Sign in

Protocol-Based Fusion Estimator Design for State-Saturated Systems With Dead-Zone-Like Censoring Under Deception Attacks.

Hang GengZidong WangFuad E. AlsaadiKhalid Hamed AlharbiYuhua Cheng
Published in: IEEE Trans. Signal Inf. Process. over Networks (2022)
Keyphrases
  • cryptographic protocols
  • artificial intelligence
  • intelligent systems
  • machine learning
  • least squares