4.7 Article

Outlier-resistant quantized control for T-S fuzzy systems under multi-channel-enabled round-robin protocol and deception attacks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Chance-Constrained $H_{∞}$ State Estimation for Recursive Neural Networks Under Deception Attacks and Energy Constraints: The Finite-Horizon Case

Fanrong Qu et al.

Summary: This article investigates the chance-constrained $H_{infinity}$ state estimation problem for a class of time-varying neural networks subject to measurements degradation and randomly occurring deception attacks. A novel energy-constrained deception attack model is proposed, and the explicit expression of the estimator gains is derived by solving a minimization problem. Numerical examples and a practical three-tank system are used to demonstrate the correctness and effectiveness of the proposed estimation scheme.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Outlier-Resistant Nonfragile Control of T-S Fuzzy Neural Networks With Reaction-Diffusion Terms and Its Application in Image Secure Communication

Fang Fang et al.

Summary: This article focuses on a new outlier-resistant non-fragile control issue for a class of Takagi-Sugeno fuzzy delayed neural networks with reaction-diffusion terms. The proposed models consider fuzzy control rules and reaction-diffusion phenomenon simultaneously, making them more practical. A state estimator scheme is presented to mitigate the negative effects of abnormal interference, and a design strategy of an outlier-resistant nonfragile state estimator is put forward using decoupling techniques. The obtained theoretical results are applied to image encryption, demonstrating the feasibility and effectiveness of the presented encryption scheme.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Automation & Control Systems

Fault detection for Takagi-Sugeno fuzzy systems using multiple observers and ellipsoidal analysis

Wenhan Zhang et al.

Summary: This paper introduces a novel fault detection method for Takagi-Sugeno fuzzy systems through multiple observer design and ellipsoidal analysis. The original system is divided into a limited number of fault modes by considering one fault distribution matrix at a time. For each fault mode, an observer is designed to generate the residual signal with finite-frequency fault sensitivity performance and full-frequency unknown inputs robustness performance. Ellipsoidal analysis is employed to evaluate the residual and provide a fault detection index for each mode. The fault detection result is obtained by combining the multiple indices using logical operation. Numerical simulations and experiments on an AC servo motor platform validate the viability and effectiveness of the proposed method.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2023)

Article Computer Science, Artificial Intelligence

Security Control of Sampled-Data T-S Fuzzy Systems Subject to Cyberattacks and Successive Packet Losses

Hao-Yuan Sun et al.

Summary: This article investigates the security control problem of sampled-data Takagi-Sugeno (T-S) fuzzy systems subject to cyberattacks and successive packet losses. A novel successive packet loss modeling method is proposed with some basic assumptions. The sufficient conditions to guarantee the security degree are derived and a fuzzy security controller is designed based on linear matrix inequalities. A benchmark example is given to demonstrate the validity of the proposed approach.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Stochastic Data-Based Denial-of-Service Attack Strategy Design Against Remote State Estimation in Interval Type-2 T-S Fuzzy Systems

Mengge Fan et al.

Summary: This article introduces a novel stochastic data-based denial-of-service (DoS) attack strategy that intercepts measurements and decreases the quality of remote state estimation in interval type-2 (IT2) T-S fuzzy systems. The proposed attack strategy is data-based and attacks packets crucial to system performance, making it more intelligent and disruptive compared to indiscriminate DoS attacks. It is also random, providing better concealment than periodic or consecutive DoS attack models. The relationship among attack effect, attack probability, and attack parameter is analyzed using a stochastic method. Additionally, the relationship between the attack rate threshold and the upper bound of the attack parameter is expressed analytically for energy-constrained attacks, demonstrating the effectiveness of the proposed strategy from the attacker's perspective.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Automation & Control Systems

Design of asynchronous switched Takagi-Sugeno model-based H8 filters with nonlinear consequent parts for switched nonlinear systems

Issam Chekakta et al.

Summary: This paper investigates the design of asynchronous switched nonlinear H-8 filters for a class of continuous-time nonlinear switched systems with mismatching switching laws and L-2 norm-bounded disturbances. Asynchronous switched T-S filters with unmeasured nonlinear consequent parts are proposed to estimate unmeasured and/or disturbed system's outputs, even when the filter's switching law mismatches the switched nonlinear system's one. Conditions are proposed for the design of the considered filters with unmeasured nonlinear consequent parts. The proposed methodology is validated through illustrative examples.

INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING (2023)

Article Automation & Control Systems

Fault isolation and fault-tolerant control for nonlinear stochastic distribution control systems with multiplicative faults

Yunfeng Kang et al.

Summary: In this paper, a fault isolation, diagnosis and fault tolerant control algorithm is proposed for nonlinear multiple multiplicative faults stochastic distribution control systems employing Takagi-Sugeno fuzzy system. A fault detection algorithm is introduced to discover the fault occurrence time and a fault isolation observer is built to produce the residual. The validity of the designed algorithm is demonstrated through a simulation example.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2023)

Article Computer Science, Artificial Intelligence

Observer-Based Security Fuzzy Control for Nonlinear Networked Systems Under Weighted Try-Once-Discard Protocol

Jinliang Liu et al.

Summary: This article presents a solution to the observer-based security fuzzy control problem for a class of nonlinear networked systems with imperfectly matched membership functions. By utilizing the weighted try-once-discard protocol and a constructed observer, stability and security of the system can be ensured.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Efficient Model-Predictive Control for Nonlinear Systems in Interval Type-2 T-S Fuzzy Form Under Round-Robin Protocol

Yuying Dong et al.

Summary: This article focuses on the efficient model-predictive control (EMPC) problem for interval type-2 Takagi-Sugeno (IT2 T-S) fuzzy systems with hard constraints. The round-robin (RR) protocol is used to reduce network congestion and data collisions. The objective is to design a fuzzy controller in the framework of EMPC that achieves a balance between computation burden, initial feasible region, and control performance. The proposed EMPC algorithm ensures feasibility and stability using the matrix partition technique. Numerical examples are provided to demonstrate the effectiveness of the strategy.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2022)

Article Engineering, Electrical & Electronic

Outlier-Resistant Filtering With Dead-Zone-Like Censoring Under Try-Once-Discard Protocol

Hang Geng et al.

Summary: This paper investigates a novel outlier-resistant filtering problem for networked systems with dead-zone-like censoring using the weighted try-once-discard protocol (WTODP). The Tobit model is employed to describe the censoring phenomenon, and the WTODP is used to decide the transmission sequence of sensors to avoid collisions. A saturation function is applied in the Tobit Kalman filter structure to handle measurement outliers, and an upper bound on the filtering error covariance is obtained using matrix inequality approach. The effectiveness of the proposed algorithm is verified through practical examples.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2022)

Article Automation & Control Systems

Decentralized event-triggered synchronization control for complex networks with nonperiodic DoS attacks

Yan Li et al.

Summary: This article discusses decentralized event-triggered synchronization control for complex networks under nonperiodic DoS attacks. An event-based synchronization error model is established and sufficient conditions for secure synchronization are analyzed using Lyapunov stability theory. The synchronization controller gains are designed using linear matrix inequalities.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2022)

Article Automation & Control Systems

Finite-time adaptive event-triggered asynchronous state estimation for Markov jump systems with cyber-attacks

Lijuan Zha et al.

Summary: This article introduces an adaptive event-triggered scheme to address the capacity constraint of networked resources and the occurrence of cyber-attacks. A new state estimation error system model is established to ensure finite-time boundedness and H infinity finite-time boundedness. Design methods for asynchronous estimator gains are derived to guarantee the H infinity finite-time boundedness of the estimation error system. A numerical example is provided to illustrate the effectiveness of the theoretical results.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2022)

Article Engineering, Electrical & Electronic

Protocol-Based Fusion Estimator Design for State-Saturated Systems With Dead-Zone-Like Censoring Under Deception Attacks

Hang Geng et al.

Summary: This paper discusses the fusion estimation problem for state-saturated systems subject to dead-zone-like censoring and deception attacks. A weighted try-once-discard protocol is implemented for multiple sensors to reduce data collisions and communication overheads. Deception attacks are characterized using Bernoulli-distributed stochastic variables. Tobit model is used to characterize the censoring phenomenon, and fusion estimation is implemented via two stages.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2022)

Article Computer Science, Artificial Intelligence

H∞ PID Control for Discrete-Time Fuzzy Systems With Infinite-Distributed Delays Under Round-Robin Communication Protocol

Yezheng Wang et al.

Summary: This article focuses on the H-infinity PID control problem for a class of discrete-time Takagi-Sugeno fuzzy systems, utilizing RR communication protocol and fuzzy PID controller to ensure system stability and performance index.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2022)

Article Automation & Control Systems

Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks?

Bo Wu et al.

Summary: This paper focuses on the security control problem for nonlinear systems with the effects of quantization, communication protocol, and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. By designing a mode-dependent observer-based controller and dynamic quantizers, the probability security of the closed-loop system is guaranteed.

ISA TRANSACTIONS (2022)

Article Computer Science, Artificial Intelligence

Asynchronous Fault Detection for Interval Type-2 Fuzzy Nonhomogeneous Higher Level Markov Jump Systems With Uncertain Transition Probabilities

Xiang Zhang et al.

Summary: Based on the interval type-2 fuzzy approach, this article investigates the fault detection filter design problem for a class of nonhomogeneous higher level Markov jump systems with uncertain transition probabilities. The proposed asynchronous IT2F filter, utilizing hidden Markov model and Gaussian transition probability density function, can effectively detect faults without error alarms, as verified by the simulation study on a quarter-car suspension system.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Robust Asynchronous Filtering for Discrete-Time T-S Fuzzy Complex Dynamical Networks Against Deception Attacks

Ramalingam Sakthivel et al.

Summary: This article investigates the robust asynchronous filtering problem for a class of discrete-time T-S fuzzy complex dynamical networks subjected to random coupling delays and deception attacks. The deception attacks are considered in the filter, where false information data is injected to modify the transmitted signal. The stability of the error system with a prescribed performance index is ensured by establishing a new set of sufficient conditions using Lyapunov-Krasovskii stability theory and Abel lemma-based finite-sum inequality. The proposed filter parameters are obtained through solving linear matrix inequalities. The effectiveness and advantages of the proposed filter are verified through numerical examples, including a tunnel diode circuit model.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2022)

Article Automation & Control Systems

Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks

Lijuan Zha et al.

Summary: This article addresses the problem of $H_{infinity}$ output feedback control for event-triggered networked systems subject to multiple cyber attacks, considering dynamic event-triggered schemes and the effects of the attacks. A sufficient condition is derived to guarantee asymptotic mean-square stability and a prescribed $H_{infinity}$ performance of the closed-loop system. The effectiveness of the proposed method is illustrated through an example.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Automation & Control Systems

Fuzzy Fault Detection for Markov Jump Systems With Partly Accessible Hidden Information: An Event-Triggered Approach

Peng Cheng et al.

Summary: This article addresses the design issue of fuzzy asynchronous fault detection filter for a class of nonlinear Markov jump systems by using an event-triggered scheme. The asynchronous phenomenon between system and filter is characterized via a hidden Markov model with partly accessible mode detection probabilities, and sufficient conditions for the presence of FAFDF are obtained applying Lyapunov function methods.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Computer Science, Artificial Intelligence

On Stability and Stabilization of T-S Fuzzy Systems With Time-Varying Delays via Quadratic Fuzzy Lyapunov Matrix

Guiling Li et al.

Summary: This article proposes improved stability and stabilization criteria for T-S fuzzy systems with time-varying delays. By constructing a novel augmented fuzzy Lyapunov-Krasovskii functional and introducing a quadratic fuzzy Lyapunov matrix, the conservatism of the criteria is reduced and the system with time-varying delays can be controlled better.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2022)

Article Engineering, Electrical & Electronic

A Local Approach to Distributed H∞-Consensus State Estimation Over Sensor Networks Under Hybrid Attacks: Dynamic Event-Triggered Scheme

Fei Han et al.

Summary: This paper addresses the distributed H-infinity-consensus state estimation problem for a specific class of discrete time-varying systems. It proposes a dynamic event-triggered scheme to save energy and considers potential network attacks. A distributed estimator is constructed to achieve the prescribed consensus performance, and sufficient conditions for the existence of the estimator are established using a local performance analysis method. The estimator gains are obtained by solving recursive matrix inequalities. Extensive simulation studies validate the effectiveness of the proposed algorithm.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2022)

Article Engineering, Electrical & Electronic

Probabilistic-Constrained H∞ Tracking Control for a Class of Stochastic Nonlinear Systems Subject to DoS Attacks and Measurement Outliers

Bin Wei et al.

Summary: This study addresses the probabilistic-constrained H-infinity tracking control problem for stochastic nonlinear systems with measurement outliers, stochastic nonlinearities, and DoS attacks. By utilizing a novel redundant-channel switching protocol, a saturation-function-based observer, and an aperiodic DoS model, the reliability of packet transmission is enhanced and the negative effects of DoS jamming attacks are mitigated. The proposed algorithm aims to design a tracking controller that achieves the prescribed H-infinity control performance and satisfies probabilistic constraints on the tracking error simultaneously.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2021)

Article Computer Science, Artificial Intelligence

Memory-Based Continuous Event-Triggered Control for Networked T-S Fuzzy Systems Against Cyberattacks

Zhou Gu et al.

Summary: This article introduces a novel memory-based event triggering mechanism for T-S fuzzy systems, which reduces the occurrence of wrong triggering events and improves the smoothness of event generation. By formulating the control system as a switched fuzzy control system with two modes, the exponential stability in the presence of deception attacks is guaranteed under the assumption of secure control and the proposed ETM.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2021)

Article Automation & Control Systems

Takagi-Sugeno fuzzy observer design for nonlinear descriptor systems with unmeasured premise variables and unknown inputs

Anh-Tu Nguyen et al.

Summary: This article introduces a new observer design framework for a class of nonlinear descriptor systems with unknown but bounded inputs. By reformulating the system as a Takagi-Sugeno (TS) fuzzy model, the differential mean value theorem is effectively used to address mismatching terms in estimation error dynamics.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2021)

Article Automation & Control Systems

Security Control for T-S Fuzzy Systems With Adaptive Event-Triggered Mechanism and Multiple Cyber-Attacks

Jinliang Liu et al.

Summary: This article focuses on security control for Takagi-Sugeno fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks. A mathematical model is proposed for T-S fuzzy systems with multiple cyber-attacks and AETM, ensuring system stability using Lyapunov stability theory and deriving controller gains with a linear matrix inequality technique. Simulated examples demonstrate the effectiveness of the proposed method.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Outlier-Resistant Remote State Estimation for Recurrent Neural Networks With Mixed Time-Delays

Jiahui Li et al.

Summary: This brief addresses a new outlier-resistant state estimation problem for a class of recurrent neural networks with mixed time-delays. A confidence-dependent saturation function is proposed to mitigate the side effects from measurement outliers on the estimation error dynamics. By using a combination of Lyapunov-Krasovskii functional and inequality manipulations, a delay-dependent criterion is established to ensure the existence of the outlier-resistant state estimator achieving asymptotic stability with a prescribed H-infinity performance index.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2021)

Article Automation & Control Systems

Resilient Tracking Control of Networked Control Systems Under Cyber Attacks

Eman Mousavinejad et al.

Summary: This article presents a resilient tracking control system and estimation strategy that can guarantee system performance and the correctness of state estimation when facing cyber attacks. By using recursive computation and convex optimization algorithm, the protection of state and adjustment of control parameters are achieved.

IEEE TRANSACTIONS ON CYBERNETICS (2021)

Article Automation & Control Systems

Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks

Di Zhao et al.

Summary: This article addresses the observer-based proportional-integral-derivative (PID) security control problem for a type of linear discrete time-delay systems under cyber-attacks. A novel observer-based PID controller is proposed to achieve the desired security level and ensure the system stability, with sufficient conditions derived for exponentially mean-square input-to-state stability and upper bound of the quadratic cost criterion (QCC) obtained. The effectiveness of the design approach is demonstrated through an illustrative example.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Engineering, Multidisciplinary

H∞ State Estimation for Coupled Stochastic Complex Networks With Periodical Communication Protocol and Intermittent Nonlinearity Switching

Yuqiang Luo et al.

Summary: This paper presents an H1 estimation approach for coupled stochastic complex networks with intermittent nonlinear switching, using binary random variables to characterize the switching behavior and Round-Robin protocol to alleviate data collisions and save energy. A protocol-based H-infinity estimator is designed for the networks, resisting stochastic disturbances and ensuring the stability of the error system. Sufficient conditions for the expected estimator are provided using Lyapunov stability and convex optimization theories, with simulations illustrating the reasonableness of the approach.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Engineering, Electrical & Electronic

Protocol-Based Tobit Kalman Filter Under Integral Measurements and Probabilistic Sensor Failures

Hang Geng et al.

Summary: This paper addresses the Tobit Kalman filtering problem for discrete time-varying systems under the Round-Robin protocol, considering censored observations, integral measurements, and sensor failures. By utilizing the augmentation technique and orthogonality projection principle, a protocol-based TKF is developed to handle the challenges caused by integral measurements and sensor failures. The performance of the proposed filter is analyzed through examining the statistical properties of the estimation error covariance, showing the existence of self-propagating upper and lower bounds.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2021)

Article Computer Science, Artificial Intelligence

H∞ Filtering for Fuzzy Jumping Genetic Regulatory Networks With Round-Robin Protocol: A Hidden-Markov-Model-Based Approach

Hao Shen et al.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2020)

Article Automation & Control Systems

Noncooperative Event-Triggered Control Strategy Design With Round-Robin Protocol: Applications to Load Frequency Control of Circuit Systems

Yuan Yuan et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2020)

Article Automation & Control Systems

Model predictive control for nonlinear systems in Takagi-Sugeno's form under round-robin protocol

Yuying Dong et al.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2020)

Article Automation & Control Systems

Distributed fault estimation for delayed complex networks with Round-Robin protocol based on unknown input observer

Ming Gao et al.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2020)

Article Automation & Control Systems

Sliding-Mode Control of T-S Fuzzy Systems Under Weighted Try-Once-Discard Protocol

Zhina Zhang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Automation & Control Systems

Recent Advances in Key-Performance-Indicator Oriented Prognosis and Diagnosis With a MATLAB Toolbox: DB-KIT

Yuchen Jiang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Automation & Control Systems

Observer-Based Non-PDC Control for Networked T-S Fuzzy Systems With an Event-Triggered Communication

Chen Peng et al.

IEEE TRANSACTIONS ON CYBERNETICS (2017)

Article Computer Science, Artificial Intelligence

A Novel Observer-Based Output Feedback Controller Design for Discrete-Time Fuzzy Systems

Jinhui Zhang et al.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2015)

Article Automation & Control Systems

The sector bound approach to quantized feedback control

MY Fu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2005)