (br0290) 2013; 49 Song (10.1016/j.ins.2025.122002_br0090) 2022; 135 Guan (10.1016/j.ins.2025.122002_br0200) 2018; 4 Lian (10.1016/j.ins.2025.122002_br0180) 2022; 53 Khler (10.1016/j.ins.2025.122002_br0210) 2019; 64 Zhao (10.1016/j.ins.2025.122002_br0130) 2022; 52 Zhao (10.1016/j.ins.2025.122002_br0100) 2022; 608 Franzè (10.1016/j.ins.2025.122002_br0240) 2019; 3 Zhou (10.1016/j.ins.2025.122002_br0020) 2020; 50 Sun (10.1016/j.ins.2025.122002_br0230) 2022; 65 Zhang (10.1016/j.ins.2025.122002_br0150) 2020; 50 Pirayesh (10.1016/j.ins.2025.122002_br0060) 2022; 24 Ma (10.1016/j.ins.2025.122002_br0050) 2023; 633 Romagnoli (10.1016/j.ins.2025.122002_br0300) 2023; 31 Yang (10.1016/j.ins.2025.122002_br0260) 2019; 49 Lin (10.1016/j.ins.2025.122002_br0190) 2021; 546 Gao (10.1016/j.ins.2025.122002_br0030) 2023; 70 Cetinkaya (10.1016/j.ins.2025.122002_br0110) 2023; 68 Tedesco (10.1016/j.ins.2025.122002_br0280) 2020; 32 Wu (10.1016/j.ins.2025.122002_br0120) 2018; 48 Goldsmith (10.1016/j.ins.2025.122002_br0270) 2005 Shi (10.1016/j.ins.2025.122002_br0170) 2021; 12 Hassan (10.1016/j.ins.2025.122002_br0010) 2020; 22 Ge (10.1016/j.ins.2025.122002_br0040) 2023; 10 Li (10.1016/j.ins.2025.122002_br0140) 2021; 66 Franzè (10.1016/j.ins.2025.122002_br0250) 2022; 67 Nemati (10.1016/j.ins.2025.122002_br0080) 2022; 612 Sun (10.1016/j.ins.2025.122002_br0220) 2019; 29 Wu (10.1016/j.ins.2025.122002_br0160) 2022; 9 Nourian (10.1016/j.ins.2025.122002_br0070) 2018; 15 Zhu (10.1016/j.ins.2025.122002_br0290) 2013; 49  | 
    
| References_xml | – volume: 70 start-page: 136 year: 2023 end-page: 140 ident: br0030 article-title: Cascading failure analysis of cyber-physical power systems considering routing strategy publication-title: IEEE Trans. Circuits Syst. II, Express Briefs – year: 2005 ident: br0270 article-title: Wireless Communication – volume: 12 start-page: 1953 year: 2021 end-page: 1963 ident: br0170 article-title: Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids publication-title: IEEE Trans. Smart Grid – volume: 49 start-page: 2022 year: 2019 end-page: 2031 ident: br0260 article-title: Security research on wireless networked control systems subject to jamming attacks publication-title: IEEE Trans. Cybern. – volume: 65 year: 2022 ident: br0230 article-title: Event-triggered robust MPC of nonlinear cyber-physical systems against DoS attacks publication-title: Sci. China Inf. Sci. – volume: 633 start-page: 504 year: 2023 end-page: 516 ident: br0050 article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks publication-title: Inf. Sci. – volume: 50 start-page: 43 year: 2020 end-page: 57 ident: br0020 article-title: Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing publication-title: IEEE Trans. Syst. Man Cybern. Syst. – volume: 48 start-page: 3420 year: 2018 end-page: 3431 ident: br0120 article-title: Secure estimation for cyber-physical systems via sliding mode publication-title: IEEE Trans. Cybern. – volume: 10 start-page: 1234 year: 2023 end-page: 1251 ident: br0040 article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks publication-title: IEEE/CAA J. Autom. Sin. – volume: 612 start-page: 1111 year: 2022 end-page: 1126 ident: br0080 article-title: Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays publication-title: Inf. Sci. – volume: 32 start-page: 6395 year: 2020 end-page: 6411 ident: br0280 article-title: Predictive maintenance of actuators in linear systems: a receding horizon set-theoretic approach publication-title: Int. J. Robust Nonlinear Control – volume: 66 start-page: 4303 year: 2021 end-page: 4310 ident: br0140 article-title: Active security control approach against DoS attacks in cyber-physical systems publication-title: IEEE Trans. Autom. Control – volume: 68 start-page: 1223 year: 2023 end-page: 1230 ident: br0110 article-title: Effects of jamming attacks on wireless networked control systems under disturbance publication-title: IEEE Trans. Autom. Control – volume: 50 start-page: 3616 year: 2020 end-page: 3626 ident: br0150 article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks publication-title: IEEE Trans. Cybern. – volume: 53 start-page: 2600 year: 2022 end-page: 2609 ident: br0180 article-title: Fuzzy-model-based lateral control for networked autonomous vehicle systems under hybrid cyber-attacks publication-title: IEEE Trans. Cybern. – volume: 64 start-page: 254 year: 2019 end-page: 269 ident: br0210 article-title: Nonlinear reference tracking: an economic model predictive control perspective publication-title: IEEE Trans. Autom. Control – volume: 15 start-page: 2 year: 2018 end-page: 13 ident: br0070 article-title: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet publication-title: IEEE Trans. Dependable Secure Comput. – volume: 4 start-page: 48 year: 2018 end-page: 59 ident: br0200 article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 29 start-page: 4797 year: 2019 end-page: 4811 ident: br0220 article-title: Robust event-triggered model predictive control for cyber-physical systems under denial-of-service attacks publication-title: Int. J. Robust Nonlinear Control – volume: 49 start-page: 3571 year: 2013 end-page: 3582 ident: br0290 article-title: On distributed constrained formation control in operator-vehicle adversarial networks publication-title: Automatica – volume: 135 year: 2022 ident: br0090 article-title: Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks publication-title: Automatica – volume: 9 start-page: 775 year: 2022 end-page: 788 ident: br0160 article-title: Secure control for cyber-physical systems under malicious attacks publication-title: IEEE Trans. Control Netw. Syst. – volume: 546 start-page: 943 year: 2021 end-page: 960 ident: br0190 article-title: Secure state estimation for systems under mixed cyber-attacks: security and performance analysis publication-title: Inf. Sci. – volume: 52 start-page: 2599 year: 2022 end-page: 2608 ident: br0130 article-title: Resilient control for wireless cyber-physical systems subject to jamming attacks: a cross-layer dynamic game approach publication-title: IEEE Trans. Cybern. – volume: 22 start-page: 746 year: 2020 end-page: 789 ident: br0010 article-title: Differential privacy techniques for cyber physical systems: a survey publication-title: IEEE Commun. Surv. Tutor. – volume: 24 start-page: 767 year: 2022 end-page: 809 ident: br0060 article-title: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey publication-title: IEEE Commun. Surv. Tutor. – volume: 31 start-page: 1565 year: 2023 end-page: 1580 ident: br0300 article-title: Software rejuvenation for safe operation of cyber-physical systems in the presence of run-time cyberattacks publication-title: IEEE Trans. Control Syst. Technol. – volume: 608 start-page: 1245 year: 2022 end-page: 1260 ident: br0100 article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks publication-title: Inf. Sci. – volume: 67 start-page: 1822 year: 2022 end-page: 1836 ident: br0250 article-title: Resilient model predictive control for constrained cyber-physical systems subject to severe attacks on the communication channels publication-title: IEEE Trans. Autom. Control – volume: 3 start-page: 984 year: 2019 end-page: 989 ident: br0240 article-title: Resilient control for cyber-physical systems subject to replay attacks publication-title: IEEE Control Syst. Lett. – volume: 64 start-page: 254 issue: 1 year: 2019 ident: 10.1016/j.ins.2025.122002_br0210 article-title: Nonlinear reference tracking: an economic model predictive control perspective publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2018.2800789 – volume: 52 start-page: 2599 issue: 4 year: 2022 ident: 10.1016/j.ins.2025.122002_br0130 article-title: Resilient control for wireless cyber-physical systems subject to jamming attacks: a cross-layer dynamic game approach publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2020.3006095 – volume: 546 start-page: 943 year: 2021 ident: 10.1016/j.ins.2025.122002_br0190 article-title: Secure state estimation for systems under mixed cyber-attacks: security and performance analysis publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.08.124 – volume: 65 issue: 1 year: 2022 ident: 10.1016/j.ins.2025.122002_br0230 article-title: Event-triggered robust MPC of nonlinear cyber-physical systems against DoS attacks publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-020-3289-1 – year: 2005 ident: 10.1016/j.ins.2025.122002_br0270 – volume: 29 start-page: 4797 issue: 14 year: 2019 ident: 10.1016/j.ins.2025.122002_br0220 article-title: Robust event-triggered model predictive control for cyber-physical systems under denial-of-service attacks publication-title: Int. J. Robust Nonlinear Control doi: 10.1002/rnc.4654 – volume: 612 start-page: 1111 year: 2022 ident: 10.1016/j.ins.2025.122002_br0080 article-title: Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.09.018 – volume: 135 year: 2022 ident: 10.1016/j.ins.2025.122002_br0090 article-title: Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks publication-title: Automatica doi: 10.1016/j.automatica.2021.110004 – volume: 67 start-page: 1822 issue: 4 year: 2022 ident: 10.1016/j.ins.2025.122002_br0250 article-title: Resilient model predictive control for constrained cyber-physical systems subject to severe attacks on the communication channels publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2021.3084237 – volume: 9 start-page: 775 issue: 2 year: 2022 ident: 10.1016/j.ins.2025.122002_br0160 article-title: Secure control for cyber-physical systems under malicious attacks publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2021.3094782 – volume: 3 start-page: 984 issue: 4 year: 2019 ident: 10.1016/j.ins.2025.122002_br0240 article-title: Resilient control for cyber-physical systems subject to replay attacks publication-title: IEEE Control Syst. Lett. doi: 10.1109/LCSYS.2019.2920507 – volume: 49 start-page: 2022 issue: 6 year: 2019 ident: 10.1016/j.ins.2025.122002_br0260 article-title: Security research on wireless networked control systems subject to jamming attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2018.2817249 – volume: 53 start-page: 2600 issue: 4 year: 2022 ident: 10.1016/j.ins.2025.122002_br0180 article-title: Fuzzy-model-based lateral control for networked autonomous vehicle systems under hybrid cyber-attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2022.3151880 – volume: 4 start-page: 48 issue: 1 year: 2018 ident: 10.1016/j.ins.2025.122002_br0200 article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 50 start-page: 43 issue: 1 year: 2020 ident: 10.1016/j.ins.2025.122002_br0020 article-title: Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2019.2896323 – volume: 633 start-page: 504 year: 2023 ident: 10.1016/j.ins.2025.122002_br0050 article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2023.03.088 – volume: 31 start-page: 1565 issue: 4 year: 2023 ident: 10.1016/j.ins.2025.122002_br0300 article-title: Software rejuvenation for safe operation of cyber-physical systems in the presence of run-time cyberattacks publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2023.3236470 – volume: 608 start-page: 1245 year: 2022 ident: 10.1016/j.ins.2025.122002_br0100 article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.07.010 – volume: 32 start-page: 6395 issue: 11 year: 2020 ident: 10.1016/j.ins.2025.122002_br0280 article-title: Predictive maintenance of actuators in linear systems: a receding horizon set-theoretic approach publication-title: Int. J. Robust Nonlinear Control doi: 10.1002/rnc.6148 – volume: 12 start-page: 1953 issue: 3 year: 2021 ident: 10.1016/j.ins.2025.122002_br0170 article-title: Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2021.3050203 – volume: 68 start-page: 1223 issue: 2 year: 2023 ident: 10.1016/j.ins.2025.122002_br0110 article-title: Effects of jamming attacks on wireless networked control systems under disturbance publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2022.3153275 – volume: 10 start-page: 1234 issue: 5 year: 2023 ident: 10.1016/j.ins.2025.122002_br0040 article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks publication-title: IEEE/CAA J. Autom. Sin. doi: 10.1109/JAS.2022.105845 – volume: 24 start-page: 767 issue: 2 year: 2022 ident: 10.1016/j.ins.2025.122002_br0060 article-title: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2022.3159185 – volume: 48 start-page: 3420 issue: 12 year: 2018 ident: 10.1016/j.ins.2025.122002_br0120 article-title: Secure estimation for cyber-physical systems via sliding mode publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2018.2825984 – volume: 49 start-page: 3571 issue: 12 year: 2013 ident: 10.1016/j.ins.2025.122002_br0290 article-title: On distributed constrained formation control in operator-vehicle adversarial networks publication-title: Automatica doi: 10.1016/j.automatica.2013.09.031 – volume: 66 start-page: 4303 issue: 9 year: 2021 ident: 10.1016/j.ins.2025.122002_br0140 article-title: Active security control approach against DoS attacks in cyber-physical systems publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.3032598 – volume: 70 start-page: 136 issue: 1 year: 2023 ident: 10.1016/j.ins.2025.122002_br0030 article-title: Cascading failure analysis of cyber-physical power systems considering routing strategy publication-title: IEEE Trans. Circuits Syst. II, Express Briefs – volume: 50 start-page: 3616 issue: 8 year: 2020 ident: 10.1016/j.ins.2025.122002_br0150 article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2019.2956137 – volume: 15 start-page: 2 issue: 1 year: 2018 ident: 10.1016/j.ins.2025.122002_br0070 article-title: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2015.2509994 – volume: 22 start-page: 746 issue: 1 year: 2020 ident: 10.1016/j.ins.2025.122002_br0010 article-title: Differential privacy techniques for cyber physical systems: a survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2944748  | 
    
| SSID | ssj0004766 | 
    
| Score | 2.4740798 | 
    
| Snippet | This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid... | 
    
| SourceID | crossref elsevier  | 
    
| SourceType | Index Database Publisher  | 
    
| StartPage | 122002 | 
    
| SubjectTerms | Cyber-physical systems False data injection attack Jamming attack Resilient model predictive control  | 
    
| Title | Resilient model predictive reset control for cyber-physical systems subject to hybrid attacks | 
    
| URI | https://dx.doi.org/10.1016/j.ins.2025.122002 | 
    
| Volume | 706 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 0020-0255 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004766 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] issn: 0020-0255 databaseCode: ACRLP dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004766 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect issn: 0020-0255 databaseCode: AIKHN dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004766 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) issn: 0020-0255 databaseCode: .~1 dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004766 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 0020-0255 databaseCode: AKRWK dateStart: 19681201 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004766 providerName: Library Specific Holdings  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH6MedGD6FScupGDeBC6LU366ziGYyruIA52kZKkKVZkK1t32MW_3bw2xYl48djSB-VL-96X5H1fAK6DIHVZEgVOpP3Q4aaEOVKKgSMEDQepcLnWuKD_NPUnM_4w9-YNGNVaGGyrtLm_yulltrZ3-hbNfp5lqPF1S0ZsirjhMRwdPzkP8BSD3ud3mwcPqv1KnCbh0_XOZtnjlS3Qsdv1etR165WVX7Vpp96Mj-DQEkUyrN7lGBp60YKDHfvAFnSs6IDcEKsqQpSJ_V1P4PVZr7MPFDyS8sAbkq9wWwYTHEHVUUFsozoxwURtpV45uR03Ulk8r8l6I3GphhRL8rZFeRcRRYHC_FOYje9eRhPHHqfgKDPHKhylmO-nGi3eKEvSSDGqpK-piqiUMhFSiUEqqZeYOYShRR7zDTdkgQiZUMLTHjuD5mK50OdAAkOzaCS5j9Y7ntKCCpWiOZzUOg21bsNtDWScV64Zcd1O9h4b1GNEPa5QbwOvoY5_DH1ssvrfYRf_C7uEfbyqOm6voFmsNrpjeEUhu-WH04W94f3jZPoFlyHOEg | 
    
| linkProvider | Elsevier | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7MeVAPolNx6jQH8SB0Lk1_HmU4pm47yAa7SEmyFCvSla077OLfbl6b4kS8eG0bKF_a976XvO8LwLXvxzabhb4VKi-wHJ3CLCF4x-KcBp2Y245SuKA_HHn9ifM0dac16FZaGGyrNLG_jOlFtDZX7gyad1mSoMbXLhixTuKaxzhsC7Yd1_axAmt_fvd5OH65YYl1Ej5ebW0WTV5Jipbdttumtl0trfxKThsJp3cA-4YpkvvyZQ6hptIG7G34BzagZVQH5IYYWRHCTMz_egSvL2qZfKDikRQn3pBsgfsyGOEIyo5yYjrViR5M5FqohZWZiSOlx_OSLFcC12pIPidva9R3EZ7nqMw_hknvYdztW-Y8BUvqIiu3pGSeFyv0eKNsFoeSUSk8RWVIhRAzLiTvxIK6M11EaF7kMk-TQ-bzgHHJXeWyE6in81SdAvE1z6KhcDz03nGl4pTLGN3hhFJxoFQTbisgo6y0zYiqfrL3SKMeIepRiXoTnArq6MfcRzqs_z3s7H_DrmCnPx4OosHj6PkcdvFO2X57AfV8sVItTTJycVl8RF-Lus-n | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+model+predictive+reset+control+for+cyber-physical+systems+subject+to+hybrid+attacks&rft.jtitle=Information+sciences&rft.au=Geng%2C+Qing&rft.au=Wu%2C+Defu&rft.au=Liu%2C+Fucai&rft.au=Hua%2C+Changchun&rft.date=2025-07-01&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.volume=706&rft_id=info:doi/10.1016%2Fj.ins.2025.122002&rft.externalDocID=S0020025525001343 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon |