[1]Z. H. Pang, G. P. Liu, D. H. Zhou, and D. H. Sun. Data-based predictive control for networked nonlinear systems with network-induced delay and packet dropout. IEEE Transactions on Industrial Electronics, Accepted, 2015.
[2]Z. H. Pang, G. P. Liu, and D. H. Zhou. Design and performance analysis of incremental networked predictive control systems. IEEE Transactions on Cybernetics, in press, DOI: 10.1109/TCYB.2015.2448031, 2015.
[3]Z. H. Pang, G. P. Liu, D. H. Zhou, and D. H. Sun. Data-based predictive control for networked non-linear systems with two-channel packet dropouts. IET Control Theory & Applications, 9(7): 1154-1161, 2015.
[4]Z. H. Pang, G. P. Liu, and D. H. Zhou. Setpoint control of networked systems via static output feedback integral controller. IET Control Theory & Applications, 8(15): 1581-1587, 2014.
[5]Z. H. Pang, G. P. Liu, D. H Zhou, and M. Chen. Output tracking control for networked systems: A model-based prediction approach. IEEE Transactions on Industrial Electronics, 61(9): 4867-4877, 2014.
[6]Z. H. Pang and G. P. Liu. Design and implementation of secure networked predictive control systems under deception attacks. IEEE Transactions on Control Systems Technology, 20(5): 1334-1342, 2012.
[7]Z. H. Pang, G. P. Liu, and D. H. Zhou. Step output tracking controller design for networked control systems. Journal of Advanced Computational Intelligence and Intelligent Informatics, 17(6): 813-817, 2013.
[10]Z. H. Pang, F. Y. Hou, Y. G. Zhou, and D. H. Sun. Design of false data injection attacks for SISO feedback control systems. IEEE International Conference on Information and Automation, 2015.
[11]Z. H. Pang, F. Y. Hou, Y. G. Zhou, and D. H. Sun. False data injection attacks for output tracking control systems. 34th Chinese Control Conference, 2015.
[12]Z. H. Pang, G. P. Liu, and D. H. Zhou. Event-driven networked predictive step output tracking control, 9th China-Japan International Workshop on Internet Technology and Control Applications, pp. 157-162, 2013
[13]Z. H. Pang, G. P. Liu, and D. H. Zhou. Detection of deception attacks on the backward channel of networked control systems. 31th Chinese Control Conference, pp. 5972-5977, 2012.
[14]Z. H. Pang, G. P. Liu, and Z. Dong. Secure networked control systems under denial of service attacks. 18th IFAC World Congress, pp. 8908-8913, 2011.
[15]Z. H. Pang, G. P. Liu, and Y. L. Qiao. Web-based compilation of C-MEX S-functions and its application in NCSLab. 30th Chinese Control Conference, pp. 6533-6538, 2011.
[16]Z. H. Pang, G. Zheng, G. P. Liu, and C. X. Luo. Secure transmission mechanism for networked control systems under deception attacks. 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, pp. 27-32, 2011.
[17]Z. H. Pang, G. Zheng, and C. X. Luo. Augmented state estimation and LQR control for a ball and beam system. 6th IEEE Conference on Industrial Electronics and Applications, pp. 1328-1332, 2011.
[18]Z. H. Pang and G. P. Liu. Model-based recursive networked predictive control. IEEE International Conference on Systems, Man and Cybernetics, pp. 1665-1670, 2010.
[19]Z. H. Pang and G. P. Liu. Secure networked control systems under data integrity attacks. 29th Chinese Control Conference, pp. 5765-5770, 2010.