Adaptive Neural Security Control for Networked Singular Systems Under Deception Attacks

被引:6
作者
Ao, Wengang [1 ]
Zhang, Huiyan [1 ]
Zhao, Ning [2 ]
Minchala, Luis, I [3 ]
机构
[1] Chongqing Technol & Business Univ, Natl Res Base Intelligent Mfg Serv, Chongqing 400067, Peoples R China
[2] Harbin Engn Univ, Coll Intelligent Syst Sci & Engn, Harbin 150001, Heilongjiang, Peoples R China
[3] Univ Cuenca, Dept Elect Elect & Telecommun Engn, Cuenca 010105, Ecuador
基金
中国国家自然科学基金;
关键词
Neural networks; Security; Adaptive systems; Resists; Mathematical models; Lyapunov methods; Linear matrix inequalities; Networked singular systems; neural networks; security control; deception attacks; PREDICTIVE CONTROL; STABILIZATION; DESIGN;
D O I
10.1109/ACCESS.2022.3161672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the issue of the adaptive neural security controller design for uncertain networked singular systems in the presence of deception attacks. Considering that the attack signal is unknown, the neural networks technique is exploited to approximate the attack signal, which eliminates the assumption that the attack signal has a known upper bound. By combining the state feedback with the estimated information of the attack, the impact of the attack is effectively compensated. Furthermore, a novel Lyapunov function, including the decomposed state vector and the weight matrix estimation error, is established to evaluate the bounded area of the system state. Finally, a numerical example substantiates the validity of the theoretical results.
引用
收藏
页码:33230 / 33237
页数:8
相关论文
共 40 条
[1]  
Assawinchaichote W., 2020, IEEE ACCESS, V8, DOI DOI 10.1109/ACCESS.2020.3009178
[2]   Majorant-Based Control Methodology for Mechatronic and Transportation Processes [J].
Celentano, Laura ;
Basin, Michael, V ;
Shi, Peng .
IEEE ACCESS, 2021, 9 :157916-157939
[3]   Adaptive Neural Network-Based Observer Design for Switched Systems With Quantized Measurements [J].
Chen, Liheng ;
Zhu, Yanzheng ;
Ahn, Choon Ki .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (09) :5897-5910
[4]   Model-Based adaptive event-Triggered control of nonlinear continuous-Time systems [J].
Chen, Zhongyu ;
Niu, Ben ;
Zhao, Xudong ;
Zhang, Liang ;
Xu, Ning .
APPLIED MATHEMATICS AND COMPUTATION, 2021, 408
[5]  
DAI L, 1989, LECT NOTES CONTR INF, V118, P1
[6]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[7]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789
[8]   H-Infinity Stabilization for Singular Networked Cascade Control Systems With State Delay and Disturbance [J].
Du, Zhaoping ;
Yue, Dong ;
Hu, Songlin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) :882-894
[9]   A HYBRID CONVOLUTIONAL NEURAL NETWORK AND SUPPORT VECTOR MACHINE FOR DYSARTHRIA SPEECH CLASSIFICATION [J].
Dyoniputri, Hanifia ;
Afiahayati .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (01) :111-123
[10]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40