Volume 20,Issue 1,2022 Table of Contents

   
Other Issues:  
  

Research Articles

Learning-based adaptive optimal output regulation of linear and nonlinear systems: An overview
  Weinan Gao1, Zhong-Ping Jiang2
  2022,20(1):1-19 [Abstract(610)]  [View PDF]
  
Adaptive output regulation for cyber-physical systems under time-delay attacks
  Dan Jin1, Bo Chen1, Li Yu1, Shichao Liu2
  2022,20(1):20-31 [Abstract(528)]  [View PDF]
  
Distributed robust MPC for nonholonomic robots with obstacle and collision avoidance
  Li Dai1, Yanye Hao2, Huahui Xie1, Zhongqi Sun1,3, Yuanqing Xia1
  2022,20(1):32-45 [Abstract(570)]  [View PDF]
  
Consensus control of feedforward nonlinear multi-agent systems: A time-varying gain method
  Hanfeng Li, Xianfu Zhang, Weihao Pan
  2022,20(1):46-53 [Abstract(694)]  [View PDF]
  
Suppression of high order disturbances and tracking for nonchaotic systems: A time-delayed state feedback approach
  Zahed Dastan, Mahsan Tavakoli-Kakhki
  2022,20(1):54-68 [Abstract(490)]  [View PDF]
  
Constrained nonlinear MPC for accelerated tracking piece-wise references and its applications to thermal systems
  Defeng He1, Qingsong Wang1, Ping Han1, Haiping Du2
  2022,20(1):69-79 [Abstract(494)]  [View PDF]
  
Adaptive robust simultaneous stabilization of multiple n-degree-of-freedom robot systems
  Haiying Zhang, Renming Yang
  2022,20(1):80-94 [Abstract(500)]  [View PDF]
  
Safety stabilization of switched systems with unstable subsystems
  Lijun Long1, Yiguang Hong2
  2022,20(1):95-102 [Abstract(454)]  [View PDF]
  
Bearing fault diagnosis with cascaded space projection and a CNN
  Yunji Zhao, Menglin Zhou, Li Wang, Xiaozhuo Xu, Nannan Zhang
  2022,20(1):103-113 [Abstract(506)]  [View PDF]
  
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
  Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3
  2022,20(1):114-126 [Abstract(572)]  [View PDF]
  
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
  Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3
  2022,20(1):127-138 [Abstract(576)]  [View PDF]
  

Letter

Sparse parameter identification of stochastic dynamical systems
  Wenxiao Zhao1,2
  2022,20(1):139-141 [Abstract(488)]  [View PDF]