{"title":"隐身攻击下离散时间切换系统的功能区间观测器","authors":"Jianwei Fan, Jun Huang, Yueyuan Zhang, Haochi Che","doi":"10.1109/DDCLS52934.2021.9455450","DOIUrl":null,"url":null,"abstract":"This paper deals with functional interval observer design for discrete-time switched systems under stealthy deception attacks. First, the boundaries of the attack are obtained by designing interval observers. Then a two-step method to design the functional observers by zonotope is presented. For the first step, an $H$∞ functional observer is presented and as the second step, the zonotope method is applied to obtain the boundaries of states. An illustrative example provided in the last section demonstrates the effectiveness of the proposed method.","PeriodicalId":325897,"journal":{"name":"2021 IEEE 10th Data Driven Control and Learning Systems Conference (DDCLS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Functional interval observer for discrete-time switched system under stealthy attacks\",\"authors\":\"Jianwei Fan, Jun Huang, Yueyuan Zhang, Haochi Che\",\"doi\":\"10.1109/DDCLS52934.2021.9455450\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper deals with functional interval observer design for discrete-time switched systems under stealthy deception attacks. First, the boundaries of the attack are obtained by designing interval observers. Then a two-step method to design the functional observers by zonotope is presented. For the first step, an $H$∞ functional observer is presented and as the second step, the zonotope method is applied to obtain the boundaries of states. An illustrative example provided in the last section demonstrates the effectiveness of the proposed method.\",\"PeriodicalId\":325897,\"journal\":{\"name\":\"2021 IEEE 10th Data Driven Control and Learning Systems Conference (DDCLS)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 10th Data Driven Control and Learning Systems Conference (DDCLS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DDCLS52934.2021.9455450\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 10th Data Driven Control and Learning Systems Conference (DDCLS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DDCLS52934.2021.9455450","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Functional interval observer for discrete-time switched system under stealthy attacks
This paper deals with functional interval observer design for discrete-time switched systems under stealthy deception attacks. First, the boundaries of the attack are obtained by designing interval observers. Then a two-step method to design the functional observers by zonotope is presented. For the first step, an $H$∞ functional observer is presented and as the second step, the zonotope method is applied to obtain the boundaries of states. An illustrative example provided in the last section demonstrates the effectiveness of the proposed method.