Abstract: In this article, a resilient control scheme against multiplicative attacks is studied within the unified control and detection framework. Firstly, multiplicative attacks are modeled as ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果一些您可能无法访问的结果已被隐去。
显示无法访问的结果