Abstract: This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition ...
Abstract: Redundant manipulators are widely used in various fields due to their multiple degrees of freedom characteristics, and their tracking control is an important problem in the field of robotics ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results