Volume 20,Issue 1,2022 Table of Contents

   
Other Issues:  
  

Research Articles

Learning-based adaptive optimal output regulation of linear and nonlinear systems: An overview
  Weinan Gao1, Zhong-Ping Jiang2
  2022,20(1):1-19 [Abstract(628)]  [View PDF]
  
Adaptive output regulation for cyber-physical systems under time-delay attacks
  Dan Jin1, Bo Chen1, Li Yu1, Shichao Liu2
  2022,20(1):20-31 [Abstract(546)]  [View PDF]
  
Distributed robust MPC for nonholonomic robots with obstacle and collision avoidance
  Li Dai1, Yanye Hao2, Huahui Xie1, Zhongqi Sun1,3, Yuanqing Xia1
  2022,20(1):32-45 [Abstract(596)]  [View PDF]
  
Consensus control of feedforward nonlinear multi-agent systems: A time-varying gain method
  Hanfeng Li, Xianfu Zhang, Weihao Pan
  2022,20(1):46-53 [Abstract(718)]  [View PDF]
  
Suppression of high order disturbances and tracking for nonchaotic systems: A time-delayed state feedback approach
  Zahed Dastan, Mahsan Tavakoli-Kakhki
  2022,20(1):54-68 [Abstract(508)]  [View PDF]
  
Constrained nonlinear MPC for accelerated tracking piece-wise references and its applications to thermal systems
  Defeng He1, Qingsong Wang1, Ping Han1, Haiping Du2
  2022,20(1):69-79 [Abstract(506)]  [View PDF]
  
Adaptive robust simultaneous stabilization of multiple n-degree-of-freedom robot systems
  Haiying Zhang, Renming Yang
  2022,20(1):80-94 [Abstract(518)]  [View PDF]
  
Safety stabilization of switched systems with unstable subsystems
  Lijun Long1, Yiguang Hong2
  2022,20(1):95-102 [Abstract(472)]  [View PDF]
  
Bearing fault diagnosis with cascaded space projection and a CNN
  Yunji Zhao, Menglin Zhou, Li Wang, Xiaozhuo Xu, Nannan Zhang
  2022,20(1):103-113 [Abstract(526)]  [View PDF]
  
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
  Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3
  2022,20(1):114-126 [Abstract(596)]  [View PDF]
  
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
  Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3
  2022,20(1):127-138 [Abstract(594)]  [View PDF]
  

Letter

Sparse parameter identification of stochastic dynamical systems
  Wenxiao Zhao1,2
  2022,20(1):139-141 [Abstract(504)]  [View PDF]