Abstract: This article investigates the problem of attack detection for cyber-physical systems with input constraints in the presence of command and sensor attacks. For detecting a wider range of ...