Impulsive synchronization control for dynamic networks subject to double deception attacks

This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same a...

Full description

Saved in:
Bibliographic Details
Published inExpert systems with applications Vol. 251; p. 124000
Main Authors Zhang, Lingzhong, Lu, Jianquan, Jiang, Bangxin, Zhong, Jie
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.10.2024
Subjects
Online AccessGet full text
ISSN0957-4174
1873-6793
DOI10.1016/j.eswa.2024.124000

Cover

Abstract This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same and different attack probabilities of each node in dynamic networks are considered, respectively. A novel secure impulsive controller is introduced, mitigating malicious information from deception attacks and ensuring bounded synchronization. The average impulsive interval (AII) method is employed to relax the constraints on the upper and lower bounds of consecutive impulses, which is not adequately addressed by the previous secure impulsive control methods. Additionally, the paper establishes an upper bound for synchronization errors and proposes a method to design the AII based on attack probabilities. Finally, two numerical examples are provided to show the validity of our control approach. •Two types of attacks are simultaneously considered.•The results ensure the uniform boundedness synchronization of coupled DNs.•No requirement on the lower/upper bounds of consecutive impulsive signals.
AbstractList This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are considered in both the controller-to-actuator and sensor-to-controller communication channels and modeled as Bernoulli distributions. The same and different attack probabilities of each node in dynamic networks are considered, respectively. A novel secure impulsive controller is introduced, mitigating malicious information from deception attacks and ensuring bounded synchronization. The average impulsive interval (AII) method is employed to relax the constraints on the upper and lower bounds of consecutive impulses, which is not adequately addressed by the previous secure impulsive control methods. Additionally, the paper establishes an upper bound for synchronization errors and proposes a method to design the AII based on attack probabilities. Finally, two numerical examples are provided to show the validity of our control approach. •Two types of attacks are simultaneously considered.•The results ensure the uniform boundedness synchronization of coupled DNs.•No requirement on the lower/upper bounds of consecutive impulsive signals.
ArticleNumber 124000
Author Zhang, Lingzhong
Lu, Jianquan
Jiang, Bangxin
Zhong, Jie
Author_xml – sequence: 1
  givenname: Lingzhong
  surname: Zhang
  fullname: Zhang, Lingzhong
  email: zhanglingzhong@cslg.edu.cn
  organization: School of Electrical Engineering and Automation, Changshu Institute of Technology, Changshu, 215500, Jiangsu, China
– sequence: 2
  givenname: Jianquan
  orcidid: 0000-0003-4423-6034
  surname: Lu
  fullname: Lu, Jianquan
  email: jqluma@seu.edu.cn
  organization: School of Mathematics, Southeast University, Nanjing, 210096, Jiangsu, China
– sequence: 3
  givenname: Bangxin
  orcidid: 0000-0002-6900-980X
  surname: Jiang
  fullname: Jiang, Bangxin
  email: jiangbangxin@zjnu.edu.cn
  organization: School of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
– sequence: 4
  givenname: Jie
  orcidid: 0000-0002-7196-5753
  surname: Zhong
  fullname: Zhong, Jie
  email: jiezhong0615math@zjnu.edu.cn
  organization: School of Mathematical Sciences, Zhejiang Normal University, Jinhua, 321004, Zhejiang, China
BookMark eNp9kL1OwzAUhS1UJNrCCzD5BRKuE6dOJBZU8VOpEgssLJbj3AinqV3Zbqvy9KQtE0OnMxx9V_d8EzKyziIh9wxSBmz20KUY9irNIOMpyzgAXJExK0WezESVj8gYqkIknAl-QyYhdABMAIgx-VqsN9s-mB3ScLD62ztrflQ0zlLtbPSup63ztDlYtTaaWox751eBhm3doY40Otq4bd0jbVDj5gSqGJVehVty3ao-4N1fTsnny_PH_C1Zvr8u5k_LRGesiAlrhj951RaZhlLVhRZQIC_FrCg5QwWAkFcVb1mbl23JCxiarBGZzmutqyLPp6Q839XeheCxldrE04ToleklA3l0JDt5dCSPjuTZ0YBm_9CNN2vlD5ehxzOEw6idQS-DNmg1NsYPSmTjzCX8F_Z6g6A
CitedBy_id crossref_primary_10_1016_j_eswa_2025_127092
crossref_primary_10_3390_axioms14030161
crossref_primary_10_1007_s11071_024_10683_y
crossref_primary_10_1016_j_neunet_2024_106691
crossref_primary_10_1016_j_ins_2025_121999
Cites_doi 10.1002/rnc.6355
10.1016/j.eswa.2023.119918
10.1109/JAS.2020.1003297
10.1016/j.ins.2018.04.020
10.1109/TCNS.2016.2600484
10.1016/j.eswa.2022.119310
10.1007/s11071-022-07925-2
10.1109/TII.2015.2496309
10.1016/j.automatica.2015.10.002
10.1016/j.cnsns.2019.105043
10.1109/TSG.2022.3142087
10.1109/TAC.2011.2158130
10.1016/j.neunet.2022.09.025
10.1137/120897341
10.1016/j.automatica.2020.109242
10.1016/j.automatica.2010.04.005
10.1109/TSIPN.2017.2760804
10.1016/j.jmaa.2021.125171
10.1007/s11467-022-1161-6
10.1016/j.nahs.2021.101148
10.1126/science.286.5439.509
10.1016/j.ins.2023.119948
10.1109/LRA.2019.2959726
10.1038/35065725
10.1109/TCSI.2004.835655
10.1007/s11424-017-6181-x
10.1109/TCYB.2020.2982168
10.1016/j.cnsns.2022.106905
ContentType Journal Article
Copyright 2024 Elsevier Ltd
Copyright_xml – notice: 2024 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.eswa.2024.124000
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1873-6793
ExternalDocumentID 10_1016_j_eswa_2024_124000
S0957417424008662
GroupedDBID --K
--M
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABMVD
ABUCO
ACDAQ
ACGFS
ACHRH
ACNTT
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGUMN
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
AXJTR
BJAXD
BKOJK
BLXMC
BNSAS
CS3
DU5
EBS
EFJIC
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSL
SST
SSV
SSZ
T5K
TN5
~G-
29G
AAAKG
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABKBG
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
EFLBG
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
LG9
LY1
LY7
R2-
SBC
SET
WUQ
XPP
ZMT
~HD
ID FETCH-LOGICAL-c215t-1d18749f52c08ab5c705e48765841ea00e03994f1f38f84507652d72c3bcc9533
IEDL.DBID .~1
ISSN 0957-4174
IngestDate Thu Apr 24 23:10:47 EDT 2025
Wed Oct 01 02:34:59 EDT 2025
Tue Jun 18 08:50:57 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Synchronization
Deception attacks
Coupled dynamic network
Secure impulsive control
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c215t-1d18749f52c08ab5c705e48765841ea00e03994f1f38f84507652d72c3bcc9533
ORCID 0000-0002-6900-980X
0000-0002-7196-5753
0000-0003-4423-6034
ParticipantIDs crossref_citationtrail_10_1016_j_eswa_2024_124000
crossref_primary_10_1016_j_eswa_2024_124000
elsevier_sciencedirect_doi_10_1016_j_eswa_2024_124000
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-10-01
2024-10-00
PublicationDateYYYYMMDD 2024-10-01
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-10-01
  day: 01
PublicationDecade 2020
PublicationTitle Expert systems with applications
PublicationYear 2024
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References He, Mo, Han, Qian (b7) 2020; 7
Li, Wang, Chen (b13) 2004; 51
Li, Wu (b14) 2016; 64
Chen, Liu, Chen, Yu (b2) 2022; 13
Zhou, Wang, Yao (b35) 2023; 111
Pasqualetti, Bicchi, Bullo (b23) 2011; 57
Wen, Yu, Yu, Lü (b28) 2017; 30
Wu, Zhang, Liu (b31) 2022; 17
Ji, Lu, Jiang, Zhong (b10) 2022; 44
Silva, Cantin, Cruz, Fonseca-Pinto, Passadouro, Dos Santos, Torres (b25) 2022; 514
Li, Ren, Chen (b12) 2022; 32
Zhang, Ma, Su, Ma (b33) 2023
Meng, Xiao, Li (b20) 2020; 122
Wu, Guo, Shi, Johansson, Shi (b30) 2017
Strogatz (b26) 2001; 410
Forti, Battistelli, Chisci, Li, Wang, Sinopoli (b5) 2017; 4
Si, Wang, Fan (b24) 2023; 215
Barabási, Albert (b1) 1999; 286
Ma, Wang, Yuan (b19) 2016
Lu, Ho, Cao (b18) 2010; 46
Dong, Liu, Zhong, Shi, Zhu (b4) 2023; 157
Wen, Hu, Hu, Shi, Chen (b27) 2015; 12
Liu, Shi, Yan, Han, Guan (b17) 2022; 70
Liang, Ding, Jing, Xie (b16) 2023
Li, Hou (b11) 2022
Wen, Zhai, Peng, Rahmani (b29) 2020; 82
Hota, Sundaram (b9) 2016; 5
Mustafa, Modares (b21) 2019; 5
Yang, Cao, Yang (b32) 2013; 51
Horn, Horn, Johnson (b8) 1994
Zhao, Tian, Zhang, Enrique (b34) 2024; 657
He, Gao, Zhong, Qian (b6) 2018; 459
Chen, Wan, Lu (b3) 2023; 117
Ni, Wang (b22) 2023; 223
Li, Wu, Chen (b15) 2020; 51
Strogatz (10.1016/j.eswa.2024.124000_b26) 2001; 410
Zhang (10.1016/j.eswa.2024.124000_b33) 2023
Lu (10.1016/j.eswa.2024.124000_b18) 2010; 46
Mustafa (10.1016/j.eswa.2024.124000_b21) 2019; 5
Li (10.1016/j.eswa.2024.124000_b14) 2016; 64
Silva (10.1016/j.eswa.2024.124000_b25) 2022; 514
Li (10.1016/j.eswa.2024.124000_b15) 2020; 51
Chen (10.1016/j.eswa.2024.124000_b2) 2022; 13
Wu (10.1016/j.eswa.2024.124000_b30) 2017
Chen (10.1016/j.eswa.2024.124000_b3) 2023; 117
Ji (10.1016/j.eswa.2024.124000_b10) 2022; 44
Forti (10.1016/j.eswa.2024.124000_b5) 2017; 4
Wen (10.1016/j.eswa.2024.124000_b29) 2020; 82
Liang (10.1016/j.eswa.2024.124000_b16) 2023
Li (10.1016/j.eswa.2024.124000_b12) 2022; 32
Yang (10.1016/j.eswa.2024.124000_b32) 2013; 51
Horn (10.1016/j.eswa.2024.124000_b8) 1994
Hota (10.1016/j.eswa.2024.124000_b9) 2016; 5
Meng (10.1016/j.eswa.2024.124000_b20) 2020; 122
Pasqualetti (10.1016/j.eswa.2024.124000_b23) 2011; 57
He (10.1016/j.eswa.2024.124000_b7) 2020; 7
Zhao (10.1016/j.eswa.2024.124000_b34) 2024; 657
Ma (10.1016/j.eswa.2024.124000_b19) 2016
Liu (10.1016/j.eswa.2024.124000_b17) 2022; 70
Wen (10.1016/j.eswa.2024.124000_b28) 2017; 30
Barabási (10.1016/j.eswa.2024.124000_b1) 1999; 286
Wen (10.1016/j.eswa.2024.124000_b27) 2015; 12
He (10.1016/j.eswa.2024.124000_b6) 2018; 459
Zhou (10.1016/j.eswa.2024.124000_b35) 2023; 111
Si (10.1016/j.eswa.2024.124000_b24) 2023; 215
Dong (10.1016/j.eswa.2024.124000_b4) 2023; 157
Li (10.1016/j.eswa.2024.124000_b11) 2022
Ni (10.1016/j.eswa.2024.124000_b22) 2023; 223
Wu (10.1016/j.eswa.2024.124000_b31) 2022; 17
Li (10.1016/j.eswa.2024.124000_b13) 2004; 51
References_xml – volume: 64
  start-page: 63
  year: 2016
  end-page: 69
  ident: b14
  article-title: Stability of nonlinear differential systems with state-dependent delayed impulses
  publication-title: Automatica
– year: 2023
  ident: b16
  article-title: Aperiodic intermittent event-triggered synchronization control for discrete-time complex dynamical networks
  publication-title: Expert Systems with Applications
– volume: 5
  start-page: 262
  year: 2016
  end-page: 273
  ident: b9
  article-title: Interdependent security games on networks under behavioral probability weighting
  publication-title: IEEE Transactions on Control of Network Systems
– volume: 32
  start-page: 9849
  year: 2022
  end-page: 9868
  ident: b12
  article-title: Adaptive impulsive security consensus control of uncertain multi-agent systems with randomly occurring nonlinearities
  publication-title: International Journal of Robust and Nonlinear Control
– volume: 5
  start-page: 369
  year: 2019
  end-page: 376
  ident: b21
  article-title: Attack analysis and resilient control design for discrete-time distributed multi-agent systems
  publication-title: IEEE Robotics and Automation Letters
– volume: 51
  start-page: 1163
  year: 2020
  end-page: 1174
  ident: b15
  article-title: Adaptive fault-tolerant tracking control for discrete-time multiagent systems via reinforcement learning algorithm
  publication-title: IEEE Transactions on Cybernetics
– volume: 215
  year: 2023
  ident: b24
  article-title: Quantized control for finite-time synchronization of delayed fractional-order memristive neural networks: The Grönwall inequality approach
  publication-title: Expert Systems with Applications
– volume: 51
  start-page: 2074
  year: 2004
  end-page: 2087
  ident: b13
  article-title: Pinning a complex dynamical network to its equilibrium
  publication-title: IEEE Transactions on Circuits and Systems. I. Regular Papers
– start-page: 3017
  year: 2017
  end-page: 3022
  ident: b30
  article-title: Optimal innovation-based deception attack on remote state estimation
  publication-title: 2017 American control conference
– volume: 13
  start-page: 1739
  year: 2022
  end-page: 1750
  ident: b2
  article-title: Multi-agent reinforcement learning for decentralized resilient secondary control of energy storage systems against DoS attacks
  publication-title: IEEE Transactions on Smart Grid
– start-page: 21
  year: 2016
  end-page: 26
  ident: b19
  article-title: Consensus control for nonlinear multi-agent systems subject to deception attacks
  publication-title: 2016 22nd international conference on automation and computing
– volume: 7
  start-page: 1326
  year: 2020
  end-page: 1334
  ident: b7
  article-title: Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks
  publication-title: IEEE/CAA Journal of Automatica Sinica
– volume: 57
  start-page: 90
  year: 2011
  end-page: 104
  ident: b23
  article-title: Consensus computation in unreliable networks: A system theoretic approach
  publication-title: IEEE Transactions on Automatic Control
– volume: 51
  start-page: 3486
  year: 2013
  end-page: 3510
  ident: b32
  article-title: Synchronization of coupled reaction-diffusion neural networks with time-varying delays via pinning-impulsive controller
  publication-title: SIAM Journal on Control and Optimization
– volume: 157
  start-page: 54
  year: 2023
  end-page: 64
  ident: b4
  article-title: Practical synchronization of neural networks with delayed impulses and external disturbance via hybrid control
  publication-title: Neural Networks
– volume: 117
  year: 2023
  ident: b3
  article-title: Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks
  publication-title: Communications in Nonlinear Science and Numerical Simulation
– year: 2022
  ident: b11
  article-title: Distributed model-free adaptive control for MIMO nonlinear multiagent systems under deception attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
– year: 2023
  ident: b33
  article-title: Impulsive consensus of one-sided Lipschitz multi-agent systems with deception attacks and stochastic perturbation
  publication-title: IEEE Transactions on Artificial Intelligence
– volume: 12
  start-page: 69
  year: 2015
  end-page: 78
  ident: b27
  article-title: Frequency regulation of source-grid-load systems: A compound control strategy
  publication-title: IEEE Transactions on Industrial Informatics
– volume: 17
  start-page: 31504
  year: 2022
  ident: b31
  article-title: Understanding the mechanisms of brain functions from the angle of synchronization and complex network
  publication-title: Frontiers of Physics
– volume: 514
  year: 2022
  ident: b25
  article-title: Complex network model for COVID-19: Human behavior, pseudo-periodic solutions and multiple epidemic waves
  publication-title: Journal of Mathematical Analysis and Applications
– volume: 286
  start-page: 509
  year: 1999
  end-page: 512
  ident: b1
  article-title: Emergence of scaling in random networks
  publication-title: Science
– volume: 4
  start-page: 96
  year: 2017
  end-page: 110
  ident: b5
  article-title: Distributed joint attack detection and secure state estimation
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
– volume: 46
  start-page: 1215
  year: 2010
  end-page: 1221
  ident: b18
  article-title: A unified synchronization criterion for impulsive dynamical networks
  publication-title: Automatica
– volume: 459
  start-page: 354
  year: 2018
  end-page: 368
  ident: b6
  article-title: Secure impulsive synchronization control of multi-agent systems under deception attacks
  publication-title: Information Sciences
– year: 1994
  ident: b8
  article-title: Topics in matrix analysis
– volume: 44
  year: 2022
  ident: b10
  article-title: Network synchronization under distributed delayed impulsive control: Average delayed impulsive weight approach
  publication-title: Nonlinear Analysis. Hybrid Systems
– volume: 30
  start-page: 46
  year: 2017
  end-page: 67
  ident: b28
  article-title: Complex cyber-physical networks: From cybersecurity to security control
  publication-title: Journal of Systems Science and Complexity
– volume: 82
  year: 2020
  ident: b29
  article-title: Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control
  publication-title: Communications in Nonlinear Science and Numerical Simulation
– volume: 111
  start-page: 2443
  year: 2023
  end-page: 2462
  ident: b35
  article-title: Quasi-synchronization of stochastic memristive neural networks subject to deception attacks
  publication-title: Nonlinear Dynamics
– volume: 70
  start-page: 166
  year: 2022
  end-page: 170
  ident: b17
  article-title: Secure consensus of multiagent systems via impulsive control subject to deception attacks
  publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs
– volume: 223
  year: 2023
  ident: b22
  article-title: Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional
  publication-title: Expert Systems with Applications
– volume: 410
  start-page: 268
  year: 2001
  end-page: 276
  ident: b26
  article-title: Exploring complex networks
  publication-title: Nature
– volume: 122
  year: 2020
  ident: b20
  article-title: Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks
  publication-title: Automatica
– volume: 657
  year: 2024
  ident: b34
  article-title: Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method
  publication-title: Information Sciences
– volume: 32
  start-page: 9849
  issue: 18
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b12
  article-title: Adaptive impulsive security consensus control of uncertain multi-agent systems with randomly occurring nonlinearities
  publication-title: International Journal of Robust and Nonlinear Control
  doi: 10.1002/rnc.6355
– volume: 223
  year: 2023
  ident: 10.1016/j.eswa.2024.124000_b22
  article-title: Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.119918
– volume: 7
  start-page: 1326
  issue: 5
  year: 2020
  ident: 10.1016/j.eswa.2024.124000_b7
  article-title: Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks
  publication-title: IEEE/CAA Journal of Automatica Sinica
  doi: 10.1109/JAS.2020.1003297
– volume: 459
  start-page: 354
  year: 2018
  ident: 10.1016/j.eswa.2024.124000_b6
  article-title: Secure impulsive synchronization control of multi-agent systems under deception attacks
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2018.04.020
– volume: 5
  start-page: 262
  issue: 1
  year: 2016
  ident: 10.1016/j.eswa.2024.124000_b9
  article-title: Interdependent security games on networks under behavioral probability weighting
  publication-title: IEEE Transactions on Control of Network Systems
  doi: 10.1109/TCNS.2016.2600484
– volume: 215
  year: 2023
  ident: 10.1016/j.eswa.2024.124000_b24
  article-title: Quantized control for finite-time synchronization of delayed fractional-order memristive neural networks: The Grönwall inequality approach
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2022.119310
– volume: 111
  start-page: 2443
  year: 2023
  ident: 10.1016/j.eswa.2024.124000_b35
  article-title: Quasi-synchronization of stochastic memristive neural networks subject to deception attacks
  publication-title: Nonlinear Dynamics
  doi: 10.1007/s11071-022-07925-2
– volume: 12
  start-page: 69
  issue: 1
  year: 2015
  ident: 10.1016/j.eswa.2024.124000_b27
  article-title: Frequency regulation of source-grid-load systems: A compound control strategy
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2015.2496309
– volume: 64
  start-page: 63
  year: 2016
  ident: 10.1016/j.eswa.2024.124000_b14
  article-title: Stability of nonlinear differential systems with state-dependent delayed impulses
  publication-title: Automatica
  doi: 10.1016/j.automatica.2015.10.002
– volume: 82
  year: 2020
  ident: 10.1016/j.eswa.2024.124000_b29
  article-title: Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control
  publication-title: Communications in Nonlinear Science and Numerical Simulation
  doi: 10.1016/j.cnsns.2019.105043
– year: 2023
  ident: 10.1016/j.eswa.2024.124000_b16
  article-title: Aperiodic intermittent event-triggered synchronization control for discrete-time complex dynamical networks
  publication-title: Expert Systems with Applications
– volume: 13
  start-page: 1739
  issue: 3
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b2
  article-title: Multi-agent reinforcement learning for decentralized resilient secondary control of energy storage systems against DoS attacks
  publication-title: IEEE Transactions on Smart Grid
  doi: 10.1109/TSG.2022.3142087
– start-page: 3017
  year: 2017
  ident: 10.1016/j.eswa.2024.124000_b30
  article-title: Optimal innovation-based deception attack on remote state estimation
– volume: 57
  start-page: 90
  issue: 1
  year: 2011
  ident: 10.1016/j.eswa.2024.124000_b23
  article-title: Consensus computation in unreliable networks: A system theoretic approach
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2011.2158130
– volume: 157
  start-page: 54
  year: 2023
  ident: 10.1016/j.eswa.2024.124000_b4
  article-title: Practical synchronization of neural networks with delayed impulses and external disturbance via hybrid control
  publication-title: Neural Networks
  doi: 10.1016/j.neunet.2022.09.025
– volume: 51
  start-page: 3486
  issue: 5
  year: 2013
  ident: 10.1016/j.eswa.2024.124000_b32
  article-title: Synchronization of coupled reaction-diffusion neural networks with time-varying delays via pinning-impulsive controller
  publication-title: SIAM Journal on Control and Optimization
  doi: 10.1137/120897341
– volume: 122
  year: 2020
  ident: 10.1016/j.eswa.2024.124000_b20
  article-title: Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109242
– volume: 70
  start-page: 166
  issue: 1
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b17
  article-title: Secure consensus of multiagent systems via impulsive control subject to deception attacks
  publication-title: IEEE Transactions on Circuits and Systems II: Express Briefs
– start-page: 21
  year: 2016
  ident: 10.1016/j.eswa.2024.124000_b19
  article-title: Consensus control for nonlinear multi-agent systems subject to deception attacks
– volume: 46
  start-page: 1215
  issue: 7
  year: 2010
  ident: 10.1016/j.eswa.2024.124000_b18
  article-title: A unified synchronization criterion for impulsive dynamical networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2010.04.005
– year: 2023
  ident: 10.1016/j.eswa.2024.124000_b33
  article-title: Impulsive consensus of one-sided Lipschitz multi-agent systems with deception attacks and stochastic perturbation
  publication-title: IEEE Transactions on Artificial Intelligence
– volume: 4
  start-page: 96
  issue: 1
  year: 2017
  ident: 10.1016/j.eswa.2024.124000_b5
  article-title: Distributed joint attack detection and secure state estimation
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
  doi: 10.1109/TSIPN.2017.2760804
– year: 2022
  ident: 10.1016/j.eswa.2024.124000_b11
  article-title: Distributed model-free adaptive control for MIMO nonlinear multiagent systems under deception attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
– volume: 514
  issue: 2
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b25
  article-title: Complex network model for COVID-19: Human behavior, pseudo-periodic solutions and multiple epidemic waves
  publication-title: Journal of Mathematical Analysis and Applications
  doi: 10.1016/j.jmaa.2021.125171
– volume: 17
  start-page: 31504
  issue: 3
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b31
  article-title: Understanding the mechanisms of brain functions from the angle of synchronization and complex network
  publication-title: Frontiers of Physics
  doi: 10.1007/s11467-022-1161-6
– volume: 44
  year: 2022
  ident: 10.1016/j.eswa.2024.124000_b10
  article-title: Network synchronization under distributed delayed impulsive control: Average delayed impulsive weight approach
  publication-title: Nonlinear Analysis. Hybrid Systems
  doi: 10.1016/j.nahs.2021.101148
– volume: 286
  start-page: 509
  issue: 5439
  year: 1999
  ident: 10.1016/j.eswa.2024.124000_b1
  article-title: Emergence of scaling in random networks
  publication-title: Science
  doi: 10.1126/science.286.5439.509
– volume: 657
  year: 2024
  ident: 10.1016/j.eswa.2024.124000_b34
  article-title: Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2023.119948
– volume: 5
  start-page: 369
  issue: 2
  year: 2019
  ident: 10.1016/j.eswa.2024.124000_b21
  article-title: Attack analysis and resilient control design for discrete-time distributed multi-agent systems
  publication-title: IEEE Robotics and Automation Letters
  doi: 10.1109/LRA.2019.2959726
– volume: 410
  start-page: 268
  issue: 6825
  year: 2001
  ident: 10.1016/j.eswa.2024.124000_b26
  article-title: Exploring complex networks
  publication-title: Nature
  doi: 10.1038/35065725
– volume: 51
  start-page: 2074
  issue: 10
  year: 2004
  ident: 10.1016/j.eswa.2024.124000_b13
  article-title: Pinning a complex dynamical network to its equilibrium
  publication-title: IEEE Transactions on Circuits and Systems. I. Regular Papers
  doi: 10.1109/TCSI.2004.835655
– volume: 30
  start-page: 46
  issue: 1
  year: 2017
  ident: 10.1016/j.eswa.2024.124000_b28
  article-title: Complex cyber-physical networks: From cybersecurity to security control
  publication-title: Journal of Systems Science and Complexity
  doi: 10.1007/s11424-017-6181-x
– year: 1994
  ident: 10.1016/j.eswa.2024.124000_b8
– volume: 51
  start-page: 1163
  issue: 3
  year: 2020
  ident: 10.1016/j.eswa.2024.124000_b15
  article-title: Adaptive fault-tolerant tracking control for discrete-time multiagent systems via reinforcement learning algorithm
  publication-title: IEEE Transactions on Cybernetics
  doi: 10.1109/TCYB.2020.2982168
– volume: 117
  year: 2023
  ident: 10.1016/j.eswa.2024.124000_b3
  article-title: Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks
  publication-title: Communications in Nonlinear Science and Numerical Simulation
  doi: 10.1016/j.cnsns.2022.106905
SSID ssj0017007
Score 2.4476154
Snippet This paper investigates the problem of secure synchronization for coupled dynamic networks subject to two types of deception attacks. Deception attacks are...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 124000
SubjectTerms Coupled dynamic network
Deception attacks
Secure impulsive control
Synchronization
Title Impulsive synchronization control for dynamic networks subject to double deception attacks
URI https://dx.doi.org/10.1016/j.eswa.2024.124000
Volume 251
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1873-6793
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  issn: 0957-4174
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1873-6793
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  issn: 0957-4174
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection
  customDbUrl:
  eissn: 1873-6793
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  issn: 0957-4174
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1873-6793
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  issn: 0957-4174
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1873-6793
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  issn: 0957-4174
  databaseCode: AKRWK
  dateStart: 19900101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4Lc6PkYM3yda0Sdsdx3BsirvoYHgpzRdMRjdch3jxbzevSYeC7OCxIa-Ul-Tl98rv_R5Ctz0eJiLUnORBzgmTMSWCCkMsGEhUKm3KQaHe-WkSj6bsYcZnDTSoa2GAVuljv4vpVbT2I13vze5qPu8-W3Bgr0Ob2jHA5VUcBvUvu6c7X1uaB8jPJU5vLyEw2xfOOI6XXn-A9lDIOhTeEvx9Of24cIZH6MAjRdx3H3OMGro4QYd1FwbsD-Upeh3bkQWw0PH6s5CV2K2rrcSeh44tMMXKtZ7HheN9r_F6I-AfDC6XWC03YqGx0p7jgvOyhNr7MzQd3r8MRsR3TCDWq7wkVEGLvZ7hoQzSXHCZBFzblARgBtV5EOjAAhJmqIlSkzK7HjEPVRLKSEgJRNNz1CyWhb5AmOUmZkoxpm0KGUY6NRwI-xEzYR5pRluI1q7KpJcTh64Wi6zmjb1l4N4M3Js597bQ3dZm5cQ0ds7m9Qpkv7ZEZqP9DrvLf9pdoX14cky9a9Qs3zf6xiKOUrSrLdVGe_3x42jyDeEx1XY
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwEBYhGdql79L0qaFbcWPJku2MITQkzWNpAqGLsR6GluCE2qH031cXyaGFkqGrrDPmk3z6zv7uDqH7NqeRoJp7qZ9yj8mQeIKIzDNkIFKxNCEHgXzn8STsz9jznM9rqFvlwoCs0vl-69M33tqNtByardXbW-vFkANzHJrQjgEvBz_cYNz45DpqdAbD_mT7MyHybda0me-BgcudsTIvXXxC-SHKHgncyP_7fPpx5vSO0IEji7hjn-cY1XR-gg6rRgzYvZen6HVgRhYgRMfFVy439W5teiV2UnRsuClWtvs8zq30u8DFWsBnGFwusVquxUJjpZ3MBadlCen3Z2jWe5p2-55rmuAZYHnpEQVd9toZp9KPU8Fl5HNtohJgGkSnvq99w0lYRrIgzmJmliTkVEVUBkJK0Jqeo3q-zPUFwizNQqYUY9pEkTTQccZBsx-wjKaBZqSJSAVVIl1FcWhssUgq6dh7AvAmAG9i4W2ih63NytbT2DmbVyuQ_NoViXH4O-wu_2l3h_b60_EoGQ0mwyu0D1escO8a1cuPtb4xBKQUt26DfQMxYtgh
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Impulsive+synchronization+control+for+dynamic+networks+subject+to+double+deception+attacks&rft.jtitle=Expert+systems+with+applications&rft.au=Zhang%2C+Lingzhong&rft.au=Lu%2C+Jianquan&rft.au=Jiang%2C+Bangxin&rft.au=Zhong%2C+Jie&rft.date=2024-10-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.eissn=1873-6793&rft.volume=251&rft_id=info:doi/10.1016%2Fj.eswa.2024.124000&rft.externalDocID=S0957417424008662
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon