Secure State Estimation With Switched Compensation Mechanism Against DoS Attacks
This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the cascade observer technique, a novel resilient state observer with a switched compensation mechanism is designed. Moreo...
Saved in:
| Published in: | IEEE transactions on cybernetics Vol. 52; no. 9; pp. 9609 - 9620 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
United States
IEEE
01.09.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2168-2267, 2168-2275, 2168-2275 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the cascade observer technique, a novel resilient state observer with a switched compensation mechanism is designed. Moreover, a quantitative relationship between the resilience against DoS attacks and the design parameters is revealed. Compared with the existing results, where only the boundedness of the estimation error is guaranteed under DoS attacks, the exponential convergence of the estimation error is achieved by employing the proposed observer scheme, such that the estimation performance is improved. More specifically, in the disturbance-free case, it is proven that the state estimation error converges exponentially to 0 despite the existence of DoS attacks. Finally, simulation results are provided to illustrate the effectiveness and merits of the proposed methods. |
|---|---|
| AbstractList | This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the cascade observer technique, a novel resilient state observer with a switched compensation mechanism is designed. Moreover, a quantitative relationship between the resilience against DoS attacks and the design parameters is revealed. Compared with the existing results, where only the boundedness of the estimation error is guaranteed under DoS attacks, the exponential convergence of the estimation error is achieved by employing the proposed observer scheme, such that the estimation performance is improved. More specifically, in the disturbance-free case, it is proven that the state estimation error converges exponentially to 0 despite the existence of DoS attacks. Finally, simulation results are provided to illustrate the effectiveness and merits of the proposed methods. This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the cascade observer technique, a novel resilient state observer with a switched compensation mechanism is designed. Moreover, a quantitative relationship between the resilience against DoS attacks and the design parameters is revealed. Compared with the existing results, where only the boundedness of the estimation error is guaranteed under DoS attacks, the exponential convergence of the estimation error is achieved by employing the proposed observer scheme, such that the estimation performance is improved. More specifically, in the disturbance-free case, it is proven that the state estimation error converges exponentially to 0 despite the existence of DoS attacks. Finally, simulation results are provided to illustrate the effectiveness and merits of the proposed methods.This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a switching scheme and the cascade observer technique, a novel resilient state observer with a switched compensation mechanism is designed. Moreover, a quantitative relationship between the resilience against DoS attacks and the design parameters is revealed. Compared with the existing results, where only the boundedness of the estimation error is guaranteed under DoS attacks, the exponential convergence of the estimation error is achieved by employing the proposed observer scheme, such that the estimation performance is improved. More specifically, in the disturbance-free case, it is proven that the state estimation error converges exponentially to 0 despite the existence of DoS attacks. Finally, simulation results are provided to illustrate the effectiveness and merits of the proposed methods. |
| Author | Yan, Jing-Jing Yang, Guang-Hong |
| Author_xml | – sequence: 1 givenname: Jing-Jing orcidid: 0000-0002-6360-7542 surname: Yan fullname: Yan, Jing-Jing email: y1119218903@sina.com organization: College of Information Science and Engineering, Northeastern University, Shenyang, China – sequence: 2 givenname: Guang-Hong orcidid: 0000-0002-8911-0112 surname: Yang fullname: Yang, Guang-Hong email: yangguanghong@ise.neu.edu.cn organization: College of Information Science and Engineering, Northeastern University, Shenyang, China |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/33729974$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9kUtLAzEUhYMoPvsDRJABN25abx4zmSxrrQ9QFFoQVyFN79hoZ6ZOMoj_3tS2LlyYRZ7fOYRzDsh2VVdIyDGFHqWgLsaDl8seA0Z7HDKQgm-RfUazvMuYTLd_95ncIx3v3yCOPF6pfJfscS6ZUlLsk6cR2rbBZBRMwGTogytNcHWVPLswS0afLtgZTpNBXS6w8qunB7QzUzlfJv1X4yofkqt6lPRDMPbdH5Gdwsw9dtbrIRlfD8eD2-79483doH_ftVyo0GWFAWlNxiQ1NGUKRTwXNuVxplNUJkWZMYGZKERBDXALFCYpnxQwQcb4ITlf2S6a-qNFH3TpvMX53FRYt16zFFgOKhUiomd_0Le6bar4Oc0kCFA5h6Xh6ZpqJyVO9aKJSTRfehNVBOQKsE3tfYOFti78BBIa4-aagl72ope96GUvet1LVNI_yo35f5qTlcYh4i-veA5pJvg3eNWWJA |
| CODEN | ITCEB8 |
| CitedBy_id | crossref_primary_10_1016_j_amc_2023_128444 crossref_primary_10_1016_j_jfranklin_2024_106817 crossref_primary_10_3390_act12080335 crossref_primary_10_1002_rnc_70027 crossref_primary_10_1109_TSMC_2024_3521025 crossref_primary_10_1109_TIE_2022_3186379 crossref_primary_10_1177_01423312241301299 crossref_primary_10_1016_j_sysconle_2023_105590 crossref_primary_10_1109_TCYB_2024_3438288 crossref_primary_10_1109_TCYB_2021_3100303 crossref_primary_10_1109_TNSE_2024_3486451 crossref_primary_10_1109_TCYB_2025_3569377 crossref_primary_10_1109_TCSII_2024_3370400 crossref_primary_10_1016_j_automatica_2024_112097 crossref_primary_10_1080_00207721_2024_2378366 crossref_primary_10_1016_j_jfranklin_2023_09_039 crossref_primary_10_1016_j_ejcon_2024_101037 crossref_primary_10_1007_s11768_024_00204_y crossref_primary_10_1109_TII_2022_3144445 crossref_primary_10_1016_j_ins_2023_02_058 crossref_primary_10_1109_TCNS_2022_3226946 crossref_primary_10_1002_rnc_7274 crossref_primary_10_1109_TASE_2022_3155163 crossref_primary_10_1109_TNNLS_2023_3279144 crossref_primary_10_1109_TSMC_2022_3221371 crossref_primary_10_1002_rnc_7831 crossref_primary_10_1016_j_jfranklin_2025_108068 crossref_primary_10_1016_j_jfranklin_2025_107871 crossref_primary_10_1109_TFUZZ_2025_3576858 crossref_primary_10_1109_TCNS_2022_3225282 crossref_primary_10_1109_TCSII_2024_3358389 crossref_primary_10_1109_TII_2023_3300415 crossref_primary_10_1002_rnc_6264 crossref_primary_10_1007_s12555_024_0117_8 |
| Cites_doi | 10.1109/TCYB.2019.2915942 10.1109/TCYB.2018.2806387 10.1109/TAC.2019.2953210 10.1109/TCYB.2018.2863689 10.1109/TAC.2013.2283754 10.1109/TCYB.2019.2956137 10.1109/TCYB.2018.2820001 10.1109/TCYB.2020.3005283 10.1109/TCST.2020.2978908 10.1109/TSMC.2019.2962318 10.1109/TCYB.2019.2915124 10.1109/TAC.2013.2266831 10.1016/j.automatica.2017.01.023 10.1109/TAC.2019.2919114 10.1109/TFUZZ.2019.2900838 10.1016/j.ins.2019.01.001 10.1109/JIOT.2019.2947659 10.1016/j.automatica.2014.10.067 10.1016/j.ins.2018.02.066 10.1016/j.automatica.2020.109080 10.1109/TCYB.2018.2861834 10.1109/IECON.2010.5675203 10.1109/TCNS.2016.2549640 10.1109/TCYB.2019.2918760 10.1109/TCYB.2020.2975089 10.1016/j.automatica.2020.108997 10.1109/TSMC.2020.2964586 10.1109/TCNS.2020.2972601 10.1109/TAC.2015.2416924 10.1109/TCYB.2020.3002938 10.1080/23307706.2014.885293 10.1016/j.ins.2020.08.086 10.1109/TCYB.2015.2452217 10.1016/j.ins.2018.07.030 10.1016/j.automatica.2017.01.031 10.3182/20140824-6-ZA-1003.01354 10.1109/TAC.2015.2409905 10.1016/j.automatica.2017.12.012 10.1109/TFUZZ.2012.2212200 10.1109/TSMC.2018.2854630 10.1109/TCYB.2020.2985043 10.1109/TSMC.2018.2875250 10.1109/TAC.2017.2766759 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION NPM 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
| DOI | 10.1109/TCYB.2021.3060743 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef PubMed Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Aerospace Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional MEDLINE - Academic |
| DatabaseTitle | CrossRef PubMed Aerospace Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional MEDLINE - Academic |
| DatabaseTitleList | Aerospace Database PubMed MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 2168-2275 |
| EndPage | 9620 |
| ExternalDocumentID | 33729974 10_1109_TCYB_2021_3060743 9380564 |
| Genre | orig-research Journal Article |
| GrantInformation_xml | – fundername: National Key Research and Development Program of China grantid: 2020YFE0201100 funderid: 10.13039/501100012166 – fundername: Research Fund of State Key Laboratory of Synthetical Automation for Process Industries grantid: 2018ZCX03 funderid: 10.13039/501100011248 – fundername: National Natural Science Foundation of China grantid: 61621004; U1908213 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION NPM 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
| ID | FETCH-LOGICAL-c349t-2fa07ca6271a1529e4a07fc5307f1de9a5e7624e64f4f1a03c010b53bf0be223 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 39 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000732073500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2168-2267 2168-2275 |
| IngestDate | Mon Sep 29 06:23:33 EDT 2025 Sun Nov 30 05:24:12 EST 2025 Mon Jul 21 06:03:28 EDT 2025 Sat Nov 29 02:02:33 EST 2025 Tue Nov 18 22:22:12 EST 2025 Wed Aug 27 02:22:58 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c349t-2fa07ca6271a1529e4a07fc5307f1de9a5e7624e64f4f1a03c010b53bf0be223 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0002-6360-7542 0000-0002-8911-0112 |
| PMID | 33729974 |
| PQID | 2704098302 |
| PQPubID | 85422 |
| PageCount | 12 |
| ParticipantIDs | proquest_journals_2704098302 crossref_primary_10_1109_TCYB_2021_3060743 pubmed_primary_33729974 crossref_citationtrail_10_1109_TCYB_2021_3060743 ieee_primary_9380564 proquest_miscellaneous_2502809544 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-09-01 |
| PublicationDateYYYYMMDD | 2022-09-01 |
| PublicationDate_xml | – month: 09 year: 2022 text: 2022-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: Piscataway |
| PublicationTitle | IEEE transactions on cybernetics |
| PublicationTitleAbbrev | TCYB |
| PublicationTitleAlternate | IEEE Trans Cybern |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 O’Reilly (ref45) 1983 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 Khalil (ref44) 2003 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref36 doi: 10.1109/TCYB.2019.2915942 – ident: ref26 doi: 10.1109/TCYB.2018.2806387 – ident: ref28 doi: 10.1109/TAC.2019.2953210 – ident: ref38 doi: 10.1109/TCYB.2018.2863689 – ident: ref41 doi: 10.1109/TAC.2013.2283754 – ident: ref2 doi: 10.1109/TCYB.2019.2956137 – ident: ref14 doi: 10.1109/TCYB.2018.2820001 – ident: ref24 doi: 10.1109/TCYB.2020.3005283 – ident: ref31 doi: 10.1109/TCST.2020.2978908 – ident: ref10 doi: 10.1109/TSMC.2019.2962318 – ident: ref17 doi: 10.1109/TCYB.2019.2915124 – ident: ref1 doi: 10.1109/TAC.2013.2266831 – ident: ref34 doi: 10.1016/j.automatica.2017.01.023 – ident: ref13 doi: 10.1109/TAC.2019.2919114 – ident: ref11 doi: 10.1109/TFUZZ.2019.2900838 – ident: ref18 doi: 10.1016/j.ins.2019.01.001 – ident: ref15 doi: 10.1109/JIOT.2019.2947659 – ident: ref21 doi: 10.1016/j.automatica.2014.10.067 – ident: ref39 doi: 10.1016/j.ins.2018.02.066 – ident: ref8 doi: 10.1016/j.automatica.2020.109080 – ident: ref27 doi: 10.1109/TCYB.2018.2861834 – ident: ref40 doi: 10.1109/IECON.2010.5675203 – ident: ref32 doi: 10.1109/TCNS.2016.2549640 – ident: ref16 doi: 10.1109/TCYB.2019.2918760 – ident: ref19 doi: 10.1109/TCYB.2020.2975089 – ident: ref6 doi: 10.1016/j.automatica.2020.108997 – ident: ref37 doi: 10.1109/TSMC.2020.2964586 – ident: ref9 doi: 10.1109/TCNS.2020.2972601 – ident: ref22 doi: 10.1109/TAC.2015.2416924 – ident: ref29 doi: 10.1109/TCYB.2020.3002938 – ident: ref4 doi: 10.1080/23307706.2014.885293 – ident: ref30 doi: 10.1016/j.ins.2020.08.086 – ident: ref5 doi: 10.1109/TCYB.2015.2452217 – ident: ref23 doi: 10.1016/j.ins.2018.07.030 – ident: ref35 doi: 10.1016/j.automatica.2017.01.031 – ident: ref43 doi: 10.3182/20140824-6-ZA-1003.01354 – ident: ref20 doi: 10.1109/TAC.2015.2409905 – ident: ref42 doi: 10.1016/j.automatica.2017.12.012 – ident: ref7 doi: 10.1109/TFUZZ.2012.2212200 – ident: ref12 doi: 10.1109/TSMC.2018.2854630 – volume-title: Observers for Linear Systems year: 1983 ident: ref45 – ident: ref3 doi: 10.1109/TCYB.2020.2985043 – volume-title: Nonlinear Systems year: 2003 ident: ref44 – ident: ref25 doi: 10.1109/TSMC.2018.2875250 – ident: ref33 doi: 10.1109/TAC.2017.2766759 |
| SSID | ssj0000816898 |
| Score | 2.4760187 |
| Snippet | This article is concerned with the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks. Based on a... |
| SourceID | proquest pubmed crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 9609 |
| SubjectTerms | Cascade observer Compensation Computer crime Convergence Cyber-physical systems cyber-physical systems (CPSs) Denial of service attacks denial-of-service (DoS) attacks Denial-of-service attack Design parameters Errors Observers Resilience secure state estimation Security State estimation State observers switched algorithm switched compensation mechanism Switches Symmetric matrices Wireless communication |
| Title | Secure State Estimation With Switched Compensation Mechanism Against DoS Attacks |
| URI | https://ieeexplore.ieee.org/document/9380564 https://www.ncbi.nlm.nih.gov/pubmed/33729974 https://www.proquest.com/docview/2704098302 https://www.proquest.com/docview/2502809544 |
| Volume | 52 |
| WOSCitedRecordID | wos000732073500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library (IEL) customDbUrl: eissn: 2168-2275 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816898 issn: 2168-2267 databaseCode: RIE dateStart: 20130101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9wwDLcATRMvMAaMA4aCtIcx0aMfadM83hhoLyAkTuJ4qtrU2SqNO8T1tn8fO81VQtqQ9pYqaVrFcfyzHdsAn0qNNRvtg8RKDGSGdZBLzANl8xwzG6FE6YpNqOvrfDLRNytw2sfCIKK7fIZDbjpffj0zCzaVnekkJ3ktV2FVqayL1ertKa6AhCt9G1MjIFShvBMzCvXZ-Pz-KymDcTQkiMxScx3eJuyx0kq-kEiuxMq_0aaTOpeb__e_72DDo0sx6rbDFqzg9D1sef6di88-yfTJNtw4QzsKBzbFBTF6F8Mo7pr2p7j90zA1a8HHBSm6XdcVcphwM38Qox9lQ7hSfJvdilHbcpz-DowvL8bn3wNfXSEwidRtENsyVKbMYhWVJMQ1Snq2JiWmt1GNukyRDkqJmbTSRmWYGFLdqjSpbFghgYpdWJvOprgHAuO6jmlOTeiT8FhSKUMow9ZhriNbGRxAuFzgwvjM41wA41fhNJBQF0yegslTePIM4Ev_ymOXduO1wdu89v1Av-wDOFxSsfCMOS9iRaeW5qRnAzjuu4ml2E9STnG2oDEp-5t1KmmKDx31-7mXm2b_7988gPWY4yPcJbRDWGufFvgR3pjfbTN_OqJ9O8mP3L59Bubb5Qk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9RAEJ4gGOVFQBSLCGvigxoL7XZ77T6eCIEIFxIuEZ6adjurTeTOcD34-8xs95qYqIlv2-x22-zs7HwzszMD8K7UWLPRPkyswlANsA5zhXmY2TzHgY1RoXLFJrLRKL-60hdL8KmPhUFEd_kM97npfPn11MzZVHagk5zktXoEK6lSMuqitXqLiish4YrfSmqEhCsy78aMI30wPrz-TOqgjPcJJLPcXIUnCfusdKZ-k0muyMrf8aaTO8dr__fH6_DM40sx7DbEBizh5DlseA6eifc-zfSHTbhwpnYUDm6KI2L1LopRfGvaH-LyvmF61oIPDFJ1u65z5EDhZnYjht_LhpCl-DK9FMO25Uj9FzA-PhofnoS-vkJoEqXbUNoyykw5kFlckhjXqOjZmpTY3sY16jJFOioVDpRVNi6jxJDyVqVJZaMKCVa8hOXJdIKvQKCsa0lzasKfhMiSKjOEM2wd5Tq2lcEAosUCF8bnHucSGD8Lp4NEumDyFEyewpMngI_9K7-6xBv_GrzJa98P9MsewM6CioVnzVkhMzq3NKc9C-Bt301MxZ6ScoLTOY1J2eOsaZcFsNVRv597sWm2__zNPXh6Mj4_K85OR19fw6rkaAl3JW0HltvbOb6Bx-aubWa3u273PgCTsedo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+State+Estimation+With+Switched+Compensation+Mechanism+Against+DoS+Attacks&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Yan%2C+Jing-Jing&rft.au=Yang%2C+Guang-Hong&rft.date=2022-09-01&rft.issn=2168-2267&rft.eissn=2168-2275&rft.volume=52&rft.issue=9&rft.spage=9609&rft.epage=9620&rft_id=info:doi/10.1109%2FTCYB.2021.3060743&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCYB_2021_3060743 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon |