[1] JIN X, HE W L, TANG Y, et al.  Twisting-based finite-time consensus for euler-lagrange systems with an event-triggered strategy[J]. IEEE Transactions on Network Science and Engineering, 2020, 7(3): 1007-1018.
[2] TANG Y, ZHANG D D, HO D W C, et al.  Event-based tracking control of mobile robot with denial-of-service attacks[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020, 50(9): 3300-3310.
[3] SHEN L J, WU Q D, SUN J T.  Approximate controllability of fractional order semilinear systems with bounded delay[J]. Journal of Differential Equations, 2012, 252(11): 6163-6174.
[4] GHADIMI E, TEIXEIRA A, SHAMES I, et al.  Optimal parameter selection for the alternating direction method of multipliers (ADMM): Quadratic problems[J]. IEEE Transaction on Automatic Control, 2014, 60(3): 644-658.
[5] LIANG G Q, WELLER S R, ZHAO J H, et al.  The 2015 ukraine blackout: Implications for false data injection attacks[J]. IEEE Transaction on Power System, 2016, 32(4): 3317-3318.
[6] MO Y L, WEERAKKODY S, SINOPOLI B.  Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs[J]. IEEE Control Systems Magazine, 2015, 35(1): 93-109.
[7] GUO Z Y, SHI D W, JOHANSSON K H, et al.  Worst-case stealthy innovation-based linear attack on remote state estimation[J]. Automatica, 2018, 89(1): 117-124.   doi: 10.1016/j.automatica.2017.11.018
[8] BAI C Z, PASQUALETTI F, GUPTA V.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs[J]. IEEE Transactions on Automatic Control, 2017, 62(12): 6641-6648.   doi: 10.1109/TSG.2012.2195338
[9]

BAI C Z, PASQUALETTI F, GUPTA V. Security in stochastic control systems: Fundamental limitations and performance bounds[C]// American Control Conference, Chicago ZL USA: [s.n.], 2015, 195-200.

[10] MO L Y, CHABUKSWAR R, SINOPOLI B.  Detecting integrity attacks on SCADA systems[J]. IEEE Transactions on Control Systems Technology, 2013, 22(4): 1396-1407.
[11] BAI C Z, PASQUALETTI F, GUPTA V.  Data-injection attacks in stochastic control systems: detectability and performance tradeoffs[J]. Automatica, 2017, 82(1): 251-260.   doi: 10.1016/j.automatica.2017.04.047
[12] HUG G, GIAMPAPA J A.  Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks[J]. Automatica, 2017, 3(3): 1362-1370.   doi: 10.1016/j.automatica.2017.04.047
[13] GUO Z Y, SHI D W, JOHANSSON K H, et al.  Optimal linear cyber-attack on remote state estimation[J]. IEEE Transactions on Control of Network Systems, 2016, 4(1): 4-13.
[14] ZHANG H, CHENG P, SHI L, et al.  Optimal DoS attack scheduling in wireless networked control system[J]. IEEE Transactions on Control Systems Technology, 2015, 24(3): 843-852.
[15]

ANDERSON B D, MOORE J B. Optimal filtering[M]. [S.L.]: Courier Corporation, 2012.