IEEE Transactions on Control of Network Systems

Includes the top 50 most frequently accessed documents for this publication according to the usage statistics for the month of

• Convex Relaxation of Optimal Power Flow—Part I: Formulations and Equivalence

Publication Year: 2014, Page(s):15 - 27
Cited by:  Papers (131)  |  Patents (1)
| |PDF (2490 KB) | HTML

This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms. Part I presents two power flow models, formulates OPF and their relaxations in each model, and proves equivalence relationships among them. Part II presents sufficient conditions under which the convex relaxations are exact. View full abstract»

• Formation Control and Obstacle Avoidance of Multiple Rectangular Agents With Limited Communication Ranges

Publication Year: 2017, Page(s):680 - 691
Cited by:  Papers (1)
| |PDF (1551 KB) | HTML

Formation control of multiple agents has attracted many robotic and control researchers recently because of its potential applications in various fields. This paper presents a novel approach to the formation control and obstacle avoidance of multiple rectangular agents with limited communication ranges. The distributed control algorithm is designed by utilizing an artificial potential function. Th... View full abstract»

• Convex Relaxation of Optimal Power Flow—Part II: Exactness

Publication Year: 2014, Page(s):177 - 189
Cited by:  Papers (75)
| |PDF (635 KB) | HTML

This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms. Part I presents two power flow models, formulates OPF and their relaxations in each model, and proves equivalence relations among them. Part II presents sufficient conditions under which the convex relaxations are exact. View full abstract»

• Botnet Detection Based on Anomaly and Community Detection

Publication Year: 2017, Page(s):392 - 404
Cited by:  Papers (1)
| |PDF (893 KB) | HTML

We introduce a novel two-stage approach for the important cybersecurity problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches to create the empirical distribution: 1) a flow-based approach estima... View full abstract»

• Event-Triggered Control Systems Under Denial-of-Service Attacks

Publication Year: 2017, Page(s):93 - 105
Cited by:  Papers (4)
| |PDF (661 KB) | HTML

In this paper, we propose a systematic design framework for output-based dynamic event-triggered control (ETC) systems under denial-of-service (DoS) attacks. These malicious DoS attacks are intended to interfere with the communication channel causing periods in time at which transmission of measurement data is impossible. We show that the proposed ETC scheme, if well designed, can tolerate a class... View full abstract»

• Optimal Linear Cyber-Attack on Remote State Estimation

Publication Year: 2017, Page(s):4 - 13
Cited by:  Papers (9)
| |PDF (600 KB) | HTML

Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-base... View full abstract»

• Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Publication Year: 2017, Page(s):106 - 117
Cited by:  Papers (2)
| |PDF (836 KB) | HTML

This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while... View full abstract»

• Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

Publication Year: 2014, Page(s):370 - 379
Cited by:  Papers (45)
| |PDF (1052 KB) | HTML

By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid... View full abstract»

• A Gradient-Based Coverage Optimization Strategy for Mobile Sensor Networks

Publication Year: 2017, Page(s):477 - 488
Cited by:  Papers (2)
| |PDF (1492 KB) | HTML

A Voronoi-based strategy is proposed to maximize the sensing coverage in a mobile sensor network. Each sensor is moved to a point inside its Voronoi cell using a coverage improvement scheme. To this end, a gradient-based nonlinear optimization approach is utilized to find a target point for each sensor such that the local coverage increases as much as possible, if the sensor moves to this point. T... View full abstract»

• Optimal Pricing to Manage Electric Vehicles in Coupled Power and Transportation Networks

Publication Year: 2017, Page(s):863 - 875
| |PDF (1484 KB) | HTML

We study the system-level effects of the introduction of large populations of Electric Vehicles (EVs) on the power and transportation networks. We assume that each EV owner solves a decision problem to pick a cost-minimizing charge and travel plan. This individual decision takes into account traffic congestion in the transportation network, affecting travel times, as well as congestion in the powe... View full abstract»

• The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications

Publication Year: 2017, Page(s):886 - 898
| |PDF (560 KB) | HTML

The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security... View full abstract»

• Optimal Routing for Lifetime Maximization of Wireless-Sensor Networks With a Mobile Source Node

Publication Year: 2017, Page(s):793 - 804
| |PDF (1349 KB) | HTML

We study the problem of routing in sensor networks where the goal is to maximize the network's lifetime. Previous work has considered this problem for fixed-topology networks. Here, we add mobility to the source node, which requires a new definition of the network lifetime. In particular, we redefine lifetime to be the time until the source node depletes its energy. When the mobile node�... View full abstract»

• Controllability Metrics, Limitations and Algorithms for Complex Networks

Publication Year: 2014, Page(s):40 - 52
Cited by:  Papers (95)
| |PDF (1912 KB) | HTML

This paper studies the problem of controlling complex networks, i.e., the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem, 1) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, 2) we derive bounds based on the system dynamics (network topology a... View full abstract»

• Distributed Deployment Algorithms for Coverage Improvement in a Network of Wireless Mobile Sensors: Relocation by Virtual Force

Publication Year: 2017, Page(s):736 - 748
Cited by:  Papers (2)
| |PDF (1270 KB) | HTML

Efficient deployment algorithms are developed in this paper to increase the coverage area in a network of wireless mobile sensors. The proposed strategies iteratively compute the new candidate position of each sensor based on the existing coverage holes. These holes are obtained using a Voronoi diagram for the case of sensors with the same sensing ranges, and a multiplicatively weighted Voronoi (M... View full abstract»

• SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach

Publication Year: 2017, Page(s):632 - 642
Cited by:  Papers (6)
| |PDF (871 KB) | HTML

We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise ratio-based denial-of-service attacks. A sensor sends its local estimate to a remote estimator through a wireless network that may suffer interference from an attacker. Both the sensor and the attacker have energy constraints. We first study an associated two-player game when multiple power levels ... View full abstract»

• Secure State Estimation Against Sensor Attacks in the Presence of Noise

Publication Year: 2017, Page(s):49 - 59
Cited by:  Papers (1)
| |PDF (474 KB) | HTML

We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over ... View full abstract»

• Robust Adaptive Coverage Control for Robotic Sensor Networks

Publication Year: 2017, Page(s):462 - 476
Cited by:  Papers (1)
| |PDF (1172 KB) | HTML

This paper presents a distributed control algorithm to drive a group of robots to spread out over an environment and provide adaptive sensor coverage of that environment. The robots use an online learning mechanism to estimate the areas in the environment that require more concentrated sensor coverage, while simultaneously providing this coverage. The algorithm differs from previous approaches in ... View full abstract»

• Connecting Automatic Generation Control and Economic Dispatch From an Optimization View

Publication Year: 2016, Page(s):254 - 264
Cited by:  Papers (6)
| |PDF (653 KB) | HTML

Automatic generation control (AGC) regulates mechanical power generation in response to load changes through local measurements. Its main objective is to maintain system frequency and keep energy balanced within each control area in order to maintain the scheduled net interchanges between control areas. The scheduled interchanges as well as some other factors of AGC are determined at a slower time... View full abstract»

• Security Assessment of Electricity Distribution Networks Under DER Node Compromises

Publication Year: 2017, Page(s):23 - 36
Cited by:  Papers (2)
| |PDF (1530 KB) | HTML

This paper focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is a simultaneous compromise of DER nodes by strategic manipulation of generation setpoints. The loss to the defender (DN operator) includes loss of voltage regulation and cost of induced load control under supply-demand mismatch caus... View full abstract»

• Overview: Collective Control of Multiagent Systems

Publication Year: 2016, Page(s):334 - 347
Cited by:  Papers (15)
| |PDF (337 KB) | HTML

Collective control of a multiagent system is concerned with designing strategies for a group of autonomous agents operating in a networked environment. The aim is to achieve a global control objective through distributed sensing, communication, computing, and control. It has attracted many researchers from a wide range of disciplines, including the literature of automatic control. This paper aims ... View full abstract»

• Average State Observers for Large-Scale Network Systems

Publication Year: 2017, Page(s):761 - 769
| |PDF (1853 KB) | HTML

In this paper, we propose a novel observer, called the average state observer, for large-scale network systems. This observer estimates the average behavior of the system with an estimation error assurance. To design an average state observer with explicit consideration of the estimation error, we first derive a tractable representation of the estimation error system. On the basis of this represen... View full abstract»

• Distributed Control of Active–Passive Networked Multiagent Systems

Publication Year: 2017, Page(s):707 - 715
Cited by:  Papers (3)
| |PDF (2093 KB) | HTML

An active–passive networked multiagent system framework is introduced and analyzed, which consists of agents subject to exogenous inputs (active agents) and agents without any inputs (passive agents). Specifically, we propose an integral action-based distributed control approach and establish its transient time and steady-state performance characteristics using results from graph theory, ma... View full abstract»

• Uncovering Droop Control Laws Embedded Within the Nonlinear Dynamics of Van der Pol Oscillators

Publication Year: 2017, Page(s):347 - 358
Cited by:  Papers (3)
| |PDF (1076 KB) | HTML

This paper examines the dynamics of power-electronic inverters in islanded microgrids that are controlled to emulate the dynamics of Van der Pol oscillators. The general strategy of controlling inverters to emulate the behavior of nonlinear oscillators presents a compelling time-domain alternative to ubiquitous droop control methods which presume the existence of a quasistationary sinusoidal stead... View full abstract»

• Leader-following synchronization of coupled homogeneous and heterogeneous harmonic oscillators based on relative position measurements

Publication Year: 2018, Page(s): 1
| |PDF (2045 KB)

This paper considers the leader-following synchronization problem for a network of coupled harmonic oscillators by utilizing the relative position measurements between neighboring nodes, where the node dynamics can be either identical or nonidentical. For a homogeneous network with the same node dynamics, two types of first-order observer-based protocols are proposed to achieve leader-following sy... View full abstract»

• A Truncated Prediction Approach to Consensus Control of Lipschitz Nonlinear Multiagent Systems With Input Delay

Publication Year: 2017, Page(s):716 - 724
Cited by:  Papers (7)
| |PDF (477 KB) | HTML

This paper deals with the consensus control problem for Lipschitz nonlinear multiagent systems with input delay. A prediction of the agent state over the delay period is approximated by the zero input solution of the agent dynamics. The structure of a linear state feedback control algorithm is assumed for each agent based on such approximated state prediction. By transforming the Laplacian matrix ... View full abstract»

• Distributed Online Convex Optimization on Time-Varying Directed Graphs

Publication Year: 2017, Page(s):417 - 428
Cited by:  Papers (3)
| |PDF (520 KB) | HTML

This paper introduces a class of discrete-time distributed online optimization algorithms, with a group of agents whose communication topology is given by a uniformly strongly connected sequence of time-varying networks. At each time, a private locally Lipschitz strongly convex objective function is revealed to each agent. In the next time step, each agent updates its state using its own objective... View full abstract»

• Optimal Energy-Efficient Downlink Transmission Scheduling for Real-Time Wireless Networks

Publication Year: 2017, Page(s):692 - 706
Cited by:  Papers (2)
| |PDF (700 KB) | HTML

It has been shown that by using appropriate channel coding schemes in wireless environments, transmission energy can be significantly reduced by controlling the packet transmission rate. This paper seeks optimal solutions for downlink transmission control problems, motivated by this observation and by the need to minimize energy consumption in real-time wireless networks. Our problem formulation d... View full abstract»

• A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems

Publication Year: 2017, Page(s):60 - 70
Cited by:  Papers (1)
| |PDF (491 KB) | HTML

This paper considers secure design in distributed control systems to ensure the detection of stealthy integrity attacks. Distributed control systems consist of many heterogeneous components, such as sensors, controllers, and actuators and may contain several independent agents. The presence of many components and agents in a system increases the attack surfaces for potential adversaries, making di... View full abstract»

• Distributed Dynamic Coverage and Avoidance Control Under Anisotropic Sensing

Publication Year: 2017, Page(s):850 - 862
Cited by:  Papers (1)
| |PDF (1414 KB) | HTML

This paper addresses dynamic coverage in multi-agent systems along with certain safety and convergence guarantees. We consider anisotropic sensing for each agent, realized as conical sensing footprints and coverage functionals. This modeling results in asymmetric (directed) interactions among agents, in the sense that connected agents may either all be in the same mode (avoidance) or in different ... View full abstract»

• Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks

Publication Year: 2017, Page(s):14 - 22
| |PDF (1002 KB) | HTML

Malicious data attacks have raised widespread concerns on data integrity and security of cyber-physical systems. This paper discusses a state recovery problem, where the underlying cyber-physical system is subject to switching location attacks. Compared with the fix location attack, the switching location attack changes the attack locations at a constant/variable frequency. This paper develops non... View full abstract»

• Attack-Resilient State Estimation for Noisy Dynamical Systems

Publication Year: 2017, Page(s):82 - 92
Cited by:  Papers (4)
| |PDF (386 KB) | HTML

Several recent incidents have clearly illustrated the susceptibility of cyberphysical systems (CPS) to attacks, raising attention to security challenges in these systems. The tight interaction between information technology and the physical world has introduced new vulnerabilities that cannot be addressed with the use of standard cryptographic security techniques. Accordingly, the problem of state... View full abstract»

• Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Models

Publication Year: 2017, Page(s):323 - 335
| |PDF (1185 KB) | HTML

We study the problem of maximizing the lifetime of a sensor network by means of routing and initial energy allocation over its nodes. We consider a general state space battery model and show that similar results to our previous work with simpler battery dynamics are still valid. In particular, we show that under this general dynamic battery model, there exists an optimal policy consisting of time-... View full abstract»

• Efficient Clustering and Path Planning Strategies for Robotic Data Collection Using Space-Filling Curves

Publication Year: 2017, Page(s):838 - 849
| |PDF (776 KB) | HTML

In this paper, we consider a scenario where a mobile robot is tasked with periodically collecting data from a fixed wireless-sensor network. Our goal is to minimize the total cost of the system, including the motion cost of the robot and the communication cost of the sensors to the robot in realistic fading environments. We propose a strategy that divides the sensors into a number of clusters and ... View full abstract»

• Optimal Resource Allocation for Control of Networked Epidemic Models

Publication Year: 2017, Page(s):159 - 169
Cited by:  Papers (4)
| |PDF (796 KB) | HTML

This paper proposes and analyzes a generalized epidemic model over arbitrary directed graphs with heterogeneous nodes. The proposed model, called the generalized-susceptible exposed infected vigilant, subsumes a large number of popular epidemic models considered in the literature as special cases. Using a mean-field approximation, we derive a set of ODEs describing the spreading dynamics, provide ... View full abstract»

• Weighted Network Design with Cardinality Constraints via Alternating Direction Method of Multipliers

Publication Year: 2018, Page(s): 1
| |PDF (744 KB)

This paper examines simultaneous design of the network topology and the corresponding edge weights in presence of a cardinality constraint on the edge set. Network properties of interest for this design problem lead to optimization formulations with convex objectives, convex constraint sets, and cardinality constraints. This class of problems is referred to as Cardinality-Constrained Optimization ... View full abstract»

• Design Constraints for Biological Systems that Achieve Adaptation and Disturbance Rejection

Publication Year: 2018, Page(s): 1
| |PDF (2260 KB)

Many processes in natural biological systems, such as chemotaxis in bacteria and osmoregulation in yeast, rely on control architectures fundamentally equivalent to commonly used motifs from electrical and control engineering. However, difficulties arise when designing and implementing these motifs in biological contexts due to uncertainties inherent in the behaviour of biological systems, and phys... View full abstract»

• Attitude Coordinated Control of Multiple Underactuated Axisymmetric Spacecraft

Publication Year: 2017, Page(s):816 - 825
| |PDF (856 KB) | HTML

Attitude coordinated control of multiple underactuated spacecraft is studied in this paper. We adopt the parametrization proposed by Tsiotras et al. (1995) to describe attitude kinematics, which has been shown to be very convenient for control of underactuated axisymmetric spacecraft with two control torques. We first propose a partial attitude coordinated controller with angular ... View full abstract»

• Analysis of Price of Total Anarchy in Congestion Games via Smoothness Arguments

Publication Year: 2017, Page(s):876 - 885
| |PDF (656 KB) | HTML

Efficiency loss may exist at every stage of repeated play. With the rapid development of our society, how to improve the overall efficiency in repeated games becomes increasingly crucial. This paper studies the performance of a sequence of action profiles generated by repeated play in a multiple origin-destination network. To analyze the overall efficiency of these action profiles, the price of to... View full abstract»

• Optimal Water-Power Flow Problem: Formulation and Distributed Optimal Solution

Publication Year: 2018, Page(s): 1
| |PDF (975 KB)

This paper formalizes an optimal water-power flow (OWPF) problem to optimize the use of controllable assets across power and water systems while accounting for the couplings between the two infrastructures. Tanks and pumps are optimally managed to satisfy water demand while improving power grid operations; {for the power network, an AC optimal power flow formulation is augmented to accommodate the... View full abstract»

• Constraint-Preconditioned Inexact Newton Method for Hydraulic Simulation of Large-Scale Water Distribution Networks

Publication Year: 2017, Page(s):610 - 619
| |PDF (1165 KB) | HTML

Many sequential mathematical optimization methods and simulation-based heuristics for optimal control and design of water distribution networks rely on a large number of hydraulic simulations. In this paper, we propose an efficient inexact subspace Newton method for hydraulic analysis of water distribution networks. By using sparse and well-conditioned fundamental null space bases, we solve the no... View full abstract»

• Analysis of Failures in Power Grids

Publication Year: 2017, Page(s):288 - 300
Cited by:  Papers (4)
| |PDF (2092 KB) | HTML

This paper focuses on line failures in the transmission system of power grids. Recent large-scale power outages demonstrated the limitations of percolation- and epidemic-based tools in modeling failures and cascades in power grids. Hence, we study failures and cascades by using computational tools and a linearized power-flow model. We first obtain results regarding the Moore-Penrose pseudoinverse ... View full abstract»

• Sustainability of Service Provisioning Systems Under Stealth DoS Attacks

Publication Year: 2017, Page(s):749 - 760
| |PDF (615 KB) | HTML

We model a service provisioning system under attack by malicious intruders. The system consists of a bank of servers providing service to incoming requests. Malicious intruders generate fake requests attempting to degrade service provisioning—the fake traffic is assumed low rate and, thus, it is practically undetectable. Legitimate traffic may be balanced using available mechanisms in order... View full abstract»

• Collision-Free Formation Control with Decentralized Connectivity Preservation for Nonholonomic-Wheeled Mobile Robots

Publication Year: 2015, Page(s):122 - 130
Cited by:  Papers (16)
| |PDF (494 KB) | HTML

The preservation of connectivity in mobile robot networks is critical to the success of most existing algorithms designed to achieve various goals. The most basic method to preserve connectivity is to have each agent preserve its set of neighbors for all time. More advanced methods preserve a (minimum) spanning tree in the network. Other methods are based on increasing the algebraic graph connecti... View full abstract»

• Delay Scheduled Impulsive Control for Networked Control Systems

Publication Year: 2017, Page(s):587 - 597
Cited by:  Papers (3)
| |PDF (539 KB) | HTML

This paper presents a new design approach for networked control systems under the integral quadratic constraint (IQC) framework. Two types of network induced time-varying delays, that is, measurement delay and actuation delay, are considered. A novel delay scheduled impulsive (DSI) controller is proposed, which utilizes both plant state and the IQC dynamic state, as well as the real-time network-i... View full abstract»

• Quantized $H_{\infty}$ Consensus of Multiagent Systems With Quantization Mismatch Under Switching Weighted Topologies

Publication Year: 2017, Page(s):202 - 212
Cited by:  Papers (7)
| |PDF (802 KB) | HTML

This paper investigates the distributed quantized H∞ consensus problems for general linear and Lipschitz nonlinear multiagent systems with input quantization mismatch and external disturbances under switching weighted undirected or balanced directed topologies. The designed distributed quantized H∞ consensus protocol can be divided into two parts which are linea... View full abstract»

• Hybrid Control of Multiagent Systems With Contingent Temporal Tasks and Prescribed Formation Constraints

Publication Year: 2017, Page(s):781 - 792
Cited by:  Papers (1)
| |PDF (814 KB) | HTML

In this paper, we present a distributed hybrid control strategy for multiagent systems with contingent temporal tasks and prescribed formation constraints. Each agent is assigned a local task given as a linear temporal logic formula. In addition, two commonly seen kinds of cooperative robotic tasks, namely, service and formation, are requested and exchanged among the agents in real time. The servi... View full abstract»

• Worst-case Innovation-based Integrity Attacks with Side Information on Remote State Estimation

Publication Year: 2018, Page(s): 1
| |PDF (3085 KB)

In this work, we study the worst-case consequence of innovation-based integrity attacks with side information in a remote state estimation scenario where a sensor transmits its measurement to a remote estimator equipped with a false-data detector. If a malicious attacker is not only able to compromise the transmitted data packet but also able to measure the system state itself, the attack strategy... View full abstract»

• Distributed Finite-Time Average-Consensus With Limited Computational and Storage Capability

Publication Year: 2017, Page(s):380 - 391
Cited by:  Papers (1)
| |PDF (2463 KB) | HTML

Consensus is a fundamental feature of distributed systems, and it is the prerequisite for several complex tasks, such as flocking of mobile robots, localization in wireless-sensor networks, or decentralized control of smart grids. Average consensus, in particular, is quite challenging, because it is typically obtained asymptotically, while few finite-time algorithms are available. In this paper, w... View full abstract»

• Controllability of Formations Over Directed Time-Varying Graphs

Publication Year: 2017, Page(s):407 - 416
Cited by:  Papers (4)
| |PDF (401 KB) | HTML

In this paper, we investigate the controllability of a class of formation control systems. Given a directed graph, we assign an agent to each of its vertices and let the edges of the graph describe the information flow in the system. We relate the strongly connected components of this graph to the reachable set of the formation control system. Moreover, we show that the formation control model is ... View full abstract»

• Output Synchronization in Coupled Neural Networks With and Without External Disturbances

Publication Year: 2017, Page(s): 1
| |PDF (2578 KB)

This paper studies output synchronization of a coupled neural networks (CNNs) as well as the effects of external disturbances. By employing matrix theory and Barbalat's Lemma, several output synchronization criteria are presented for CNNs with directed and undirected topologies, respectively. Moreover, in order to ensure the output synchronization of CNNs, two adaptive schemes to adjust coupling w... View full abstract»

Aims & Scope

The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ioannis Ch. Paschalidis
Boston University