Resilient model predictive reset control for cyber-physical systems subject to hybrid attacks

This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly...

Full description

Saved in:
Bibliographic Details
Published inInformation sciences Vol. 706; p. 122002
Main Authors Geng, Qing, Wu, Defu, Liu, Fucai, Hua, Changchun
Format Journal Article
LanguageEnglish
Published Elsevier Inc 01.07.2025
Subjects
Online AccessGet full text
ISSN0020-0255
DOI10.1016/j.ins.2025.122002

Cover

Abstract This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly injects fault signals to manipulate the control inputs. A channel reset strategy is proposed to ensure that the auxiliary controller can safely transmit the prediction signals to the buffer for storage. The primary controller exerts its utility in the absence of a jamming attack, whereas once the false data attack is detected, compensation and computation are performed using predictive values computed by the auxiliary controller, which can improve the system control performance. The predictive signals computed by the auxiliary controller are only used when an attack is detected in the MPC strategy proposed in this article. Furthermore, the feasibility of the proposed reset control strategy is discussed. Finally, the effectiveness and benefits of the model predictive reset control strategy proposed in this paper are verified through a numerical example.
AbstractList This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid attacks. Jamming attacks are modeled using Stackelberg game theory and result in packet loss. A malicious false data injection attacker randomly injects fault signals to manipulate the control inputs. A channel reset strategy is proposed to ensure that the auxiliary controller can safely transmit the prediction signals to the buffer for storage. The primary controller exerts its utility in the absence of a jamming attack, whereas once the false data attack is detected, compensation and computation are performed using predictive values computed by the auxiliary controller, which can improve the system control performance. The predictive signals computed by the auxiliary controller are only used when an attack is detected in the MPC strategy proposed in this article. Furthermore, the feasibility of the proposed reset control strategy is discussed. Finally, the effectiveness and benefits of the model predictive reset control strategy proposed in this paper are verified through a numerical example.
ArticleNumber 122002
Author Geng, Qing
Wu, Defu
Hua, Changchun
Liu, Fucai
Author_xml – sequence: 1
  givenname: Qing
  orcidid: 0000-0002-9198-8688
  surname: Geng
  fullname: Geng, Qing
  email: gq@ysu.edu.cn
– sequence: 2
  givenname: Defu
  surname: Wu
  fullname: Wu, Defu
– sequence: 3
  givenname: Fucai
  surname: Liu
  fullname: Liu, Fucai
– sequence: 4
  givenname: Changchun
  surname: Hua
  fullname: Hua, Changchun
BookMark eNp9kE1LAzEQhnOoYFv9Ad7yB7Ymu03WxZMUv6AgiB4lJLOzNOt2UzKxsP_elHr2MgMDz8u8z4LNxjAiYzdSrKSQ-rZf-ZFWpSjVSpalEOWMzfMURb6oS7Yg6oUQ61rrOft6R_KDxzHxfWhx4IeIrYfkj8gjEiYOYUwxDLwLkcPkMBaH3UQe7MBpooR74vTjeoTEU-C7yUXfcpuShW-6YhedHQiv__aSfT49fmxeiu3b8-vmYVtAuW5SAVBp3aFs1FpWbddAJcFplNBI51xrHVjROalaXSuhtKp0U9dVbe8qC1ahqpZMnnMhBqKInTlEv7dxMlKYkxPTm-zEnJyYs5PM3J8ZzI8dPUZDkD1Arh9zGdMG_w_9CxRzcAw
Cites_doi 10.1109/TAC.2018.2800789
10.1109/TCYB.2020.3006095
10.1016/j.ins.2020.08.124
10.1007/s11432-020-3289-1
10.1002/rnc.4654
10.1016/j.ins.2022.09.018
10.1016/j.automatica.2021.110004
10.1109/TAC.2021.3084237
10.1109/TCNS.2021.3094782
10.1109/LCSYS.2019.2920507
10.1109/TCYB.2018.2817249
10.1109/TCYB.2022.3151880
10.1109/TSMC.2019.2896323
10.1016/j.ins.2023.03.088
10.1109/TCST.2023.3236470
10.1016/j.ins.2022.07.010
10.1002/rnc.6148
10.1109/TSG.2021.3050203
10.1109/TAC.2022.3153275
10.1109/JAS.2022.105845
10.1109/COMST.2022.3159185
10.1109/TCYB.2018.2825984
10.1016/j.automatica.2013.09.031
10.1109/TAC.2020.3032598
10.1109/TCYB.2019.2956137
10.1109/TDSC.2015.2509994
10.1109/COMST.2019.2944748
ContentType Journal Article
Copyright 2025 Elsevier Inc.
Copyright_xml – notice: 2025 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.ins.2025.122002
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
ExternalDocumentID 10_1016_j_ins_2025_122002
S0020025525001343
GroupedDBID --K
--M
--Z
-~X
.DC
.~1
0R~
1B1
1OL
1RT
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AATTM
AAXKI
AAXUO
AAYFN
ABAOU
ABBOA
ABEFU
ABFNM
ABJNI
ABMAC
ABTAH
ABUCO
ABWVN
ABXDB
ACDAQ
ACGFS
ACNNM
ACRLP
ACRPL
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
ADNMO
ADTZH
ADVLN
AEBSH
AECPX
AEIPS
AEKER
AENEX
AFFNX
AFJKZ
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APLSM
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
BNPGV
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
KOM
LG9
LY1
M41
MHUIS
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSH
SST
SSV
SSW
SSZ
T5K
TN5
TWZ
UHS
WH7
WUQ
XPP
YYP
ZMT
ZY4
~02
~G-
77I
AAYWO
AAYXX
ACLOT
ACVFH
ADCNI
AEUPX
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKYEP
APXCP
CITATION
EFKBS
EFLBG
~HD
ID FETCH-LOGICAL-c249t-cc366fe195413df9c31cb6e1c91bbbdabca0fb15d67505653697737a83aca5e53
IEDL.DBID .~1
ISSN 0020-0255
IngestDate Wed Oct 01 06:35:47 EDT 2025
Sat Apr 05 15:37:25 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Cyber-physical systems
False data injection attack
Resilient model predictive control
Jamming attack
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c249t-cc366fe195413df9c31cb6e1c91bbbdabca0fb15d67505653697737a83aca5e53
ORCID 0000-0002-9198-8688
ParticipantIDs crossref_primary_10_1016_j_ins_2025_122002
elsevier_sciencedirect_doi_10_1016_j_ins_2025_122002
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate July 2025
2025-07-00
PublicationDateYYYYMMDD 2025-07-01
PublicationDate_xml – month: 07
  year: 2025
  text: July 2025
PublicationDecade 2020
PublicationTitle Information sciences
PublicationYear 2025
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Guan, Ge (br0200) 2018; 4
Zhou, Wang, Dong, Ota (br0020) 2020; 50
Lian, Shi, Lim, Yuan (br0180) 2022; 53
Hassan, Rehmani, Chen (br0010) 2020; 22
Goldsmith (br0270) 2005
Zhao, Xu, Zhang, Yang (br0130) 2022; 52
Sun, Chen, Shi (br0230) 2022; 65
Franzè, Lucia, Tedesco (br0250) 2022; 67
Gao, Peng, Tse (br0030) 2023; 70
Song, Ding, Dong, Yi (br0090) 2022; 135
Wu, Hu, Liu, Wu (br0120) 2018; 48
Cetinkaya, Ishii, Hayakawa (br0110) 2023; 68
Lin, Lam, Wang (br0190) 2021; 546
Tedesco, Akram, Forouzanfar, Casavola, Famularo (br0280) 2020; 32
Yang, Shi, Xia, Zhang (br0260) 2019; 49
Nourian, Madnick (br0070) 2018; 15
Wu, Yao, Pan, Sun, Liu, Wu (br0160) 2022; 9
Khler, Mller, Allgwer (br0210) 2019; 64
Sun, Yang (br0220) 2019; 29
Pirayesh, Zeng (br0060) 2022; 24
Ge, Han, Wu, Zhang (br0040) 2023; 10
Zhang, Han, Ge, Ding (br0150) 2020; 50
Shi, Chen, Shahidehpour, Zhou, Wen (br0170) 2021; 12
Nemati, Peimani, Mobayen, Sayyedfattahi (br0080) 2022; 612
Ma, Li (br0050) 2023; 633
Zhao, Du, Zhou, Tian (br0100) 2022; 608
Franzè, Tedesco, Lucia (br0240) 2019; 3
Li, Chen, Yu, Zhang (br0140) 2021; 66
Romagnoli, Krogh, Niz, Hristozov, Sinopoli (br0300) 2023; 31
Zhu, Martínez (br0290) 2013; 49
Song (10.1016/j.ins.2025.122002_br0090) 2022; 135
Guan (10.1016/j.ins.2025.122002_br0200) 2018; 4
Lian (10.1016/j.ins.2025.122002_br0180) 2022; 53
Khler (10.1016/j.ins.2025.122002_br0210) 2019; 64
Zhao (10.1016/j.ins.2025.122002_br0130) 2022; 52
Zhao (10.1016/j.ins.2025.122002_br0100) 2022; 608
Franzè (10.1016/j.ins.2025.122002_br0240) 2019; 3
Zhou (10.1016/j.ins.2025.122002_br0020) 2020; 50
Sun (10.1016/j.ins.2025.122002_br0230) 2022; 65
Zhang (10.1016/j.ins.2025.122002_br0150) 2020; 50
Pirayesh (10.1016/j.ins.2025.122002_br0060) 2022; 24
Ma (10.1016/j.ins.2025.122002_br0050) 2023; 633
Romagnoli (10.1016/j.ins.2025.122002_br0300) 2023; 31
Yang (10.1016/j.ins.2025.122002_br0260) 2019; 49
Lin (10.1016/j.ins.2025.122002_br0190) 2021; 546
Gao (10.1016/j.ins.2025.122002_br0030) 2023; 70
Cetinkaya (10.1016/j.ins.2025.122002_br0110) 2023; 68
Tedesco (10.1016/j.ins.2025.122002_br0280) 2020; 32
Wu (10.1016/j.ins.2025.122002_br0120) 2018; 48
Goldsmith (10.1016/j.ins.2025.122002_br0270) 2005
Shi (10.1016/j.ins.2025.122002_br0170) 2021; 12
Hassan (10.1016/j.ins.2025.122002_br0010) 2020; 22
Ge (10.1016/j.ins.2025.122002_br0040) 2023; 10
Li (10.1016/j.ins.2025.122002_br0140) 2021; 66
Franzè (10.1016/j.ins.2025.122002_br0250) 2022; 67
Nemati (10.1016/j.ins.2025.122002_br0080) 2022; 612
Sun (10.1016/j.ins.2025.122002_br0220) 2019; 29
Wu (10.1016/j.ins.2025.122002_br0160) 2022; 9
Nourian (10.1016/j.ins.2025.122002_br0070) 2018; 15
Zhu (10.1016/j.ins.2025.122002_br0290) 2013; 49
References_xml – volume: 70
  start-page: 136
  year: 2023
  end-page: 140
  ident: br0030
  article-title: Cascading failure analysis of cyber-physical power systems considering routing strategy
  publication-title: IEEE Trans. Circuits Syst. II, Express Briefs
– year: 2005
  ident: br0270
  article-title: Wireless Communication
– volume: 12
  start-page: 1953
  year: 2021
  end-page: 1963
  ident: br0170
  article-title: Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids
  publication-title: IEEE Trans. Smart Grid
– volume: 49
  start-page: 2022
  year: 2019
  end-page: 2031
  ident: br0260
  article-title: Security research on wireless networked control systems subject to jamming attacks
  publication-title: IEEE Trans. Cybern.
– volume: 65
  year: 2022
  ident: br0230
  article-title: Event-triggered robust MPC of nonlinear cyber-physical systems against DoS attacks
  publication-title: Sci. China Inf. Sci.
– volume: 633
  start-page: 504
  year: 2023
  end-page: 516
  ident: br0050
  article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks
  publication-title: Inf. Sci.
– volume: 50
  start-page: 43
  year: 2020
  end-page: 57
  ident: br0020
  article-title: Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
– volume: 48
  start-page: 3420
  year: 2018
  end-page: 3431
  ident: br0120
  article-title: Secure estimation for cyber-physical systems via sliding mode
  publication-title: IEEE Trans. Cybern.
– volume: 10
  start-page: 1234
  year: 2023
  end-page: 1251
  ident: br0040
  article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks
  publication-title: IEEE/CAA J. Autom. Sin.
– volume: 612
  start-page: 1111
  year: 2022
  end-page: 1126
  ident: br0080
  article-title: Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays
  publication-title: Inf. Sci.
– volume: 32
  start-page: 6395
  year: 2020
  end-page: 6411
  ident: br0280
  article-title: Predictive maintenance of actuators in linear systems: a receding horizon set-theoretic approach
  publication-title: Int. J. Robust Nonlinear Control
– volume: 66
  start-page: 4303
  year: 2021
  end-page: 4310
  ident: br0140
  article-title: Active security control approach against DoS attacks in cyber-physical systems
  publication-title: IEEE Trans. Autom. Control
– volume: 68
  start-page: 1223
  year: 2023
  end-page: 1230
  ident: br0110
  article-title: Effects of jamming attacks on wireless networked control systems under disturbance
  publication-title: IEEE Trans. Autom. Control
– volume: 50
  start-page: 3616
  year: 2020
  end-page: 3626
  ident: br0150
  article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks
  publication-title: IEEE Trans. Cybern.
– volume: 53
  start-page: 2600
  year: 2022
  end-page: 2609
  ident: br0180
  article-title: Fuzzy-model-based lateral control for networked autonomous vehicle systems under hybrid cyber-attacks
  publication-title: IEEE Trans. Cybern.
– volume: 64
  start-page: 254
  year: 2019
  end-page: 269
  ident: br0210
  article-title: Nonlinear reference tracking: an economic model predictive control perspective
  publication-title: IEEE Trans. Autom. Control
– volume: 15
  start-page: 2
  year: 2018
  end-page: 13
  ident: br0070
  article-title: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 4
  start-page: 48
  year: 2018
  end-page: 59
  ident: br0200
  article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 29
  start-page: 4797
  year: 2019
  end-page: 4811
  ident: br0220
  article-title: Robust event-triggered model predictive control for cyber-physical systems under denial-of-service attacks
  publication-title: Int. J. Robust Nonlinear Control
– volume: 49
  start-page: 3571
  year: 2013
  end-page: 3582
  ident: br0290
  article-title: On distributed constrained formation control in operator-vehicle adversarial networks
  publication-title: Automatica
– volume: 135
  year: 2022
  ident: br0090
  article-title: Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
  publication-title: Automatica
– volume: 9
  start-page: 775
  year: 2022
  end-page: 788
  ident: br0160
  article-title: Secure control for cyber-physical systems under malicious attacks
  publication-title: IEEE Trans. Control Netw. Syst.
– volume: 546
  start-page: 943
  year: 2021
  end-page: 960
  ident: br0190
  article-title: Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
  publication-title: Inf. Sci.
– volume: 52
  start-page: 2599
  year: 2022
  end-page: 2608
  ident: br0130
  article-title: Resilient control for wireless cyber-physical systems subject to jamming attacks: a cross-layer dynamic game approach
  publication-title: IEEE Trans. Cybern.
– volume: 22
  start-page: 746
  year: 2020
  end-page: 789
  ident: br0010
  article-title: Differential privacy techniques for cyber physical systems: a survey
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 24
  start-page: 767
  year: 2022
  end-page: 809
  ident: br0060
  article-title: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 31
  start-page: 1565
  year: 2023
  end-page: 1580
  ident: br0300
  article-title: Software rejuvenation for safe operation of cyber-physical systems in the presence of run-time cyberattacks
  publication-title: IEEE Trans. Control Syst. Technol.
– volume: 608
  start-page: 1245
  year: 2022
  end-page: 1260
  ident: br0100
  article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks
  publication-title: Inf. Sci.
– volume: 67
  start-page: 1822
  year: 2022
  end-page: 1836
  ident: br0250
  article-title: Resilient model predictive control for constrained cyber-physical systems subject to severe attacks on the communication channels
  publication-title: IEEE Trans. Autom. Control
– volume: 3
  start-page: 984
  year: 2019
  end-page: 989
  ident: br0240
  article-title: Resilient control for cyber-physical systems subject to replay attacks
  publication-title: IEEE Control Syst. Lett.
– volume: 64
  start-page: 254
  issue: 1
  year: 2019
  ident: 10.1016/j.ins.2025.122002_br0210
  article-title: Nonlinear reference tracking: an economic model predictive control perspective
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2018.2800789
– volume: 52
  start-page: 2599
  issue: 4
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0130
  article-title: Resilient control for wireless cyber-physical systems subject to jamming attacks: a cross-layer dynamic game approach
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2020.3006095
– volume: 546
  start-page: 943
  year: 2021
  ident: 10.1016/j.ins.2025.122002_br0190
  article-title: Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.08.124
– volume: 65
  issue: 1
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0230
  article-title: Event-triggered robust MPC of nonlinear cyber-physical systems against DoS attacks
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-020-3289-1
– year: 2005
  ident: 10.1016/j.ins.2025.122002_br0270
– volume: 29
  start-page: 4797
  issue: 14
  year: 2019
  ident: 10.1016/j.ins.2025.122002_br0220
  article-title: Robust event-triggered model predictive control for cyber-physical systems under denial-of-service attacks
  publication-title: Int. J. Robust Nonlinear Control
  doi: 10.1002/rnc.4654
– volume: 612
  start-page: 1111
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0080
  article-title: Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.09.018
– volume: 135
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0090
  article-title: Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.110004
– volume: 67
  start-page: 1822
  issue: 4
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0250
  article-title: Resilient model predictive control for constrained cyber-physical systems subject to severe attacks on the communication channels
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2021.3084237
– volume: 9
  start-page: 775
  issue: 2
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0160
  article-title: Secure control for cyber-physical systems under malicious attacks
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2021.3094782
– volume: 3
  start-page: 984
  issue: 4
  year: 2019
  ident: 10.1016/j.ins.2025.122002_br0240
  article-title: Resilient control for cyber-physical systems subject to replay attacks
  publication-title: IEEE Control Syst. Lett.
  doi: 10.1109/LCSYS.2019.2920507
– volume: 49
  start-page: 2022
  issue: 6
  year: 2019
  ident: 10.1016/j.ins.2025.122002_br0260
  article-title: Security research on wireless networked control systems subject to jamming attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2018.2817249
– volume: 53
  start-page: 2600
  issue: 4
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0180
  article-title: Fuzzy-model-based lateral control for networked autonomous vehicle systems under hybrid cyber-attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2022.3151880
– volume: 4
  start-page: 48
  issue: 1
  year: 2018
  ident: 10.1016/j.ins.2025.122002_br0200
  article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 50
  start-page: 43
  issue: 1
  year: 2020
  ident: 10.1016/j.ins.2025.122002_br0020
  article-title: Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
  doi: 10.1109/TSMC.2019.2896323
– volume: 633
  start-page: 504
  year: 2023
  ident: 10.1016/j.ins.2025.122002_br0050
  article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2023.03.088
– volume: 31
  start-page: 1565
  issue: 4
  year: 2023
  ident: 10.1016/j.ins.2025.122002_br0300
  article-title: Software rejuvenation for safe operation of cyber-physical systems in the presence of run-time cyberattacks
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2023.3236470
– volume: 608
  start-page: 1245
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0100
  article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.07.010
– volume: 32
  start-page: 6395
  issue: 11
  year: 2020
  ident: 10.1016/j.ins.2025.122002_br0280
  article-title: Predictive maintenance of actuators in linear systems: a receding horizon set-theoretic approach
  publication-title: Int. J. Robust Nonlinear Control
  doi: 10.1002/rnc.6148
– volume: 12
  start-page: 1953
  issue: 3
  year: 2021
  ident: 10.1016/j.ins.2025.122002_br0170
  article-title: Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2021.3050203
– volume: 68
  start-page: 1223
  issue: 2
  year: 2023
  ident: 10.1016/j.ins.2025.122002_br0110
  article-title: Effects of jamming attacks on wireless networked control systems under disturbance
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2022.3153275
– volume: 10
  start-page: 1234
  issue: 5
  year: 2023
  ident: 10.1016/j.ins.2025.122002_br0040
  article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks
  publication-title: IEEE/CAA J. Autom. Sin.
  doi: 10.1109/JAS.2022.105845
– volume: 24
  start-page: 767
  issue: 2
  year: 2022
  ident: 10.1016/j.ins.2025.122002_br0060
  article-title: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2022.3159185
– volume: 48
  start-page: 3420
  issue: 12
  year: 2018
  ident: 10.1016/j.ins.2025.122002_br0120
  article-title: Secure estimation for cyber-physical systems via sliding mode
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2018.2825984
– volume: 49
  start-page: 3571
  issue: 12
  year: 2013
  ident: 10.1016/j.ins.2025.122002_br0290
  article-title: On distributed constrained formation control in operator-vehicle adversarial networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2013.09.031
– volume: 66
  start-page: 4303
  issue: 9
  year: 2021
  ident: 10.1016/j.ins.2025.122002_br0140
  article-title: Active security control approach against DoS attacks in cyber-physical systems
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.3032598
– volume: 70
  start-page: 136
  issue: 1
  year: 2023
  ident: 10.1016/j.ins.2025.122002_br0030
  article-title: Cascading failure analysis of cyber-physical power systems considering routing strategy
  publication-title: IEEE Trans. Circuits Syst. II, Express Briefs
– volume: 50
  start-page: 3616
  issue: 8
  year: 2020
  ident: 10.1016/j.ins.2025.122002_br0150
  article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2019.2956137
– volume: 15
  start-page: 2
  issue: 1
  year: 2018
  ident: 10.1016/j.ins.2025.122002_br0070
  article-title: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2015.2509994
– volume: 22
  start-page: 746
  issue: 1
  year: 2020
  ident: 10.1016/j.ins.2025.122002_br0010
  article-title: Differential privacy techniques for cyber physical systems: a survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2944748
SSID ssj0004766
Score 2.4740798
Snippet This paper investigates a resilient model predictive reset control strategy for cyber-physical systems (CPSs) with state and input constraints under hybrid...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 122002
SubjectTerms Cyber-physical systems
False data injection attack
Jamming attack
Resilient model predictive control
Title Resilient model predictive reset control for cyber-physical systems subject to hybrid attacks
URI https://dx.doi.org/10.1016/j.ins.2025.122002
Volume 706
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 0020-0255
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004766
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  issn: 0020-0255
  databaseCode: ACRLP
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004766
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect
  issn: 0020-0255
  databaseCode: AIKHN
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004766
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 0020-0255
  databaseCode: .~1
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004766
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 0020-0255
  databaseCode: AKRWK
  dateStart: 19681201
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004766
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH6MedGD6FScupGDeBC6LU366ziGYyruIA52kZKkKVZkK1t32MW_3bw2xYl48djSB-VL-96X5H1fAK6DIHVZEgVOpP3Q4aaEOVKKgSMEDQepcLnWuKD_NPUnM_4w9-YNGNVaGGyrtLm_yulltrZ3-hbNfp5lqPF1S0ZsirjhMRwdPzkP8BSD3ud3mwcPqv1KnCbh0_XOZtnjlS3Qsdv1etR165WVX7Vpp96Mj-DQEkUyrN7lGBp60YKDHfvAFnSs6IDcEKsqQpSJ_V1P4PVZr7MPFDyS8sAbkq9wWwYTHEHVUUFsozoxwURtpV45uR03Ulk8r8l6I3GphhRL8rZFeRcRRYHC_FOYje9eRhPHHqfgKDPHKhylmO-nGi3eKEvSSDGqpK-piqiUMhFSiUEqqZeYOYShRR7zDTdkgQiZUMLTHjuD5mK50OdAAkOzaCS5j9Y7ntKCCpWiOZzUOg21bsNtDWScV64Zcd1O9h4b1GNEPa5QbwOvoY5_DH1ssvrfYRf_C7uEfbyqOm6voFmsNrpjeEUhu-WH04W94f3jZPoFlyHOEg
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7MeVAPolNx6jQH8SB0Lk1_HmU4pm47yAa7SEmyFCvSla077OLfbl6b4kS8eG0bKF_a976XvO8LwLXvxzabhb4VKi-wHJ3CLCF4x-KcBp2Y245SuKA_HHn9ifM0dac16FZaGGyrNLG_jOlFtDZX7gyad1mSoMbXLhixTuKaxzhsC7Yd1_axAmt_fvd5OH65YYl1Ej5ebW0WTV5Jipbdttumtl0trfxKThsJp3cA-4YpkvvyZQ6hptIG7G34BzagZVQH5IYYWRHCTMz_egSvL2qZfKDikRQn3pBsgfsyGOEIyo5yYjrViR5M5FqohZWZiSOlx_OSLFcC12pIPidva9R3EZ7nqMw_hknvYdztW-Y8BUvqIiu3pGSeFyv0eKNsFoeSUSk8RWVIhRAzLiTvxIK6M11EaF7kMk-TQ-bzgHHJXeWyE6in81SdAvE1z6KhcDz03nGl4pTLGN3hhFJxoFQTbisgo6y0zYiqfrL3SKMeIepRiXoTnArq6MfcRzqs_z3s7H_DrmCnPx4OosHj6PkcdvFO2X57AfV8sVItTTJycVl8RF-Lus-n
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+model+predictive+reset+control+for+cyber-physical+systems+subject+to+hybrid+attacks&rft.jtitle=Information+sciences&rft.au=Geng%2C+Qing&rft.au=Wu%2C+Defu&rft.au=Liu%2C+Fucai&rft.au=Hua%2C+Changchun&rft.date=2025-07-01&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.volume=706&rft_id=info:doi/10.1016%2Fj.ins.2025.122002&rft.externalDocID=S0020025525001343
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon