|
[1]
|
Liu, Q. and Wang, J. (2015) A Second-Order Multi-Agent Network for Bound Constrained Distributed Optimization. IEEE Transactions on Automatic Control, 12, 3310-3315. [Google Scholar] [CrossRef]
|
|
[2]
|
Yang, S., Liu, Q. and Wang, J. (2017) A Multi-Agent System with a Proportionalintegral Protocol for Distributed Constrained Optimization. IEEE Transactions on Automatic Control, 60, 3461-3467. [Google Scholar] [CrossRef]
|
|
[3]
|
Liu, X., Liu, H., Lu, P. and Guo, S. (2017) Distributed Event-Triggered Output Consensus Control for Heterogeneous Multiagent System with Generallinear Dynamics. International Journal of Systems Science, 48, 2415-2417. [Google Scholar] [CrossRef]
|
|
[4]
|
Li, Z., Ren, W., Liu, X. and Fu, M. (2013) Distributed Containment Control of Multi-Agent Systems with General Linear Dynamics in the Presence of Multiple Leaders. International Journal of Robust and Nonlinear Control, 23, 534-547. [Google Scholar] [CrossRef]
|
|
[5]
|
Liu, K., Xi, G. and Wang, L. (2014) Containment Control for Second-Order Multi-Agent Systems with Time-Varying Delays. Systems & Control Letters, 67, 24-31. [Google Scholar] [CrossRef]
|
|
[6]
|
Liu, L., Esmalifalak, M. Ding, Q., Emesih, V.A. and Han, Z. (2014) Detecting False Data Injection Attacks on Power Grid by Sparse Optimization. IEEE Transactions on Smart Grid, 5, 612-621. [Google Scholar] [CrossRef]
|
|
[7]
|
Gu, C.J., Jirutitijaroen, P. and Motani, M. (2015) Detecting False Data Injection Attacks in AC State Estimation. IEEE Transactions on Smart Grid, 5, 2476-2483. [Google Scholar] [CrossRef]
|
|
[8]
|
Mousavinejad, E., Yang, F., Han, Q. and Vlacic, L. (2018) A Novel Cyber Attack Detection Method in Networked Control Systems. IEEE Transactions on Cybernetics, 48, 3254-3264. [Google Scholar] [CrossRef]
|
|
[9]
|
Zheng, S., Zhang, X. and Lu, Q. (2018) Distributed Set-Membership Observer Based Consensus of Nonlinear Delayed Multi-Agent Systems under Roundrobin Protocols. Chinese Control and Decision Conference (CCDC), Shenyang, 9-11 June 2018, 118-123. [Google Scholar] [CrossRef]
|