Abstract: In this article, a resilient control scheme against multiplicative attacks is studied within the unified control and detection framework. Firstly, multiplicative attacks are modeled as ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results