Impulsive synchronization control for dynamic networks subject to double deception attacks
This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same a...
Saved in:
Published in | Expert systems with applications Vol. 251; p. 124000 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.10.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 0957-4174 1873-6793 |
DOI | 10.1016/j.eswa.2024.124000 |
Cover
Abstract | This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same and different attack probabilities of each node in dynamic networks are considered, respectively. A novel secure impulsive controller is introduced, mitigating malicious information from deception attacks and ensuring bounded synchronization. The average impulsive interval (AII) method is employed to relax the constraints on the upper and lower bounds of consecutive impulses, which is not adequately addressed by the previous secure impulsive control methods. Additionally, the paper establishes an upper bound for synchronization errors and proposes a method to design the AII based on attack probabilities. Finally, two numerical examples are provided to show the validity of our control approach.
•Two types of attacks are simultaneously considered.•The results ensure the uniform boundedness synchronization of coupled DNs.•No requirement on the lower/upper bounds of consecutive impulsive signals. |
---|---|
AbstractList | This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same and different attack probabilities of each node in dynamic networks are considered, respectively. A novel secure impulsive controller is introduced, mitigating malicious information from deception attacks and ensuring bounded synchronization. The average impulsive interval (AII) method is employed to relax the constraints on the upper and lower bounds of consecutive impulses, which is not adequately addressed by the previous secure impulsive control methods. Additionally, the paper establishes an upper bound for synchronization errors and proposes a method to design the AII based on attack probabilities. Finally, two numerical examples are provided to show the validity of our control approach.
•Two types of attacks are simultaneously considered.•The results ensure the uniform boundedness synchronization of coupled DNs.•No requirement on the lower/upper bounds of consecutive impulsive signals. |
ArticleNumber | 124000 |
Author | Zhang, Lingzhong Lu, Jianquan Jiang, Bangxin Zhong, Jie |
Author_xml | – sequence: 1 givenname: Lingzhong surname: Zhang fullname: Zhang, Lingzhong email: zhanglingzhong@cslg.edu.cn organization: School of Electrical Engineering and Automation, Changshu Institute of Technology, Changshu, 215500, Jiangsu, China – sequence: 2 givenname: Jianquan orcidid: 0000-0003-4423-6034 surname: Lu fullname: Lu, Jianquan email: jqluma@seu.edu.cn organization: School of Mathematics, Southeast University, Nanjing, 210096, Jiangsu, China – sequence: 3 givenname: Bangxin orcidid: 0000-0002-6900-980X surname: Jiang fullname: Jiang, Bangxin email: jiangbangxin@zjnu.edu.cn organization: School of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China – sequence: 4 givenname: Jie orcidid: 0000-0002-7196-5753 surname: Zhong fullname: Zhong, Jie email: jiezhong0615math@zjnu.edu.cn organization: School of Mathematical Sciences, Zhejiang Normal University, Jinhua, 321004, Zhejiang, China |
BookMark | eNp9kL1OwzAUhS1UJNrCCzD5BRKuE6dOJBZU8VOpEgssLJbj3AinqV3Zbqvy9KQtE0OnMxx9V_d8EzKyziIh9wxSBmz20KUY9irNIOMpyzgAXJExK0WezESVj8gYqkIknAl-QyYhdABMAIgx-VqsN9s-mB3ScLD62ztrflQ0zlLtbPSup63ztDlYtTaaWox751eBhm3doY40Otq4bd0jbVDj5gSqGJVehVty3ao-4N1fTsnny_PH_C1Zvr8u5k_LRGesiAlrhj951RaZhlLVhRZQIC_FrCg5QwWAkFcVb1mbl23JCxiarBGZzmutqyLPp6Q839XeheCxldrE04ToleklA3l0JDt5dCSPjuTZ0YBm_9CNN2vlD5ehxzOEw6idQS-DNmg1NsYPSmTjzCX8F_Z6g6A |
CitedBy_id | crossref_primary_10_1016_j_eswa_2025_127092 crossref_primary_10_3390_axioms14030161 crossref_primary_10_1007_s11071_024_10683_y crossref_primary_10_1016_j_neunet_2024_106691 crossref_primary_10_1016_j_ins_2025_121999 |
Cites_doi | 10.1002/rnc.6355 10.1016/j.eswa.2023.119918 10.1109/JAS.2020.1003297 10.1016/j.ins.2018.04.020 10.1109/TCNS.2016.2600484 10.1016/j.eswa.2022.119310 10.1007/s11071-022-07925-2 10.1109/TII.2015.2496309 10.1016/j.automatica.2015.10.002 10.1016/j.cnsns.2019.105043 10.1109/TSG.2022.3142087 10.1109/TAC.2011.2158130 10.1016/j.neunet.2022.09.025 10.1137/120897341 10.1016/j.automatica.2020.109242 10.1016/j.automatica.2010.04.005 10.1109/TSIPN.2017.2760804 10.1016/j.jmaa.2021.125171 10.1007/s11467-022-1161-6 10.1016/j.nahs.2021.101148 10.1126/science.286.5439.509 10.1016/j.ins.2023.119948 10.1109/LRA.2019.2959726 10.1038/35065725 10.1109/TCSI.2004.835655 10.1007/s11424-017-6181-x 10.1109/TCYB.2020.2982168 10.1016/j.cnsns.2022.106905 |
ContentType | Journal Article |
Copyright | 2024 Elsevier Ltd |
Copyright_xml | – notice: 2024 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.eswa.2024.124000 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1873-6793 |
ExternalDocumentID | 10_1016_j_eswa_2024_124000 S0957417424008662 |
GroupedDBID | --K --M .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABBOA ABFNM ABMAC ABMVD ABUCO ACDAQ ACGFS ACHRH ACNTT ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGUMN AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV AKRWK ALEQD ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM AXJTR BJAXD BKOJK BLXMC BNSAS CS3 DU5 EBS EFJIC EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 RIG ROL RPZ SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSL SST SSV SSZ T5K TN5 ~G- 29G AAAKG AAQXK AATTM AAXKI AAYWO AAYXX ABJNI ABKBG ABWVN ABXDB ACLOT ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CITATION EFKBS EFLBG EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ LG9 LY1 LY7 R2- SBC SET WUQ XPP ZMT ~HD |
ID | FETCH-LOGICAL-c215t-1d18749f52c08ab5c705e48765841ea00e03994f1f38f84507652d72c3bcc9533 |
IEDL.DBID | .~1 |
ISSN | 0957-4174 |
IngestDate | Thu Apr 24 23:10:47 EDT 2025 Wed Oct 01 02:34:59 EDT 2025 Tue Jun 18 08:50:57 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Synchronization Deception attacks Coupled dynamic network Secure impulsive control |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c215t-1d18749f52c08ab5c705e48765841ea00e03994f1f38f84507652d72c3bcc9533 |
ORCID | 0000-0002-6900-980X 0000-0002-7196-5753 0000-0003-4423-6034 |
ParticipantIDs | crossref_citationtrail_10_1016_j_eswa_2024_124000 crossref_primary_10_1016_j_eswa_2024_124000 elsevier_sciencedirect_doi_10_1016_j_eswa_2024_124000 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-10-01 2024-10-00 |
PublicationDateYYYYMMDD | 2024-10-01 |
PublicationDate_xml | – month: 10 year: 2024 text: 2024-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Expert systems with applications |
PublicationYear | 2024 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | He, Mo, Han, Qian (b7) 2020; 7 Li, Wang, Chen (b13) 2004; 51 Li, Wu (b14) 2016; 64 Chen, Liu, Chen, Yu (b2) 2022; 13 Zhou, Wang, Yao (b35) 2023; 111 Pasqualetti, Bicchi, Bullo (b23) 2011; 57 Wen, Yu, Yu, Lü (b28) 2017; 30 Wu, Zhang, Liu (b31) 2022; 17 Ji, Lu, Jiang, Zhong (b10) 2022; 44 Silva, Cantin, Cruz, Fonseca-Pinto, Passadouro, Dos Santos, Torres (b25) 2022; 514 Li, Ren, Chen (b12) 2022; 32 Zhang, Ma, Su, Ma (b33) 2023 Meng, Xiao, Li (b20) 2020; 122 Wu, Guo, Shi, Johansson, Shi (b30) 2017 Strogatz (b26) 2001; 410 Forti, Battistelli, Chisci, Li, Wang, Sinopoli (b5) 2017; 4 Si, Wang, Fan (b24) 2023; 215 Barabási, Albert (b1) 1999; 286 Ma, Wang, Yuan (b19) 2016 Lu, Ho, Cao (b18) 2010; 46 Dong, Liu, Zhong, Shi, Zhu (b4) 2023; 157 Wen, Hu, Hu, Shi, Chen (b27) 2015; 12 Liu, Shi, Yan, Han, Guan (b17) 2022; 70 Liang, Ding, Jing, Xie (b16) 2023 Li, Hou (b11) 2022 Wen, Zhai, Peng, Rahmani (b29) 2020; 82 Hota, Sundaram (b9) 2016; 5 Mustafa, Modares (b21) 2019; 5 Yang, Cao, Yang (b32) 2013; 51 Horn, Horn, Johnson (b8) 1994 Zhao, Tian, Zhang, Enrique (b34) 2024; 657 He, Gao, Zhong, Qian (b6) 2018; 459 Chen, Wan, Lu (b3) 2023; 117 Ni, Wang (b22) 2023; 223 Li, Wu, Chen (b15) 2020; 51 Strogatz (10.1016/j.eswa.2024.124000_b26) 2001; 410 Zhang (10.1016/j.eswa.2024.124000_b33) 2023 Lu (10.1016/j.eswa.2024.124000_b18) 2010; 46 Mustafa (10.1016/j.eswa.2024.124000_b21) 2019; 5 Li (10.1016/j.eswa.2024.124000_b14) 2016; 64 Silva (10.1016/j.eswa.2024.124000_b25) 2022; 514 Li (10.1016/j.eswa.2024.124000_b15) 2020; 51 Chen (10.1016/j.eswa.2024.124000_b2) 2022; 13 Wu (10.1016/j.eswa.2024.124000_b30) 2017 Chen (10.1016/j.eswa.2024.124000_b3) 2023; 117 Ji (10.1016/j.eswa.2024.124000_b10) 2022; 44 Forti (10.1016/j.eswa.2024.124000_b5) 2017; 4 Wen (10.1016/j.eswa.2024.124000_b29) 2020; 82 Liang (10.1016/j.eswa.2024.124000_b16) 2023 Li (10.1016/j.eswa.2024.124000_b12) 2022; 32 Yang (10.1016/j.eswa.2024.124000_b32) 2013; 51 Horn (10.1016/j.eswa.2024.124000_b8) 1994 Hota (10.1016/j.eswa.2024.124000_b9) 2016; 5 Meng (10.1016/j.eswa.2024.124000_b20) 2020; 122 Pasqualetti (10.1016/j.eswa.2024.124000_b23) 2011; 57 He (10.1016/j.eswa.2024.124000_b7) 2020; 7 Zhao (10.1016/j.eswa.2024.124000_b34) 2024; 657 Ma (10.1016/j.eswa.2024.124000_b19) 2016 Liu (10.1016/j.eswa.2024.124000_b17) 2022; 70 Wen (10.1016/j.eswa.2024.124000_b28) 2017; 30 Barabási (10.1016/j.eswa.2024.124000_b1) 1999; 286 Wen (10.1016/j.eswa.2024.124000_b27) 2015; 12 He (10.1016/j.eswa.2024.124000_b6) 2018; 459 Zhou (10.1016/j.eswa.2024.124000_b35) 2023; 111 Si (10.1016/j.eswa.2024.124000_b24) 2023; 215 Dong (10.1016/j.eswa.2024.124000_b4) 2023; 157 Li (10.1016/j.eswa.2024.124000_b11) 2022 Ni (10.1016/j.eswa.2024.124000_b22) 2023; 223 Wu (10.1016/j.eswa.2024.124000_b31) 2022; 17 Li (10.1016/j.eswa.2024.124000_b13) 2004; 51 |
References_xml | – volume: 64 start-page: 63 year: 2016 end-page: 69 ident: b14 article-title: Stability of nonlinear differential systems with state-dependent delayed impulses publication-title: Automatica – year: 2023 ident: b16 article-title: Aperiodic intermittent event-triggered synchronization control for discrete-time complex dynamical networks publication-title: Expert Systems with Applications – volume: 5 start-page: 262 year: 2016 end-page: 273 ident: b9 article-title: Interdependent security games on networks under behavioral probability weighting publication-title: IEEE Transactions on Control of Network Systems – volume: 32 start-page: 9849 year: 2022 end-page: 9868 ident: b12 article-title: Adaptive impulsive security consensus control of uncertain multi-agent systems with randomly occurring nonlinearities publication-title: International Journal of Robust and Nonlinear Control – volume: 5 start-page: 369 year: 2019 end-page: 376 ident: b21 article-title: Attack analysis and resilient control design for discrete-time distributed multi-agent systems publication-title: IEEE Robotics and Automation Letters – volume: 51 start-page: 1163 year: 2020 end-page: 1174 ident: b15 article-title: Adaptive fault-tolerant tracking control for discrete-time multiagent systems via reinforcement learning algorithm publication-title: IEEE Transactions on Cybernetics – volume: 215 year: 2023 ident: b24 article-title: Quantized control for finite-time synchronization of delayed fractional-order memristive neural networks: The Grönwall inequality approach publication-title: Expert Systems with Applications – volume: 51 start-page: 2074 year: 2004 end-page: 2087 ident: b13 article-title: Pinning a complex dynamical network to its equilibrium publication-title: IEEE Transactions on Circuits and Systems. I. Regular Papers – start-page: 3017 year: 2017 end-page: 3022 ident: b30 article-title: Optimal innovation-based deception attack on remote state estimation publication-title: 2017 American control conference – volume: 13 start-page: 1739 year: 2022 end-page: 1750 ident: b2 article-title: Multi-agent reinforcement learning for decentralized resilient secondary control of energy storage systems against DoS attacks publication-title: IEEE Transactions on Smart Grid – start-page: 21 year: 2016 end-page: 26 ident: b19 article-title: Consensus control for nonlinear multi-agent systems subject to deception attacks publication-title: 2016 22nd international conference on automation and computing – volume: 7 start-page: 1326 year: 2020 end-page: 1334 ident: b7 article-title: Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks publication-title: IEEE/CAA Journal of Automatica Sinica – volume: 57 start-page: 90 year: 2011 end-page: 104 ident: b23 article-title: Consensus computation in unreliable networks: A system theoretic approach publication-title: IEEE Transactions on Automatic Control – volume: 51 start-page: 3486 year: 2013 end-page: 3510 ident: b32 article-title: Synchronization of coupled reaction-diffusion neural networks with time-varying delays via pinning-impulsive controller publication-title: SIAM Journal on Control and Optimization – volume: 157 start-page: 54 year: 2023 end-page: 64 ident: b4 article-title: Practical synchronization of neural networks with delayed impulses and external disturbance via hybrid control publication-title: Neural Networks – volume: 117 year: 2023 ident: b3 article-title: Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks publication-title: Communications in Nonlinear Science and Numerical Simulation – year: 2022 ident: b11 article-title: Distributed model-free adaptive control for MIMO nonlinear multiagent systems under deception attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems – year: 2023 ident: b33 article-title: Impulsive consensus of one-sided Lipschitz multi-agent systems with deception attacks and stochastic perturbation publication-title: IEEE Transactions on Artificial Intelligence – volume: 12 start-page: 69 year: 2015 end-page: 78 ident: b27 article-title: Frequency regulation of source-grid-load systems: A compound control strategy publication-title: IEEE Transactions on Industrial Informatics – volume: 17 start-page: 31504 year: 2022 ident: b31 article-title: Understanding the mechanisms of brain functions from the angle of synchronization and complex network publication-title: Frontiers of Physics – volume: 514 year: 2022 ident: b25 article-title: Complex network model for COVID-19: Human behavior, pseudo-periodic solutions and multiple epidemic waves publication-title: Journal of Mathematical Analysis and Applications – volume: 286 start-page: 509 year: 1999 end-page: 512 ident: b1 article-title: Emergence of scaling in random networks publication-title: Science – volume: 4 start-page: 96 year: 2017 end-page: 110 ident: b5 article-title: Distributed joint attack detection and secure state estimation publication-title: IEEE Transactions on Signal and Information Processing over Networks – volume: 46 start-page: 1215 year: 2010 end-page: 1221 ident: b18 article-title: A unified synchronization criterion for impulsive dynamical networks publication-title: Automatica – volume: 459 start-page: 354 year: 2018 end-page: 368 ident: b6 article-title: Secure impulsive synchronization control of multi-agent systems under deception attacks publication-title: Information Sciences – year: 1994 ident: b8 article-title: Topics in matrix analysis – volume: 44 year: 2022 ident: b10 article-title: Network synchronization under distributed delayed impulsive control: Average delayed impulsive weight approach publication-title: Nonlinear Analysis. Hybrid Systems – volume: 30 start-page: 46 year: 2017 end-page: 67 ident: b28 article-title: Complex cyber-physical networks: From cybersecurity to security control publication-title: Journal of Systems Science and Complexity – volume: 82 year: 2020 ident: b29 article-title: Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control publication-title: Communications in Nonlinear Science and Numerical Simulation – volume: 111 start-page: 2443 year: 2023 end-page: 2462 ident: b35 article-title: Quasi-synchronization of stochastic memristive neural networks subject to deception attacks publication-title: Nonlinear Dynamics – volume: 70 start-page: 166 year: 2022 end-page: 170 ident: b17 article-title: Secure consensus of multiagent systems via impulsive control subject to deception attacks publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs – volume: 223 year: 2023 ident: b22 article-title: Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional publication-title: Expert Systems with Applications – volume: 410 start-page: 268 year: 2001 end-page: 276 ident: b26 article-title: Exploring complex networks publication-title: Nature – volume: 122 year: 2020 ident: b20 article-title: Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks publication-title: Automatica – volume: 657 year: 2024 ident: b34 article-title: Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method publication-title: Information Sciences – volume: 32 start-page: 9849 issue: 18 year: 2022 ident: 10.1016/j.eswa.2024.124000_b12 article-title: Adaptive impulsive security consensus control of uncertain multi-agent systems with randomly occurring nonlinearities publication-title: International Journal of Robust and Nonlinear Control doi: 10.1002/rnc.6355 – volume: 223 year: 2023 ident: 10.1016/j.eswa.2024.124000_b22 article-title: Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.119918 – volume: 7 start-page: 1326 issue: 5 year: 2020 ident: 10.1016/j.eswa.2024.124000_b7 article-title: Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks publication-title: IEEE/CAA Journal of Automatica Sinica doi: 10.1109/JAS.2020.1003297 – volume: 459 start-page: 354 year: 2018 ident: 10.1016/j.eswa.2024.124000_b6 article-title: Secure impulsive synchronization control of multi-agent systems under deception attacks publication-title: Information Sciences doi: 10.1016/j.ins.2018.04.020 – volume: 5 start-page: 262 issue: 1 year: 2016 ident: 10.1016/j.eswa.2024.124000_b9 article-title: Interdependent security games on networks under behavioral probability weighting publication-title: IEEE Transactions on Control of Network Systems doi: 10.1109/TCNS.2016.2600484 – volume: 215 year: 2023 ident: 10.1016/j.eswa.2024.124000_b24 article-title: Quantized control for finite-time synchronization of delayed fractional-order memristive neural networks: The Grönwall inequality approach publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2022.119310 – volume: 111 start-page: 2443 year: 2023 ident: 10.1016/j.eswa.2024.124000_b35 article-title: Quasi-synchronization of stochastic memristive neural networks subject to deception attacks publication-title: Nonlinear Dynamics doi: 10.1007/s11071-022-07925-2 – volume: 12 start-page: 69 issue: 1 year: 2015 ident: 10.1016/j.eswa.2024.124000_b27 article-title: Frequency regulation of source-grid-load systems: A compound control strategy publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2015.2496309 – volume: 64 start-page: 63 year: 2016 ident: 10.1016/j.eswa.2024.124000_b14 article-title: Stability of nonlinear differential systems with state-dependent delayed impulses publication-title: Automatica doi: 10.1016/j.automatica.2015.10.002 – volume: 82 year: 2020 ident: 10.1016/j.eswa.2024.124000_b29 article-title: Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control publication-title: Communications in Nonlinear Science and Numerical Simulation doi: 10.1016/j.cnsns.2019.105043 – year: 2023 ident: 10.1016/j.eswa.2024.124000_b16 article-title: Aperiodic intermittent event-triggered synchronization control for discrete-time complex dynamical networks publication-title: Expert Systems with Applications – volume: 13 start-page: 1739 issue: 3 year: 2022 ident: 10.1016/j.eswa.2024.124000_b2 article-title: Multi-agent reinforcement learning for decentralized resilient secondary control of energy storage systems against DoS attacks publication-title: IEEE Transactions on Smart Grid doi: 10.1109/TSG.2022.3142087 – start-page: 3017 year: 2017 ident: 10.1016/j.eswa.2024.124000_b30 article-title: Optimal innovation-based deception attack on remote state estimation – volume: 57 start-page: 90 issue: 1 year: 2011 ident: 10.1016/j.eswa.2024.124000_b23 article-title: Consensus computation in unreliable networks: A system theoretic approach publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2011.2158130 – volume: 157 start-page: 54 year: 2023 ident: 10.1016/j.eswa.2024.124000_b4 article-title: Practical synchronization of neural networks with delayed impulses and external disturbance via hybrid control publication-title: Neural Networks doi: 10.1016/j.neunet.2022.09.025 – volume: 51 start-page: 3486 issue: 5 year: 2013 ident: 10.1016/j.eswa.2024.124000_b32 article-title: Synchronization of coupled reaction-diffusion neural networks with time-varying delays via pinning-impulsive controller publication-title: SIAM Journal on Control and Optimization doi: 10.1137/120897341 – volume: 122 year: 2020 ident: 10.1016/j.eswa.2024.124000_b20 article-title: Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks publication-title: Automatica doi: 10.1016/j.automatica.2020.109242 – volume: 70 start-page: 166 issue: 1 year: 2022 ident: 10.1016/j.eswa.2024.124000_b17 article-title: Secure consensus of multiagent systems via impulsive control subject to deception attacks publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs – start-page: 21 year: 2016 ident: 10.1016/j.eswa.2024.124000_b19 article-title: Consensus control for nonlinear multi-agent systems subject to deception attacks – volume: 46 start-page: 1215 issue: 7 year: 2010 ident: 10.1016/j.eswa.2024.124000_b18 article-title: A unified synchronization criterion for impulsive dynamical networks publication-title: Automatica doi: 10.1016/j.automatica.2010.04.005 – year: 2023 ident: 10.1016/j.eswa.2024.124000_b33 article-title: Impulsive consensus of one-sided Lipschitz multi-agent systems with deception attacks and stochastic perturbation publication-title: IEEE Transactions on Artificial Intelligence – volume: 4 start-page: 96 issue: 1 year: 2017 ident: 10.1016/j.eswa.2024.124000_b5 article-title: Distributed joint attack detection and secure state estimation publication-title: IEEE Transactions on Signal and Information Processing over Networks doi: 10.1109/TSIPN.2017.2760804 – year: 2022 ident: 10.1016/j.eswa.2024.124000_b11 article-title: Distributed model-free adaptive control for MIMO nonlinear multiagent systems under deception attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems – volume: 514 issue: 2 year: 2022 ident: 10.1016/j.eswa.2024.124000_b25 article-title: Complex network model for COVID-19: Human behavior, pseudo-periodic solutions and multiple epidemic waves publication-title: Journal of Mathematical Analysis and Applications doi: 10.1016/j.jmaa.2021.125171 – volume: 17 start-page: 31504 issue: 3 year: 2022 ident: 10.1016/j.eswa.2024.124000_b31 article-title: Understanding the mechanisms of brain functions from the angle of synchronization and complex network publication-title: Frontiers of Physics doi: 10.1007/s11467-022-1161-6 – volume: 44 year: 2022 ident: 10.1016/j.eswa.2024.124000_b10 article-title: Network synchronization under distributed delayed impulsive control: Average delayed impulsive weight approach publication-title: Nonlinear Analysis. Hybrid Systems doi: 10.1016/j.nahs.2021.101148 – volume: 286 start-page: 509 issue: 5439 year: 1999 ident: 10.1016/j.eswa.2024.124000_b1 article-title: Emergence of scaling in random networks publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 657 year: 2024 ident: 10.1016/j.eswa.2024.124000_b34 article-title: Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method publication-title: Information Sciences doi: 10.1016/j.ins.2023.119948 – volume: 5 start-page: 369 issue: 2 year: 2019 ident: 10.1016/j.eswa.2024.124000_b21 article-title: Attack analysis and resilient control design for discrete-time distributed multi-agent systems publication-title: IEEE Robotics and Automation Letters doi: 10.1109/LRA.2019.2959726 – volume: 410 start-page: 268 issue: 6825 year: 2001 ident: 10.1016/j.eswa.2024.124000_b26 article-title: Exploring complex networks publication-title: Nature doi: 10.1038/35065725 – volume: 51 start-page: 2074 issue: 10 year: 2004 ident: 10.1016/j.eswa.2024.124000_b13 article-title: Pinning a complex dynamical network to its equilibrium publication-title: IEEE Transactions on Circuits and Systems. I. Regular Papers doi: 10.1109/TCSI.2004.835655 – volume: 30 start-page: 46 issue: 1 year: 2017 ident: 10.1016/j.eswa.2024.124000_b28 article-title: Complex cyber-physical networks: From cybersecurity to security control publication-title: Journal of Systems Science and Complexity doi: 10.1007/s11424-017-6181-x – year: 1994 ident: 10.1016/j.eswa.2024.124000_b8 – volume: 51 start-page: 1163 issue: 3 year: 2020 ident: 10.1016/j.eswa.2024.124000_b15 article-title: Adaptive fault-tolerant tracking control for discrete-time multiagent systems via reinforcement learning algorithm publication-title: IEEE Transactions on Cybernetics doi: 10.1109/TCYB.2020.2982168 – volume: 117 year: 2023 ident: 10.1016/j.eswa.2024.124000_b3 article-title: Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks publication-title: Communications in Nonlinear Science and Numerical Simulation doi: 10.1016/j.cnsns.2022.106905 |
SSID | ssj0017007 |
Score | 2.4476154 |
Snippet | This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 124000 |
SubjectTerms | Coupled dynamic network Deception attacks Secure impulsive control Synchronization |
Title | Impulsive synchronization control for dynamic networks subject to double deception attacks |
URI | https://dx.doi.org/10.1016/j.eswa.2024.124000 |
Volume | 251 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1873-6793 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 issn: 0957-4174 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1873-6793 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 issn: 0957-4174 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection customDbUrl: eissn: 1873-6793 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 issn: 0957-4174 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1873-6793 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 issn: 0957-4174 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1873-6793 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 issn: 0957-4174 databaseCode: AKRWK dateStart: 19900101 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4Lc6PkYM3yda0Sdsdx3BsirvoYHgpzRdMRjdch3jxbzevSYeC7OCxIa-Ul-Tl98rv_R5Ctz0eJiLUnORBzgmTMSWCCkMsGEhUKm3KQaHe-WkSj6bsYcZnDTSoa2GAVuljv4vpVbT2I13vze5qPu8-W3Bgr0Ob2jHA5VUcBvUvu6c7X1uaB8jPJU5vLyEw2xfOOI6XXn-A9lDIOhTeEvx9Of24cIZH6MAjRdx3H3OMGro4QYd1FwbsD-Upeh3bkQWw0PH6s5CV2K2rrcSeh44tMMXKtZ7HheN9r_F6I-AfDC6XWC03YqGx0p7jgvOyhNr7MzQd3r8MRsR3TCDWq7wkVEGLvZ7hoQzSXHCZBFzblARgBtV5EOjAAhJmqIlSkzK7HjEPVRLKSEgJRNNz1CyWhb5AmOUmZkoxpm0KGUY6NRwI-xEzYR5pRluI1q7KpJcTh64Wi6zmjb1l4N4M3Js597bQ3dZm5cQ0ds7m9Qpkv7ZEZqP9DrvLf9pdoX14cky9a9Qs3zf6xiKOUrSrLdVGe_3x42jyDeEx1XY |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwEBYhGdql79L0qaFbcWPJku2MITQkzWNpAqGLsR6GluCE2qH031cXyaGFkqGrrDPmk3z6zv7uDqH7NqeRoJp7qZ9yj8mQeIKIzDNkIFKxNCEHgXzn8STsz9jznM9rqFvlwoCs0vl-69M33tqNtByardXbW-vFkANzHJrQjgEvBz_cYNz45DpqdAbD_mT7MyHybda0me-BgcudsTIvXXxC-SHKHgncyP_7fPpx5vSO0IEji7hjn-cY1XR-gg6rRgzYvZen6HVgRhYgRMfFVy439W5teiV2UnRsuClWtvs8zq30u8DFWsBnGFwusVquxUJjpZ3MBadlCen3Z2jWe5p2-55rmuAZYHnpEQVd9toZp9KPU8Fl5HNtohJgGkSnvq99w0lYRrIgzmJmliTkVEVUBkJK0Jqeo3q-zPUFwizNQqYUY9pEkTTQccZBsx-wjKaBZqSJSAVVIl1FcWhssUgq6dh7AvAmAG9i4W2ih63NytbT2DmbVyuQ_NoViXH4O-wu_2l3h_b60_EoGQ0mwyu0D1escO8a1cuPtb4xBKQUt26DfQMxYtgh |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Impulsive+synchronization+control+for+dynamic+networks+subject+to+double+deception+attacks&rft.jtitle=Expert+systems+with+applications&rft.au=Zhang%2C+Lingzhong&rft.au=Lu%2C+Jianquan&rft.au=Jiang%2C+Bangxin&rft.au=Zhong%2C+Jie&rft.date=2024-10-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.eissn=1873-6793&rft.volume=251&rft_id=info:doi/10.1016%2Fj.eswa.2024.124000&rft.externalDocID=S0957417424008662 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon |