1,422
Views
15
CrossRef citations to date
0
Altmetric
Research Article

H state estimation for memristive neural networks with randomly occurring DoS attacks

, , , & ORCID Icon
Pages 154-165 | Received 30 Dec 2021, Accepted 26 Feb 2022, Published online: 15 Mar 2022

References

  • Amin, S., Cárdenas, A. A., & Sastry, S. S. (2009). Safe and secure networked control systems under denial-of-service attacks. In Hybrid systems: Computation and control, 12th international conference (Vol. 5469, pp. 31–45). Springer.
  • Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2015, December). Risk-sensitive control under markov modulated denial-of-service (DoS) attack strategies. IEEE Transactions on Automatic Control, 60(12), 3299–3304. https://doi.org/10.1109/TAC.2015.2416926
  • Cao, E., Zhang, B., Cai, Z., Han, Q., & Wang, B. (2021). Observer-based state feedback H∞ control for offshore steel jacket structures under denial-of-service attacks. ISA Transactions, 115(8), 46–60. https://doi.org/10.1016/j.isatra.2021.01.006
  • Cao, Y., Sun, B., Guo, Z., Huang, T., Yan, Z., & Wen, S. (2020). Global stabilization of memristive neural networks with leakage and time-varying delays via quantized sliding-mode controller. Neural Processing Letters, 52(3), 2451–2468. https://doi.org/10.1007/s11063-020-10356-y
  • Chen, J., Li, J., & Lai, T. H. (2013, September). Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local. IEEE Transactions Wireless Communications, 12(9), 4742–4755. https://doi.org/10.1109/TW.2013.072313.122083
  • Chua, L. (1971, September). Memristor-the missing circuit element. IEEE Transactions on Circuit Theory, 18(5), 507–519. https://doi.org/10.1109/TCT.1971.1083337
  • Clark, A., Bushnell, L., & Poovendran, R. (2012). A passivity-based framework for composing attacks on networked control systems. 2012 50th Annual Allerton conference on communication, control, and computing (Allerton), Monticello, IL, USA (pp. 1814–1821). IEEE.
  • Ding, D., Han, Q., Ge, X., & Wang, J. (2021, January). Secure state estimation and control of cyber-physical systems: A survey. IEEE Transactions on Systems, Man, and Cybernetics-Systems, 51(1), 176–190. https://doi.org/10.1109/TSMC.6221021
  • Ding, D., Han, Q., Xiang, Y., Ge, X., & Zhang, X. (2018). A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 275(1), 1674–1683. https://doi.org/10.1016/j.neucom.2017.10.009
  • Ding, D., Wang, Z., Ho, D. W. C., & Wei, G. (2017). Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica, 78(1), 231–240. https://doi.org/10.1016/j.automatica.2016.12.026
  • Fu, Y., & Chai, T. (2007, May). Neural-network-based nonlinear adaptive dynamical decoupling control. IEEE Transactions on Neural Networks, 18(3), 921–925. https://doi.org/10.1109/TNN.2007.891588
  • Ge, X., Han, Q., Zhong, M., & Zhang, X. (2019). Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica, 109(7), 108557. https://doi.org/10.1016/j.automatica.2019.108557
  • Guan, X., Yang, B., Chen, C., Dai, W., & Wang, Y. (2016, January). A comprehensive overview of cyber-physical systems: From perspective of feedback system. IEEE/CAA Journal of Automatica Sinica, 3(1), 1–14. https://doi.org/10.1109/JAS.2016.7373757
  • Guo, Z., Yang, S., & Wang, J. (2015, June). Global exponential synchronization of multiple memristive neural networks with time delay via nonlinear coupling. IEEE Transactions on Neural Networks and Learning Systems, 26(6), 1300–1311. https://doi.org/10.1109/TNNLS.2014.2354432
  • Huang, H., Feng, G., & Cao, J. (2008, August). Robust state estimation for uncertain neural networks with time-varying delay. IEEE Transactions on Neural Networks, 19(8), 1329–1339. https://doi.org/10.1109/TNN.2008.2000206
  • Huang, J., Zhao, L., & Wang, Q. (2020). Adaptive control of a class of strict feedback nonlinear systems under replay attacks. ISA Transactions, 107(11), 134–142. https://doi.org/10.1016/j.isatra.2020.08.001
  • Ji, H., Zhang, H., Li, C., Senping, T., Lu, J., & Wei, Y. (2018). H∞ control for time-delay systems with randomly occurring nonlinearities subject to sensor saturations, missing measurements and channel fadings. ISA Transactions, 75(5), 38–51. https://doi.org/10.1016/j.isatra.2018.02.015
  • Liu, H., Wang, Z., Shen, B., & Dong, H. (2020, February). Delay-distribution-dependent H∞ state estimation for discrete-time memristive neural networks with mixed time-delays and fading measurements. IEEE Transactions on Cybernetics, 50(2), 440–451. https://doi.org/10.1109/TCYB.6221036
  • Liu, H., Wang, Z., Shen, B., & Liu, X. (2018, August). Event-triggered H∞ state estimation for delayed stochastic memristive neural networks with missing measurements: The discrete time case. IEEE Transactions on Neural Networks and Learning Systems, 29(8), 3726–3737. https://doi.org/10.1109/TNNLS.2017.2728639
  • Liu, R., Hao, F., & Yu, H. (2021, December). Optimal SINR-based DoS attack scheduling for remote state estimation via adaptive dynamic programming approach. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(12), 7622–7632. https://doi.org/10.1109/TSMC.2020.2981478
  • Lv, X., Cao, J., & Rutkowski, L. (2021). Dynamical and static multisynchronization analysis for coupled multistable memristive neural networks with hybrid control. Neural Networks, 143(1), 515–524. https://doi.org/10.1016/j.neunet.2021.07.004
  • Persis, C. D., & Tesi, P. (2015, November). Input-to-state stabilizing control under denial-of-service. IEEE Transactions on Automatic Control, 60(11), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924
  • Rakkiyappan, R., Chandrasekar, A., & Cao, J. (2015, September). Passivity and passification of memristor-based recurrent neural networks with additive time-varying delays. IEEE Transactions on Neural Networks and Learning Systems, 26(9), 2043–2057. https://doi.org/10.1109/TNNLS.2014.2365059
  • Rego, R. C. B., & Araújo, F. M. U. (2021, August). Nonlinear control system with reinforcement learning and neural networks based lyapunov functions. IEEE Latin America Transactions, 19(8), 1253–1260. https://doi.org/10.1109/TLA.2021.9475855
  • Shen, B., Wang, Z., & Liu, X. (2011, January). Bounded H∞ synchronization and state estimation for discrete time-varying stochastic complex networks over a finite horizon. IEEE Transactions on Neural Networks, 22(1), 145–157. https://doi.org/10.1109/TNN.2010.2090669
  • Song, J., Ding, D., Liu, H., & Wang, X. (2020). Non-fragile distributed state estimation over sensor networks subject to DoS attacks: The almost sure stability. International Journal of Systems Science, 51(6), 1119–1132. https://doi.org/10.1080/00207721.2020.1752843.
  • Song, Y., Chen, Z., & Yuan, Z. (2007, March). New chaotic PSO-based neural network predictive control for nonlinear process. IEEE Transactions on Neural Networks, 18(2), 595–601. https://doi.org/10.1109/TNN.2006.890809
  • Strukov, D. B., Snider, G. S., Stewart, D. R., & Williams, R. S. (2008). The missing memristor found. Nature, 453(7191), 80–83. https://doi.org/10.1038/nature06932
  • Teixeira, A., Shames, I., Sandberg, H., & Johansson, K. H. (2015). A secure control framework for resource-limited adversaries. Automatica, 51(6), 135–148. https://doi.org/10.1016/j.automatica.2014.10.067
  • Wang, H., Duan, S., Huang, T., Wang, L., & Li, C. (2017, March). Exponential stability of complex-valued memristive recurrent neural networks. IEEE Transactions on Neural Networks and Learning Systems, 28(3), 766–771. https://doi.org/10.1109/TNNLS.2015.2513001
  • Wang, H., & Xue, A. (2018). Adaptive event-triggered H∞ filtering for discrete-time delayed neural networks with randomly occurring missing measurements. Signal Processing, 153(6), 221–230. https://doi.org/10.1016/j.sigpro.2018.07.027
  • Wang, Z., Ho, D. W. C., & Liu, X. (2005, January). State estimation for delayed neural networks. IEEE Transactions on Neural Networks, 16(1), 279–284. https://doi.org/10.1109/TNN.2004.841813
  • Wang, Z., Shen, B., & Liu, X. (2012). H∞ filtering with randomly occurring sensor saturations and missing measurements. Automatica, 48(3), 556–562. https://doi.org/10.1016/j.automatica.2012.01.008
  • Xiao, Q., & Zeng, Z. (2018, June). Lagrange stability for T–S fuzzy memristive neural networks with time-varying delays on time scales. IEEE Transactions on Fuzzy Systems, 26(3), 1091–1103. https://doi.org/10.1109/TFUZZ.91
  • Xin, Y., Li, Y., Huang, X., & Cheng, Z. (2019, February). Quasi-synchronization of delayed chaotic memristive neural networks. IEEE Transactions on Cybernetics, 49(2), 712–718. https://doi.org/10.1109/TCYB.2017.2765343
  • Yang, S., Guo, Z., & Wang, J. (2015, July). Robust synchronization of multiple memristive neural networks with uncertain parameters via nonlinear coupling. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(7), 1077–1086. https://doi.org/10.1109/TSMC.2014.2388199
  • Yu, Y., & Yuan, Y. (2020). Event-triggered active disturbance rejection control for nonlinear network control systems subject to DoS and physical attacks. ISA Transactions, 104(16), 73–83. https://doi.org/10.1016/j.isatra.2019.05.004
  • Yuan, H., Guo, Y., & Xia, Y. (2021). Event-based distributed filtering against deception attacks for sensor networks with quantization effect. ISA Transactions. https://doi.org/10.1016/j.isatra.2021.08.009 .
  • Zhan, Z., Xu, M., & Xu, S. (2013, November). Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789. https://doi.org/10.1109/TIFS.2013.2279800
  • Zhang, D., Liu, L., & Feng, G. (2019, April). Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack. IEEE Transactions on Cyberetics, 49(4), 1501–1511. https://doi.org/10.1109/TCYB.6221036
  • Zhang, G., & Shen, Y. (2013, October). New algebraic criteria for synchronization stability of chaotic memristive neural networks with time-varying delays. IEEE Transactions on Neural Networks and Learning Systems, 24(10), 1701–1707. https://doi.org/10.1109/TNNLS.5962385
  • Zhang, X., Han, Q., Ge, X., & Ding, L. (2020, August). Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks. IEEE Transactions on Cybernetics, 50(8), 3616–3626. https://doi.org/10.1109/TCYB.6221036
  • Zhao, X., Liu, C., & Tian, E. (2020). Finite-horizon tracking control for a class of stochastic systems subject to input constraints and hybrid cyber attacks. ISA Transactions, 104(2), 93–100. https://doi.org/10.1016/j.isatra.2019.02.025
  • Zhu, M., & Martinez, S. (2014, March). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808. https://doi.org/10.1109/TAC.2013.2279896
  • Zhu, W., Wang, D., Liu, L., & Feng, G. (2018, August). Event-based impulsive control of continuous-time dynamic systems and its application to synchronization of memristive neural networks. IEEE Transactions on Neural Networks and Learning Systems, 29(8), 3599–3609. https://doi.org/10.1109/TNNLS.2017.2731865
  • Zou, L., Wang, Z., Gao, H., & Liu, X. (2015, December). Event-triggered state estimation for complex networks with mixed time delays via sampled data information: The continuous-time case. IEEE Transactions on Cybernetics, 45(12), 2804–2815. https://doi.org/10.1109/TCYB.2014.2386781