Sampled-data control for mean-square exponential stabilization of memristive neural networks under deception attacks

被引:14
作者
Yan, Lisha [1 ]
Wang, Zhen [1 ]
Zhang, Mingguang [2 ]
Fan, Yingjie [3 ]
机构
[1] Shandong Univ Sci & Technol, Coll Math & Syst Sci, Qingdao 266590, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Safety & Environm Engn, Qingdao 266590, Peoples R China
[3] Shandong Univ Sci & Technol, Coll Elect Engn & Automat, Qingdao 266590, Peoples R China
基金
中国国家自然科学基金;
关键词
Memristive neural networks; Deception attacks; Looped function; Mean-square exponential stabilization; SYNCHRONIZATION; INEQUALITY; STABILITY; SYSTEMS; DELAYS;
D O I
10.1016/j.chaos.2023.113787
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper is concerned with the mean-square exponential stabilization issue of memristive neural networks (MNNs) subject to deception attacks via sampled-data control. The reasons for considering this problem are as follows: (1) Under deception attacks, the state information transmitted in the communication network will be tampered by attackers, which may have an unpredictable impact on the system performance. Moreover, owing to the switching features of MNNs, this makes stability analysis more difficult. (2) In the existing work, it still leave room for improving the security level and the sampling interval. For these reasons, the concept of the security level that measures the anti-attack capability of MNNs is presented for the first time. A secure sampled-data controller is proposed and two looped functions are designed according to the characteristics of deception attacks to improve the security level and the sampling interval. The positivity and symmetry of relevant matrices in the Lyapunov function can be dropped compared to the traditional looped Lyapunov function, which can reduce the conservatism of the result. By utilizing inequality techniques and discrete-time Lyapunov theorem, some sufficient conditions are derived to ensure mean-square exponential stabilization of MNNs in the presence of deception attacks. Lastly, an example of a 3-D MNNs is given to verify the validity of the proposed results. Two superiorities, i.e., improving the security level and enlarging the sampling interval, of the proposed looped functions are also well discussed by a numerical example.
引用
收藏
页数:10
相关论文
共 41 条
[1]   On some new integral inequalities of Gronwall-Bellman-Pachpatte type [J].
Abdeldaim, A. ;
Yakout, M. .
APPLIED MATHEMATICS AND COMPUTATION, 2011, 217 (20) :7887-7899
[2]   Crude oil time series prediction model based on LSTM network with chaotic Henry gas solubility optimization [J].
Altan, Aytac ;
Karasu, Seckin .
ENERGY, 2022, 242
[3]   Model predictive control of three-axis gimbal system mounted on UAV for real-time target tracking under external disturbances [J].
Altan, Aytac ;
Hacioglu, Rifat .
MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2020, 138
[4]   Digital currency forecasting with chaotic meta-heuristic bio-inspired signal processing techniques [J].
Altan, Aytac ;
Karasu, Seckin ;
Bekiros, Stelios .
CHAOS SOLITONS & FRACTALS, 2019, 126 :325-336
[5]  
Aubin J.-P., 2012, Differential Inclusions: Set-Valued Maps and Viability Theory, V264
[6]   State estimation of fractional-order delayed memristive neural networks [J].
Bao, Haibo ;
Cao, Jinde ;
Kurths, Juergen .
NONLINEAR DYNAMICS, 2018, 94 (02) :1215-1225
[7]   State quantized sampled-data control design for complex-valued memristive neural networks [J].
Cai, Li ;
Xiong, Lianglin ;
Cao, Jinde ;
Zhang, Haiyang ;
Alsaadi, Fawaz E. .
JOURNAL OF THE FRANKLIN INSTITUTE, 2022, 359 (09) :4019-4053
[8]   Secure Aperiodic Sampling Control for Micro-Grids Under Abnormal Deception Cyber Attacks [J].
Cai, Xiao ;
Shi, Kaibo ;
She, Kun ;
Zhong, Shouming ;
Park, Poogyeon ;
Kwon, Oh-Min ;
Han, Sheng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (03) :1392-1402
[9]   Wafer map failure pattern recognition based on deep convolutional neural network [J].
Chen, Shouhong ;
Zhang, Yuxuan ;
Hou, Xingna ;
Shang, Yuling ;
Yang, Ping .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 209
[10]   Sampled-Based Consensus for Nonlinear Multiagent Systems With Deception Attacks: The Decoupled Method [J].
Cui, Ying ;
Liu, Yurong ;
Zhang, Wenbing ;
Alsaadi, Fuad E. .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :561-573