IEEE/CAA Journal of Automatica Sinica

Scope

The scope of the IEEE/CAA Journal of Automatica Sinica includes the field of automation. The objective of this journal is high quality and rapid publication of articles, with a strong focus on new trends, original theoretical and experimental research and developments, emerging technologies, and industrial standards in automation. Specifically, the Journal focuses on such areas as automatic control, artificial intelligence and intelligent control, systems theory and engineering, pattern recognition and intelligent systems, automation engineering and applications, information processing and information systems, network based automation, robotics, computer-aided technologies for automation systems, sensing and measurement, navigation, guidance, and control, smart city, smart grid, big data and data mining, internet of things, cyber-physical systems, blockchain, cloud computing for automation, mechatronics.

IEEE/CAA Journal of Automatica Sinica was lunched on January 1, 2014.

Editor-in-Chief

Qing-Long Han
Editor-In-Chief

Distinguished Professor, PhD, MAE, FIEEE, FIFAC, FIEAust
Member of the Academia Europaea (The Academy of Europe)

Pro Vice-Chancellor (Research Quality)

Swinburne University of Technology
EN Building, Level 6, Room 602c
John Street, Hawthorn, Melbourne, Victoria 3122, Australia

Tel.:  +61 3 9214 3808

Fax.:  +61 9214 8264

Email: [email protected]

Articles

03 March 2025
Deep reinforcement learning (DRL) achieves success through the representational capabilities of deep neural networks (DNNs). Compared to DNNs, spiking neural networks (SNNs), known for their binary spike information processing, exhibit more biological characteristics. However, the challenge of using SNNs to simulate more biologically characteristic neuronal dynamics to optimize decision-making tasks...
03 March 2025
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the...
03 March 2025
Dear Editor, This letter deals with the stabilization of a resilient model predictive control (MPC) algorithm with a dynamic event-triggered mechanism subject to Denial-of-Service (DoS) attacks. Different from previous works, this letter is based on the designed threshold function to dynamically trigger and gives the upper bound conditions for intersampling...
03 March 2025
null...
03 March 2025
This paper presents a novel neuro-adaptive cellular immunotherapy control strategy that leverages the high efficiency and applicability of chimeric antigen receptor-engineered T (CAR-T) cells in treating cancer. The proposed real-time control strategy aims to maximize tumor regression while ensuring the safety of the treatment. A dynamic growth model of cancer...
See more at IEEE Xplore

21 January 2025
In this paper, the problem of pre-specified performance fault-tolerant cluster consensus control and fault direction identification is solved for the human-in-the-loop (HIL) swarm unmanned aerial vehicles (UAVs) in the presence of possible non-identical and unknown direction faults (NUDFs) in the yaw chan-nel. The control strategy begins with the design of...
21 January 2025
In this study, we consider a single-link flexible manipulator in the presence of an unknown Bouc-Wen type of hysteresis and intermittent actuator faults. First, an inverse hysteresis dynamics model is introduced, and then the control input is divided into an expected input and an error compensator. Second, a novel adaptive...
21 January 2025
In this paper, the attack detection problem is inves-tigated for a class of closed-loop systems subjected to unknown-but-bounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission. A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken...
20 January 2025
In this paper, we study the decentralized federated learning problem, which involves the collaborative training of a global model among multiple devices while ensuring data privacy. In classical federated learning, the communication channel between the devices poses a potential risk of compromising private information. To reduce the risk of adversary...
20 January 2025
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in...

See more at IEEE Xplore