
This paper studied the event-triggered synchronization problem for time-delay neural networks under DoS attacks. A novel event-triggered scheme based on switching between periodic sampling and a continuous event-triggered scheme was proposed, which not only cuts down the number of data transmissions but also offsets cyberattacks. By choosing a suitable piecewise Lyapunov-Krasovskii functional and using several free-weighting matrices, sufficient conditions were established to ensure the exponential stability of the synchronization error system in the occurrence of DoS attacks. Furthermore, a co-design method was provided to acquire the desired non-fragile output-feedback control gain and event-triggering parameter. Finally, a numerical example was given to illustrate the usefulness of the proposed approach.
Citation: Yawei Liu, Guangyin Cui, Chen Gao. Event-triggered synchronization control for neural networks against DoS attacks[J]. Electronic Research Archive, 2025, 33(1): 121-141. doi: 10.3934/era.2025007
[1] | Zongying Feng, Guoqiang Tan . Dynamic event-triggered $ H_{\infty} $ control for neural networks with sensor saturations and stochastic deception attacks. Electronic Research Archive, 2025, 33(3): 1267-1284. doi: 10.3934/era.2025056 |
[2] | Xiaoming Wang, Yunlong Bai, Zhiyong Li, Wenguang Zhao, Shixing Ding . Observer-based event triggering security load frequency control for power systems involving air conditioning loads. Electronic Research Archive, 2024, 32(11): 6258-6275. doi: 10.3934/era.2024291 |
[3] | Chengbo Yi, Jiayi Cai, Rui Guo . Synchronization of a class of nonlinear multiple neural networks with delays via a dynamic event-triggered impulsive control strategy. Electronic Research Archive, 2024, 32(7): 4581-4603. doi: 10.3934/era.2024208 |
[4] | Xinling Li, Xueli Qin, Zhiwei Wan, Weipeng Tai . Chaos synchronization of stochastic time-delay Lur'e systems: An asynchronous and adaptive event-triggered control approach. Electronic Research Archive, 2023, 31(9): 5589-5608. doi: 10.3934/era.2023284 |
[5] | Xiangwen Yin . A review of dynamics analysis of neural networks and applications in creation psychology. Electronic Research Archive, 2023, 31(5): 2595-2625. doi: 10.3934/era.2023132 |
[6] | Jun Guo, Yanchao Shi, Shengye Wang . Synchronization analysis of delayed quaternion-valued memristor-based neural networks by a direct analytical approach. Electronic Research Archive, 2024, 32(5): 3377-3395. doi: 10.3934/era.2024156 |
[7] | Xiaofeng Chen . Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks. Electronic Research Archive, 2023, 31(8): 5039-5055. doi: 10.3934/era.2023258 |
[8] | Tianyi Li, Xiaofeng Xu, Ming Liu . Fixed-time synchronization of mixed-delay fuzzy cellular neural networks with $ L\acute{e}vy $ noise. Electronic Research Archive, 2025, 33(4): 2032-2060. doi: 10.3934/era.2025090 |
[9] | Wanshun Zhao, Kelin Li, Yanchao Shi . Exponential synchronization of neural networks with mixed delays under impulsive control. Electronic Research Archive, 2024, 32(9): 5287-5305. doi: 10.3934/era.2024244 |
[10] | Xingyue Liu, Kaibo Shi, Yiqian Tang, Lin Tang, Youhua Wei, Yingjun Han . A novel adaptive event-triggered reliable $ H_\infty $ control approach for networked control systems with actuator faults. Electronic Research Archive, 2023, 31(4): 1840-1862. doi: 10.3934/era.2023095 |
This paper studied the event-triggered synchronization problem for time-delay neural networks under DoS attacks. A novel event-triggered scheme based on switching between periodic sampling and a continuous event-triggered scheme was proposed, which not only cuts down the number of data transmissions but also offsets cyberattacks. By choosing a suitable piecewise Lyapunov-Krasovskii functional and using several free-weighting matrices, sufficient conditions were established to ensure the exponential stability of the synchronization error system in the occurrence of DoS attacks. Furthermore, a co-design method was provided to acquire the desired non-fragile output-feedback control gain and event-triggering parameter. Finally, a numerical example was given to illustrate the usefulness of the proposed approach.
Neural networks (NNs) have provoked ever-increasing attention because of their ability to self-learn and self-adapt. To date, a variety of NN architectures and NN learning methods have been utilized for secure communication, trajectory prediction, system identification and control, and practical applications in many areas to solve pattern recognition, classification, regression, and optimization problems [1,2,3]. In these practical applications, time delays are often inevitable due to inherently limited delivery time between neurons, which leads to NNs generating more complex dynamic behavior or even chaos [4]. Therefore, the synchronization issue of time-delay NNs (TDNNs) has always been an active subject of study. The prime objective of synchronization control is to force a slave system to follow the master system by a suitable control method, which means that the slave system is affected by the behavior of the master system, while the master system is independent of the slave one. For this purpose, many effective means of synchronization control have been proposed, such as event-triggered control [5,6], impulsive control [7,8], and adaptive control [9]. Along with the evolvement of the research, a large number of interesting and remarkable results have been reported on the synchronization of TDNNs, please refer to the literature [10,11].
With the advancement of information technology, networked systems have been utilized widely owing to timeliness, facility, and flexibility in practical applications. Therefore, the signal transfer under the networked communication scheme is achieved via a shared communication network channel. However, due to the openness and sharing of communication networks, networked systems are vulnerable to malicious cyberattacks. Cyberattacks that can be commonly divided into denial-of-service (DoS) attacks, replay attacks, and deception attacks aim to operate the data sent by communication channels to interfere with or damage a system [12]. Compared with deception attacks and replay attacks [13,14], DoS attacks are the most likely type as they release massive requests to jam the communication network channel such that the filter/controller is inaccessible to the required data [15]. Thus, many actions have been taken to handle networked system security under DoS attacks [16,17,18,19]. Periodic DoS attacks were presented based on a state-feedback control scheme in [16], which characterized the effect of jamming attacks on systems by using a switched system model. Given that the system state cannot be fully measured, the result in [16] was extended to the observer-based, event-triggered controller to settle the resilient control issue under periodic DoS attacks in [17]. When the period of the jammer signal is unknown, the periodic DoS attacks are developed into nonperiodic DoS jammer signals, which are more practical than periodic ones. In [20,21,22,23], nonperiodic DoS jamming attacks were considered in the filtering and control issues for the switched system, respectively. While, for the synchronization of TDNNs, the aperiodic DoS attacks have rarely been discussed, which is one of our motivations.
Besides the issue of network security, another significant issue of networked systems that needs to be considered is the limitation of network bandwidth. In order to solve the problem, two different transmission strategies have been widely used. The first one is periodic sampling, where the signals are usually sampled at a fixed period [24]. In this circumstance, signals are transmitted even when the output fluctuation is small, which may result in network burden and waste network resources. To overcome the drawbacks of periodic sampling, the event-triggered scheme (ETS) was developed [25,26,27]. In this way, the sampling signals are released if and only if a pre-defined condition is violated, rather than at a fixed time. Therefore, it is desirable to use the ETS to decide whether the sampling signal should be transmitted out or not. A crucial difficulty in the ETS design is finding a suitable condition so that the signal release rate can be validly reduced while the system performance can be maintained at a certain level. For instance, in [28], a continuous control strategy implicitly defined by the continuous ETS was proposed; nevertheless, the Zeno phenomenon occurred. To avoid the Zeno behavior, the periodic ETS, which checks periodically the event-triggering condition in discrete-time instants, and the switching ETS, which combines the ideas of both periodic sampling and the continuous ETS were proposed [29,30]. It is noteworthy that most of the existing results mainly focus on the combination of DoS attacks with the periodic ETS [20,21,22,31]. However, to the best of our knowledge, there are no relevant reports on the design of the switching ETS under DoS attacks for synchronization of TDNNs, which is the other main motivation.
Impelled by the above discussions, we endeavor to cope with the master-slave synchronization problem for TDNNs in the cases of limited network resources and DoS attacks, where the controller is permitted to be limited by norm-bounded perturbations. The main contributions include the following:
1) Different from the existing results based on the periodic ETS under DoS attacks [16,20,21,22,31], the proposed ETS is described as switching between periodic sampling and the continuous ETS counteracting the effect of DoS attacks.
2) In the presence of aperiodic DoS attacks, the proposed control scheme is based on the output-feedback control with the fluctuation in control gain rather than state-feedback control in [16,22], which is more realistic.
3) Sufficient conditions including the restriction of jamming attacks are proposed guaranteeing exponential stability of the resulting error system by utilizing a piecewise Lyapunov-Krasovskii functional (PLKF) and adopting several free-weighting matrices.
Notation: In this article, Rni denotes the ni-dimensional Euclidean space; Rni×np stands for the set of real ni×np matrices; Rni+ is the set of real symmetric positive-definite ni×ni matrices; N means the set of non-negative integers; S>0 (respectively, S≥0) represents that S is symmetric positive definite (respectively, semi-definite); λmax(S) (respectively, λmin(S)) is the largest (respectively, smallest) eigenvalue of matrix S; I (respectively, 0) means the identity (respectively, zero) matrix with compatible dimension; ST is the transpose of matrix S; He(S) denotes S+ST; diag{⋯} is a diagonal matrix; col{⋯} represents a column vector; and ∗ is a symmetric block.
Consider the following master-slave NN model:
M:{˙x(t)=−Ax(t)+W0ϕ(x(t))+W1ϕ(x(t−θ))+J(t),ˇy(t)=Cx(t), | (2.1) |
and
S:{˙ˆx(t)=−Aˆx(t)+W0ϕ(ˆx(t))+J(t)+W1ϕ(ˆx(t−θ))+Bu(t),ˆy(t)=Cˆx(t), | (2.2) |
where M stands for the master NN; S is the slave NN; x(t)∈Rni is the state of M; ˆx(t)∈Rni is the state of S; ˇy(t)∈Rnq and ˆy(t)∈Rnq are the output vectors of M and S; J(t)∈Rni represents the external input; u(t)∈Rnp means the control input of S; A=diag{a1,…,ani}∈Rni×ni with ak>0,k=1,…,ni; W0∈Rni×ni and W1∈Rni×ni are the connection weight matrices of NN; B∈Rni×np and C∈Rnq×ni are known constant matrices; θ signifies the time delay; ϕ(⋅)=col{ϕ1(⋅),ϕ2(⋅),…,ϕni(⋅)} represents the neuron activation function satisfying:
Φ−l≤ϕj(κ1)−ϕj(κ2)κ1−κ2≤Φ+l,l=1,2,…,ni, | (2.3) |
where ∀κ1,κ2∈R, κ1≠κ2; Φ−l and Φ+l are known constants.
Figure 1 illustrates the synchronization control strategy. Accordingly, we define the synchronization error η(t)=ˆx(t)−x(t) and y(t)=ˆy(t)−ˇy(t). Then the synchronization error system can be derived:
{˙η(t)=−Aη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))+Bu(t),y(t)=Cη(t), | (2.4) |
where ϕ(r(t)=ϕ(ˆx(t))−ϕ(x(t)). When DoS attacks are absent, set tν(ν=0,1,…,t0=0) as the triggering times. Then the time sequence {tν}ν∈N can be acquired by the event trigger. In addition, considering the effect of gain perturbations, the output feedback u(t) is expressed as
u(t)=−(K+ΔK)y(tν),∀t∈[tν,tν+1),ν∈N, | (2.5) |
where K denotes the controller gain matrix to be designed and ΔK is an unknown matrix representing the gain perturbation. It is assumed that ΔK has the following norm-bounded structure:
ΔK=MFN, | (2.6) |
where M and N are known constant matrices, and F stands for an uncertain matrix satisfying FTF≤I.
As a follow-up, to offset the effect of DoS attacks on the system quantitatively, following [20], a type of power-constraint aperiodic DoS jamming attack is introduced for i∈N:
DDoS(t)={1,t∈Gioff,0,t∈Gion, | (2.7) |
where Gioff=[t0,i,tσi) represents the i th DoS sleeping time interval, in which t0,i is the time instant at which the ith DoS attack is off and the signal can be sent. Gion=[tσi,t0,i+1) means the ith DoS time interval, where tσi is the time instant at which the ith DoS attack is active and the signal transmission is interrupted.
When there are no DoS attacks, the event-triggering condition is defined as [30]:
tν+1=min{t≥tν+h|yTν(t)Fyν(t)>μyT(t)Fy(t)}, | (2.8) |
where h>0 is a given integer; yν(t)=y(t)−y(tν) with y(t) being the current sampling measurement and y(tν) being the latest one; μ∈(0,1) is a threshold; and F∈Rni+ is a weighting matrix.
On another note, under DoS attacks (2.7), the communication channel is stopped over DoS time intervals ∪i∈NGion. Therefore, the above condition in (2.8) is no longer satisfied. Therefore, we will modify the above switching ETS.
Definition 1. The event-triggering instant subject to DoS attacks is as follows:
tν+1,i=min{t∈[tν,i+h,tσi)|ˉyν,i(t)>μyT(t)Fy(t)} | (2.9) |
where i∈N, ˉyν,i(t)=(y(t)−y(tν,i))TF(y(t)−y(tν,i)), and ν∈N is the number of events occurring in the ith attack period.
Remark 1. Unlike an adaptive ETS with the relative threshold strategy [32,33], the proposed ETS in (2.9) can be regarded as switching between the periodic sampling method and the continuous ETS, that is, a signal needs to wait for at least h to be sent. Then the sensor starts to continuously check the event-triggering condition and sends signals when it is disobeyed. Moreover, ETS (2.9) can not only cut down the auxiliary consumption of computational resources and save communication resources, but also adapt to the DoS attacks.
Under DoS attack (2.7) and ETS (2.9), the controller u(t) in (2.5) can be represented as
u(t)={−(K+ΔK)y(tν,i),t∈[tν,i,tν+1,i)∩Gioff,0,t∈Gion, | (2.10) |
where i∈N, ν∈{0,1,...,ν(i)}, ν(i)=sup{ν∈N|tσi≥tν,i}, and {tν,i} represents the sequence of successful control update instants.
Remark 2. Considering the effect of DoS attacks in (2.7), we give an output-feedback controller in (2.10) to offset DoS attacks. The data is updated at every trigger instant during the dormant period and is blocked when DoS attacks are active. Specifically, when there are DoS attacks, data is inaccessible to target users. In this case, controller (2.10) becomes invalid, i.e., u(t)=0. While DoS attacks are absent, the controller can successfully update, i.e., u(t)=−(K+ΔK)y(tν,i). Moreover, controller (2.10) has non-fragility, which can be limited by norm-bounded perturbations.
In what follows, utilizing the time delay and switched system approaches, we divide the trigger interval [tν,i,tν+1,i) into two sub-intervals, i.e.,
[tν,i,tν,i+h)∪[tν,i+h,tν+1,i). |
Set
{ρ(t)=t−tν,i,t∈[tν,i,tν,i+h)∩Gioff,z(t)=y(tν,i)−y(t),t∈[tν,i+h,tν+1,i)∩Gioff. | (2.11) |
Then by (2.10) and (2.11), the synchronization error system in (2.4) can be further cast into the following switched error system:
{˙η(t)={−ˉAη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))+ˉB∫tt−ρ(t)˙η(s)ds,t∈[tν,i,tν,i+h)∩Gioff,−ˉAη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))−ˉBz(t),t∈[tν,i+h,tν+1,i)∩Gioff,−Aη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ)),t∈Gion,y(t)=Cη(t),η(t)=ϖ(t),t∈[−max{θ,h},0], | (2.12) |
where ˉA=A+B(K+ΔK)C,ˉB=B(K+ΔK)C, and z(t) satisfies
zT(t)Fz(t)≤μyT(t)Fy(t). | (2.13) |
In virtue of the above analysis, we construct the following PLKF for switched error system (2.12):
V(t)={V0(t)=VP1(t)+VH1(t),t∈[tν,i,tν,i+h)∩Gioff,V1(t)=VP1(t),t∈[tν,i+h,tν+1,i)∩Gioff,V2(t)=VP2(t)+VH2(t),t∈Gion, | (2.14) |
where
VPj(t)=ηT(t)Pjη(t)+∫tt−θe2(−1)jεj(t−s)ηT(s)Qjη(s)ds,VH1(t)=(h−ρ(t))∫tt−ρ(t)e−2ε1(t−s)˙ηT(s)H11˙η(s)ds+(h−ρ(t))∫tt−ρ(t)∫tπe−2ε1(t−s)˙ηT(s)H12˙η(s)dsdπ,VH2(t)=(t0,i+1−t)∫ttσie2ε2(t−s)˙ηT(s)H21˙η(s)ds+(t0,i+1−t)∫ttσi∫tπe2ε2(t−s)˙ηT(s)H22˙η(s)dsdπ, |
and Pj∈Rni+,j={1,2},Qj∈Rni+,Hjl∈Rni+,l={1,2}, and εj>0.
Now, in this paper, the event-triggered, non-fragile control issue subject to DoS attacks to be addressed is formulated: Given DoS parameters Ton=max{|Gion|} and Toff=min{|Gioff|} for i∈N, co-design an event-triggering parameter F in (2.9) and a non-fragile, output-feedback controller in (2.10) to ensure the exponential synchronization of M and S under DoS attacks, that is, there exist two constants b>0 and a>0 such that error system (2.12) meets
‖η(t)‖≤be−atsup−ˉτ≤τ≤0‖η(τ),˙η(τ)‖, | (2.15) |
where ˉτ=max{θ,h},ϵ is the decay coefficient, and a is the decay rate.
In this section, based on the switching ETS, we will provide a criterion to achieve the synchronization of the NN with time delay under DoS attacks, and then, an output-feedback control method is given by considering the gain perturbation. Before starting our main results, we introduce the following useful lemmas, which will be used in our later derivation.
Lemma 1. [34] Given E=ET, matrices E and L having suitable dimensions, and then
E+EΛL+LTΛTET≤0 |
with Λ meeting ΛTΛ≤I, if there exists υ>0 such that
[EEυLT∗−υI0∗∗−υI]≤0. |
Lemma 2. [35] For vector function ς:[a,b)→Rni, matrices H∈Rni+,L1,L3∈R3ni+,L2∈R3ni×3ni, and S1,S3∈R3ni×ni satisfy
[L1L2S1∗L3S2∗∗H]≥0, |
and one has
−∫ba˙ςT(s)H˙ς(s)ds≤ψT(t)Φψ(t), |
where
ψ(t)=col{ς(b),ς(a),1b−a∫baς(s)ds},Φ=(b−a)(L1+13L3)+He(S1Π1+S2Π2),Π1=ˉd1−ˉd2,Π2=2ˉd3−ˉd1−ˉd2,ˉd1=[I,0,0],ˉd2=[0,I,0],ˉd3=[0,0,I]. |
Lemma 3. [36,37] Given a real scalar b>0, if there exist real matrices Z,Λa,Γa, and ϝa(a=1,…ni) such that
[ZΛ1+bΓ1+⋯+Λni+bΓni∗diag{−bϝ1−bϝT1−⋯−bϝni−bϝTni}]<0 |
holds, then one has
Z+ni∑a=1He(Λaϝ−1aΓTa)<0. |
Lemma 4. For known parameters Ton and Toff, the output-feedback control gain matrix K, and some scalars 0<μ<1, 0<h<Toff, and εj>0,j={1,2}, if we have Pj∈Rni+,Qj∈Rni+,R1,R3∈R3ni+,Hjl∈Rni+,l={1,2},F∈Rni+, diagonal matrices Υjω>0,ω={0,1,2}, and matrices R2∈R3ni×3ni,Zj∈R3ni×ni,Γ1ω and Γ2ω such that the following inequalities hold
Θ0+hΣs<0,s=1,2, | (3.1) |
Θ1<0, | (3.2) |
Θ2+TonΣs<0,s=3,4,<0, | (3.3) |
[R1R2Z1∗R3Z2∗∗Hjl]≥0, | (3.4) |
where
dm=[0ni×(m−1)ni,I,0ni×(7−m)ni],m=1,⋯,7,Θ0=dT1Θ01d1+dT5Θ02d5+He(Θ03)−2e−2ε1hUT4H12U4−dT6Υ10d6−dT7Υ20d7+dT2h24H12d2+ˉΓ0,Θ01=2ε1P1+Q1−Φ1Υ10,Θ02=−e−2ε1θQ1−Φ1Υ20,Θ03=dT1P1d2+dT1Φ2Υ10d6+dT5Φ2Υ20d7+e−2ε1h(UT1Z1U2+UT1Z2U3),ˉΓ0=He([dT1ΓT10+dT2ΓT20][−d2−Ad1+W0d6+W1d7−ˉBd3]),Σ1=dT2H11d2,Σ2=e−2ε1hUT1(R1+13R3)U1,U1=col{d1,d3,d4},U2=d1−d3,U3=2d4−d1−d3,U4=d1−d4,Θ1=dT1Θ11d1+dT4Θ12d4+He(Θ13)−dT3Fd3−dT5Υ11d5−dT6Υ21d6+ˉΓ1,Θ11=2ε1P1+Q1+μCTFC−Φ1Υ11,Θ12=−e−2ε1θQ1−Φ1Υ21,Θ13=dT1P1d2+dT1Φ2Υ11d5+dT4Φ2Υ21d6,ˉΓ1=He([dT1ΓT11+dT2ΓT21][−d2−ˉAd1+W0d5+W1d6−ˉBd3]),Θ2=dT1Θ21d1+dT5Θ22d5+He(Θ23)−2UT4H22U4−dT6Υ12d6−dT7Υ22d7+ˉΓ2,Θ21=−2ε2P2+Q2−Φ1Υ12,Θ22=−e2ε1θQ2−Φ1Υ22,Θ23=dT1P2d2+dT1Φ2Υ12d6+dT5Φ2Υ22d7+UT1Z1U2+UT1Z2U3,ˉΓ2=He([dT1ΓT12+dT2ΓT22][−d2−Ad1+W0d6+W1d7]),Σ3=dT2H21d2,Σ4=UT1(R1+13R3)U1,Φ1=diag{Φ−1Φ+1,Φ−2Φ+2,…,Φ−niΦ+ni},Φ2=diag{Φ−1+Φ+12,Φ−2+Φ+22,…,Φ−ni+Φ+ni2}, |
then for t∈Gioff∪Gion, the functionals given in (2.14) meet
{V0(t)≤e−2ε1(t−tν,i)V0(tν,i),t∈[tν,i,tν,i+h)∩Gioff,V1(t)≤e−2ε1(t−tν,i−h)V1(tν,i+h),t∈[tν,i+h,tν+1,i)∩Gioff,V2(t)≤e2ε2(t−tσi)V2(tσi),t∈Gion. | (3.5) |
Proof. By (2.3), for positive diagonal matrices Υ1ω and Υ2ω with ω=0,1,2, it can be obtained that
ξT(t)ˉΥωξ(t)≥0, | (3.6) |
where
ξ(t)=col{η(t),η(t−θ),ϕ(η(t)),ϕ(η(t−θ))}ˉΥω=[−Φ1Υ1ω0Φ2Υ1ω0∗−Φ1Υ2ω0Φ2Υ2ω∗∗−Υ1ω0∗∗∗−Υ2ω]. |
DoS-free case: For t∈[tν,i,tν,i+h)∩Gioff (i,ν∈N) along the trajectories of error system (2.12) with j=1, we have
˙V0(t)=˙VP1(t)+˙VH1(t), |
where
˙VP1(t)=−2ε1VP1(t)+2ε1ηT(t)P1η(t)+2ηT(t)P1˙η(t)+ηT(t)Q1η(t)−ηT(t+θ)e−2ε1θQ1η(t+θ), | (3.7) |
by ˙η(t−ρ(t))=(1−˙ρ(t))˙η(t−ρ(t))=0, 0, which yields
˙VH1(t)=−2ε1VH1(t)+(h−ρ(t))˙ηT(t)H11˙η(t)+(h−ρ(t))ρ(t)˙ηT(t)H12˙η(t)−∫tt−ρ(t)e−2ε1(t−s)˙ηT(s)H11˙η(s)ds−∫tt−ρ(t)∫tπe−2ε1(t−s)˙ηT(s)H12˙η(s)dsdπ. | (3.8) |
By Lemma 2, the fourth term in (3.8) can be reformed as
−∫tt−ρ(t)e−2ε1(t−s)˙ηT(s)H11˙η(s)ds≤−e−2ε1hζT0(t)[ρ(t)UT1(R1+13R3)U1+He(UT1Z1U2+UT1Z2U3)]ζ0(t), | (3.9) |
where
ζ0(t)=col{η(t),˙η(t),η(t−ρ(t)),1ρ(t)∫tt−ρ(t)˙η(s)ds,η(t−θ),ϕ(η(t)),ϕ(η(t−θ))}. |
Furthermore, based on Lemma 1 in [38], we get
∫tt−ρ(t)∫tπe−2ε1(t−s)˙ηT(s)H12˙η(s)dsdπ≤−2e−2ε1hζT0(t)UT4H12U4ζ0(t). | (3.10) |
For free-weighting matrices Γ10 and Γ20 with appropriate dimensions, the following expression holds:
0=2[ηT(t)ΓT10+˙ηT(t)ΓT20][−˙η(t)−ˉAη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))+ˉB∫tt−ρ(t)˙η(s)ds]. | (3.11) |
By (h−ρ(t))ρ(t)≤[(h−ρ(t))+ρ(t)]24=h24 and ω=0, we have from (3.6)–(3.10) that
˙V0(t)≤−2ε1V0(t)+ζT0(t)(Θ0+(h−ρ(t))Σ1+ρ(t)Σ2)ζ0(t). | (3.12) |
Θ0+(h−ρ(t))Σ1+ρ(t)Σ2<0 in inequality (3.12) is equivalent to Θ0+hΣ1<0 and Θ0+hΣ2<0, which can be ensured by (3.1). This means that
˙V0(t)≤−2ε1V0(t). |
For t∈[tν,i+h,tν+1,i)∩Gioff (i,ν∈N), (2.13) implies that
0≤μηT(t)CTFCη(t)−zT(t)Fz(t). | (3.13) |
Following the similar lines of the previous ˙V0(t), we have
0=2[ηT(t)ΓT11+˙ηT(t)ΓT21][−˙η(t)−ˉAη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))−ˉBz(t)], | (3.14) |
and for matrices Υ1ω and Υ2ω with ω=1,
ξT(t)ˉΥ1ξ(t)≥0. | (3.15) |
By combining (3.13)–(3.15) with (3.2), it can be acquired that
˙V1(t)+2ε1V1(t)≤ζT1(t)Θ1ζ1(t)<0, |
where ζ1(t)=col{η(t),˙η(t),z(t),η(t−θ),ϕ(η(t)),ϕ(η(t−θ))}.
DoS case: Same as the proof of ˙V0(t), for any matrices Γ12 and Γ22 with appropriate dimensions, we have
0=2[ηT(t)ΓT12+˙ηT(t)ΓT22][−˙η(t)−Aη(t)+W0ϕ(η(t))+W1ϕ(η(t−θ))], | (3.16) |
and for matrices Υ1ω and Υ2ω with ω=2,
ξT(t)ˉΥ2ξ(t)≥0. | (3.17) |
Along the trajectories of error system (2.12) with j=2 and by integrating (3.16) and (3.17), we have
˙V2(t)≤2ε2V2(t)+ζT2(t)(Θ2+(t0,i+1−t)Σ3+(t−tσi)Σ4+(t0,i+1−t)(t−tσi)H22)ζ2(t), | (3.18) |
where ζ2(t)=col{η(t),˙η(t),η(tσi),1t−tσi∫ttσiη(s)ds,η(t−θ),ϕ(η(t)),ϕ(η(t−θ))}. Further, Θ2+(t0,i+1−t)Σ3+(t−tσi)Σ4+(t0,i+1−t)(t−tσi)H22<0 is equivalent to Θ2+TonΣ3<0 and Θ2+TonΣ4<0, which is guaranteed by (3.3). It can be concluded that
˙V2(t)≤2ε2V2(t). |
Thereby, based on the above discussions, (3.1)–(3.4) can guarantee that (3.5) holds. This completes the proof.
Remark 3. Owing to the introduction of mechanism (2.9), a time-dependent PLKF (i.e., V(t)) is designed in this study to match the switched system in (2.12). More specifically, the time-dependent function V0(t) is constructed for the sub-interval [tν,i,tν,i+h)∩Gioff, the time-independent function V1(t) is employed for the sub-interval [tν,i+h,tν+1,i)∩Gioff, and the time-dependent function V2(t) is devised for the active-attack interval Gion. In the light of Lemma 2, the free-weighting matrices method, and Schur's complement, the exponential decay estimate of V(t) along the trajectories of the synchronization error system in (2.12) is given in Lemma 4.
Provided that feedback gain K is known, we provide the following theorem for the exponential stability of the error system in (2.12) with jamming attacks (2.7). Further, the following result is obtained.
Theorem 1. For known parameters Ton and Toff, the output-feedback gain matrix K, and some scalars 0<μ<1, 0<h<Toff,αj>1, and εj>0,j={1,2}, the event-based switched synchronization error system in (2.12) is exponentially stable under DoS attacks, if there exist matrices Pj∈Rni+,Qj∈Rni+,R1,R3∈R3ni+,Hjl∈Rni+,l={1,2},F∈Rni+, diagonal matrices Υjω>0,ω={0,1,2}, and matrices R2∈R3ni×3ni,Zj∈R3ni×ni,Γ1ω and Γ2ω such that (3.1)–(3.4) and the following inequalities hold:
{P1≤α2P2,P2≤α1P1, | (3.19) |
0<δ=2ε1Toff−2ε2Ton−ln(α1α2), | (3.20) |
and the decay rate φ=δ2(Toff+Ton).
Proof. In the light of (3.5) in Lemma 4, it is obtained that for ∀t≥0,
V(t)≤{e−2ε1(t−tν,i)V0(tν,i),t∈[tν,i,tν,i+h)∩Gioff,e−2ε1(t−tν,i−h)V1(tν,i+h),t∈[tν,i+h,tν+1,i)∩Gioff,e2ε2(t−tσi)V2(tσi),t∈Gion. | (3.21) |
It is observed from (3.21) that the values of V0(t) and V1(t) coincide at the switching instants tν,i and tν,i+h,which implies that V(t) is continuous over the whole Toff time interval.
When tσi−tν,i≥h,V(t) will switch from V1(t) to V2(t). By (3.19), we have
{V0(t0,i)=V1(t0,i)≤α2V2(t−0,i),V2(tσi)≤α1V1(t−σi). | (3.22) |
When tσi−tν,i<h,V(t) will switch from V0(t) to V2(t). We obtain from (3.19) that
{V0(t0,i)=V1(t0,i)≤α2V2(t−0,i),V2(tσi)≤α1V1(t−σi)≤α1V0(t−σi), | (3.23) |
where V(t−0,i)=limt→t−0,iV(t) and V(t−σi)=limt→t−σiV(t).
We can find an i∈N for ∀t≥0 to guarantee t∈[t0,i,tσi) or t∈[tσi,t0,i+1). Therefore, we consider the following two cases:
DoS-free case: For t∈[t0,i,tσi), we get from (3.21)–(3.23) that
V(t)≤e−2ε1(t−t0,i)V0(t0,i)≤α2e−2ε1(t−t0,i)V2(t−0,i)≤α2e−2ε1(t−t0,i)e2ε2(t0,i−tσi−1)V2(tσi−1)≤α1α2e−2ε1(t−t0,i)e2ε2(t0,i−tσi−1)V1(t−σi−1)≤α1α2e−2ε1(t−t0,i+tσi−1−t0,i−1)×e2ε2(t0,i−tσi−1)V0(t0,i−1)⋯≤e−δiV0(0). |
Notice that t<tσi=i(Toff+Ton)+Toff, i.e., i>t−ToffToff+Ton, and it follows that
V(t)≤V0(0)eδToffToff+Tone−δtToff+Ton. | (3.24) |
DoS case:For t∈[tσi,t0,i+1), following the similar lines of the previous DoS-free case, it is easy to get
V(t)≤V0(0)α2e−δtToff+Ton. | (3.25) |
Set λ0=max{δToffToff+Ton,1α2},λ1=min{λmin(Pj)},λ2=max{λmax(Pj)}, and λ3=λ2+θλmax(Q1). Then we can deduce that
V(t)≤λ0e−δtToff+TonV0(0). | (3.26) |
According to the definition of V(t) in (2.14), we have for ∀t≥0,
V(t)≥λ1‖r(t)‖2,V0(0)≤λ3‖ϖ(0)‖2τ. | (3.27) |
Combining (3.26) and (3.27), we have
‖r(t)‖≤√λ0λ3λ1e−φt‖ϖ(0)‖τ,∀t≥0. | (3.28) |
From (2.15), (3.20) and (3.28), it can be concluded that synchronization error system (2.12) is exponentially stable with the decay rate φ. This completes the proof.
This section concentrates on solving the non-fragile exponential synchronization problem. A co-design method for the desired non-fragile controller K and event-triggering parameter F is presented.
Theorem 2. For known parameters Ton and Toff, matrices Jj, M and N, some scalars 0<μ<1, 0<h<Toff,γ>0, and εj>0,j={1,2}, the event-based switched synchronization error system in (2.12) is exponentially stable under DoS attacks, if there exist matrices Pj∈Rni+,Qj∈Rni+,R1,R3∈R3ni+,Hjl∈Rni+,l={1,2},F∈Rni+, diagonal matrices Υjω>0,ω={0,1,2}, and matrices R2∈R3ni×3ni,Zj∈R3ni×ni,Γ1ω, Γ2ω, X, Y, and υm>0, m={0,1}, such that (3.3), (3.4), (3.19), (3.20), and the following inequalities hold:
Ωm=[Ωm11Ωm12∗−γX−γXT]<0, | (3.29) |
where
Ωm11=ˉΘm+He(ΓJmYˉΓCm),Ωm12=ˉΓBm−ΓJmX+γˉΓTCmYT,ˉΘm=[ˆΘmΓmBΔυmΓmTCΔ∗−υmI0∗∗−υmI],ˆΘ0=dT1Θ01d1+dT5Θ02d5+He(Θ03)−2e−2ε1hUT4H12U4−dT6Υ10d6−dT7Υ20d7+dT2h24H12d2+ˆΓ0+hΣs,s={1,2},ˆΓ0=He([dT1ΓT10+dT2ΓT20][−d2−Ad1+W0d6+W1d7−Bd3]),ˆΘ1=dT1Θ11d1+dT4Θ12d4+He(Θ13)−dT3Fd3−dT5Υ11d5−dT6Υ21d6+ˆΓ1,ˆΓ1=He([dT1ΓT11+dT2ΓT21][−d2−Ad1+W0d5+W1d6−Bd3]) |
with
ΓJ0=col{JT1,JT2,0,0,0,0,0,0,0},ˉΓC0=[0,0,−C,0,0,0,0,0,0],ˉΓB0=col{ΓT10B,ΓT20B,0,0,0,0,0,0,0},Γ0BΔ=col{ΓT10BM,ΓT20BM,0,0,0,0,0},Γ0CΔ=[0,0,−NC,0,0,0,0],ΓJ1=col{JT1,JT2,0,0,0,0,0,0},ˉΓC1=[−C,0,−C,0,0,0,0,0],ˉΓB1=col{ΓT11B,ΓT21B,0,0,0,0,0,0},Γ1BΔ=col{ΓT11BM,ΓT21BM,0,0,0,0},Γ1CΔ=[−NC,0,−NC,0,0,0], |
and the other symbols are the same as those in Lemma 4. On such ground, the output-feedback controller in (2.5) is given by K=X−1Y.
Proof. For t∈[tν,i,tν,i+h)∩Gioff, using Shur's complement, (3.1) can be rewritten as
ˇΘs0+He(ΓB0ΔKΓC0)<0, |
where
ˇΘs0=dT1Θ01d1+dT5Θ02d5+He(Θ03)−2e−2ε1hUT4H12U4−dT6Υ10d6−dT7Υ20d7+dT2h24H12d2+ˇΓ0+hΣs,s=1,2,ˇΓ0=He([dT1ΓT10+dT2ΓT20][−d2−Ad1+W0d6+W1d7−BKCd3]),ΓB0=col{ΓT10B,ΓT20B,0,0,0,0,0},ΓC0=[0,0,−C,0,0,0,0]. |
By applying Lemma 1 and (2.6), there exists a scalar υ0 such that
[ˇΘs0Γ0BΔυ0Γ0TCΔ∗−υ0I0∗∗−υ0I]<0. | (3.30) |
Then (3.30) can be reorganized as
ˉΘ0+He(ˉΓB0KˉΓC0)<0. | (3.31) |
By K=X−1Y, (3.31) can be rearranged as
ˉΘ0+He(ΓJ0YˉΓC0+(ˉΓB0−ΓJ0X)X−1YˉΓC0)<0. | (3.32) |
Similar, for t∈[tν,i+h,tν+1,i)∩Gioff,Θ1<0 in (3.2) can be reorganized as
ˉΘ1+He(ΓJ1YˉΓC1+(ˉΓB1−ΓJ1X)X−1YˉΓC1)<0. | (3.33) |
By Lemma 3, (3.32) and (3.33) can be ensured by (3.29). This completes the proof.
Remark 4. By using Lemmas 1 and 3, a novel method is proposed to co-design the non-fragile output-feedback controller and event-triggering parameter for guaranteeing synchronization error system (2.12) subject to DoS attacks to be exponentially stable in Theorem 2 is presented. Such as in Algorithm 1, if conditions (3.3), (3.4), (3.19), (3.20), and (3.29) are feasible, then the desired control gain and event-triggering parameter can be acquired.
Algorithm 1 Solution Algorithm for Theorem 2 |
Step 1. Given parameters Ton,Toff,γ>0, matrices Jj,j={1,2}, M, N, and choosing small parameters 0<μ<1,0<h<Toff,αj>1, and εj>0 to satisfy (3.20), if there is a solution for (3.3), (3.4), (3.19), (3.20), and (3.29), the algorithm ends. If there is no solution, we turn to Step 2. |
Step 2. Adjust the values of Ton,Toff,γ,μ,h,αj,εj>0,j={1,2}, to satisfy (3.20). If the solution is found, the algorithm ends. If there is no solution, turn to Step 3. |
Step 3. Reselect a larger and returning Step 2 until the solution is found, i.e., obtain the controller gain K=X−1Y and event-triggering parameter F. |
Remark 5. In Theorems 1 and 2, the event-triggered synchronization control problem of NNs under DoS attacks is studied, in which the proposed control scheme can not only reduce the burden of the network but also offset network attacks. Therefore, the theoretical results obtained in this paper make the synchronization of NNs more reliable in many applications, such as secure communication, system identification and control, image encryption, and others.
Consider M in (2.1) with the following parameters [39]:
A=diag{1,1},θ=1,J(t)=0,W0=[1.8−0.1−2.00.4],W1=[−1.7−0.60.5−2.5],ϕ(x(t))=[tanh(x1(t))tanh(x2(t))],ϕ(ˆx(t))=[tanh(ˆx1(t))tanh(ˆx2(t))]. |
Set the initial values x(s)=[00.3]T and ˆx(s)=[−0.1−0.3]T(s∈[−θ,0]). When there is no controller, the state responses of M and S are shown in Figure 2, in which we can observe that the state x(t) of M in (2.1) and the state ˆx(t) of S in (2.2) cannot be synchronized. This means the system is unstable.
In what follows, we display the validity of the proposed method. Choose
B=[0.7−0.20.10.5],C=diag{1,1},M=diag{0.5,0.5},N=diag{0.2,0.2},Φ1=0,Φ2=diag{0.5,0.5},J1=J2=B,h=0.12,ε1=0.10,ε2=0.50,α1=α2=1.01,μ=0.05,γ=0.01,Ton=0.65,Toff=3.35. |
Then, by solving the LMIs (3.3), (3.4), (3.19), (3.20), and (3.29), the corresponding controller gain and event-triggering parameter can be obtained:
K=[10.09213.3191−5.380519.1021],F=[8.9110−1.4354−1.43546.9984]. |
When the system has controller (2.10), the state responses of M and S are shown in Figure 3, from which we can see that the state x(t) of M in (2.1) and the state ˆx(t) of S in (2.2) can achieve synchronization as time increases under DoS attacks. Moreover, the state response of error system (2.12) and control input u(t) (2.10) are depicted in Figures 4 and 5. Therefore, we conclude that the designed non-fragile, output-feedback controller and the ETS are valid. In addition, we give Table 1 to compare the amount of sent measurements (SMs) by different ETS methods. From Table 1, we see that as h increases, the amount of sent measurements (SMs) decreases. Moreover, the proposed ETS in (2.9) can reduce the number of false triggers compared with the continuous ETS in [40].
h | SMs of the ETS (2.9) | SMs of the ETS in [40] |
0.06 | 84 | 119 |
0.09 | 58 | |
0.12 | 50 | |
0.15 | 47 |
The synchronization problem for time-delay NNs under the coaction of non-fragility, ETS, and DoS attacks has been addressed in this paper. A novel ETS based on switching between periodic sampling and the continuous ETS has been proposed, which not only can cut down the number of data transmissions but also offset cyberattacks. By choosing a suitable PLKF and using some free-weighting matrices, sufficient conditions have been established to ensure the synchronization error system to be exponentially stable. Finally, a numerical example has been given to illustrate the usefulness of the proposed approach. In the near future, we will discuss the finite-time synchronization control of neural networks with an adaptive event-triggered scheme under other attacks, such as deception attacks or hybrid attacks [41,42,43].
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this paper.
This work was supported in part by the Industrial Control Field Active Defense Security Framework Core Technology Project-Research on Industrial Control Security Threat Detection and Early Warning Technology (No. KY2024YF0004).
All authors declare no conflicts of interest in this paper.
[1] |
S. Lakshmanan, M. Prakash, C. P. Lim, R. Rakkiyappan, P. Balasubramaniam, S. Nahavandi, Synchronization of an inertial neural network with time-varying delays and its application to secure communication, IEEE Trans. Neural Networks Learn. Syst., 29 (2018), 195–207. https://doi.org/10.1109/TNNLS.2016.2619345 doi: 10.1109/TNNLS.2016.2619345
![]() |
[2] |
H. Huang, G. Feng, J. Cao, An LMI approach to delay-dependent state estimation for delayed neural networks, Neurocomputing, 71 (2008), 2857–2867. https://doi.org/10.1016/j.neucom.2007.08.008 doi: 10.1016/j.neucom.2007.08.008
![]() |
[3] |
Y. Liu, Z. Wang, X. Liu, Global exponential stability of generalized recurrent neural networks with discrete and distributed delays, Neural Networks, 19 (2006), 667–675. https://doi.org/10.1016/j.neunet.2005.03.015 doi: 10.1016/j.neunet.2005.03.015
![]() |
[4] |
Y. Zhao, H. Wu, Fixed/Prescribed stability criterions of stochastic system with time-delay, AIMS Math., 9 (2024), 14425–14453. https://doi.org/10.3934/math.2024701 doi: 10.3934/math.2024701
![]() |
[5] | Z. Yan, X. Huang, Y. Fan, J. Xia, H. Shen, Threshold-function-dependent quasi-synchronization of delayed memristive neural networks via hybrid event-triggered control, IEEE Trans. Syst. Man Cybern.: Syst., 51, (2021), 6712–6722. https://doi.org/10.1109/TSMC.2020.2964605 |
[6] |
C. Yi, J. Cai, R. Guo, Synchronization of a class of nonlinear multiple neural networks with delays via a dynamic event-triggered impulsive control strategy, Electron. Res. Arch., 32 (2024), 4581–4603. https://doi.org/10.3934/era.2024208 doi: 10.3934/era.2024208
![]() |
[7] |
X. Hou, H. Wu, J. Cao, Observer-based prescribed-time synchronization and topology identification for complex networks of piecewise-smooth systems with hybrid impulses, Comp. Appl. Math., 43 (2024), 1–19. https://doi.org/10.1007/s40314-024-02701-x doi: 10.1007/s40314-024-02701-x
![]() |
[8] |
W. Zhao, K. Li, Y. Shi, Exponential synchronization of neural networks with mixed delays under impulsive control, Electron. Res. Arch., 32 (2023), 5286–5305. https://doi.org/10.3934/era.2024244 doi: 10.3934/era.2024244
![]() |
[9] |
H. Ren, Z. Peng, Y. Gu, Fixed-time synchronization of stochastic memristor-based neural networks with adaptive control, Neural Networks, 130 (2020), 165–175. https://doi.org/10.1016/j.neunet.2020.07.002 doi: 10.1016/j.neunet.2020.07.002
![]() |
[10] |
L. Wang, H. He, Z. Zeng, Global synchronization of fuzzy memristive neural networks with discrete and distributed delays, IEEE Trans. Fuzzy Syst., 28 (2020), 2022–2034. https://doi.org/10.1109/TFUZZ.2019.2930032 doi: 10.1109/TFUZZ.2019.2930032
![]() |
[11] |
X. Yang, Y. Liu, J. Cao, L. Rutkowski, Synchronization of coupled time-delay neural networks with mode-dependent average dwell time switching, IEEE Trans. Neural Networks Learn. Syst., 31 (2020), 5483–5496. https://doi.org/10.1109/TNNLS.2020.2968342 doi: 10.1109/TNNLS.2020.2968342
![]() |
[12] |
J. Zhou, J. Dong, X. Su, C. K. Ahn, Input-to-state stabilization for Markov jump systems with dynamic quantization and multimode injection attacks, IEEE Trans. Syst. Man Cybern.: Syst., 54 (2024), 2517–2529. https://doi.org/10.1109/TSMC.2023.3344869 doi: 10.1109/TSMC.2023.3344869
![]() |
[13] |
G. Ran, C. Li, R. Sakthivel, C. Han, B. Wang, J. Liu, Adaptive event-triggered asynchronous control for interval type-2 fuzzy Markov jump systems with cyberattacks, IEEE Trans. Control Network Syst., 9 (2022), 88–99. https://doi.org/10.1109/TCNS.2022.3141025 doi: 10.1109/TCNS.2022.3141025
![]() |
[14] |
M. Zhu, S. Martinez, On the performance analysis of resilient networked control systems under replay attacks, IEEE Trans. Autom. Control, 59 (2014), 804–808. https://doi.org/10.1109/TAC.2013.2279896 doi: 10.1109/TAC.2013.2279896
![]() |
[15] |
J. Zhou, D. Xu, W. Tai, C. K. Ahn Switched event-triggered H∞ security control for networked systems vulnerable to aperiodic DoS attacks, IEEE Trans. Network Sci. Eng., 10 (2023), 2109–2123. https://doi.org/10.1109/TNSE.2023.3243095 doi: 10.1109/TNSE.2023.3243095
![]() |
[16] |
S. Hu, D. Yue, X. Xie, X. Chen, X. Yin, Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks, IEEE Trans. Cybern., 49 (2019), 4271–4281. https://doi.org/10.1109/TCYB.2018.2861834 doi: 10.1109/TCYB.2018.2861834
![]() |
[17] |
S. Hu, D. Yue, Q. L. Han, X. Xie, X. Chen, C. Dou, Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks, IEEE Trans. Cybern., 50 (2020), 1952–1964. https://doi.org/10.1109/TCYB.2019.2903817 doi: 10.1109/TCYB.2019.2903817
![]() |
[18] |
D. Liu, D. Ye, Cluster synchronization of complex networks under denial-of-service attacks with distributed adaptive strategies, IEEE Trans. Control Network Syst., 9 (2022), 334–343. https://doi.org/10.1109/TCNS.2021.3102012 doi: 10.1109/TCNS.2021.3102012
![]() |
[19] |
J. Liu, W. Suo, L. Zha, E. Tian, X. Xie, Security distributed state estimation for nonlinear networked systems against DoS attacks, Int. J. Robust Nonlinear Control, 30 (2020), 1156–1180. https://doi.org/10.1002/rnc.4815 doi: 10.1002/rnc.4815
![]() |
[20] |
S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient H∞ filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Trans. Syst. Man Cybern.: Syst., 51 (2021), 1392–1403. https://doi.org/10.1109/TSMC.2019.2896249 doi: 10.1109/TSMC.2019.2896249
![]() |
[21] |
X. Chen, P. Yuan, Event-triggered generalized dissipative filtering for delayed neural networks under aperiodic DoS jamming attacks, Neurocomputing, 400 (2020), 467–479. https://doi.org/10.1016/j.neucom.2019.03.088 doi: 10.1016/j.neucom.2019.03.088
![]() |
[22] |
X. Chen, Y. Wang, S. Hu, Event-triggered quantized H∞ control for networked control systems in the presence of denial-of-service jamming attacks, Nonlinear Anal. Hybrid Syst., 33 (2019), 265–281. https://doi.org/10.1016/j.nahs.2019.03.005 doi: 10.1016/j.nahs.2019.03.005
![]() |
[23] |
N. Zhao, P. Shi, W. Xing, J. Chambers, Observer-based event-triggered approach for stochastic networked control systems under denial of service attacks, IEEE Trans. Control Network Syst., 8 (2021), 158–167. https://doi.org/10.1109/TCNS.2020.3035760 doi: 10.1109/TCNS.2020.3035760
![]() |
[24] |
E. Fridman, A refined input delay approach to sampled-data control, Automatica, 46 (2010), 421–427. https://doi.org/10.1016/j.automatica.2009.11.017 doi: 10.1016/j.automatica.2009.11.017
![]() |
[25] |
Y. Yao, J. Tan, J. Wu, X. Zhang, A unified fuzzy control approach for stochastic high-order nonlinear systems with or without state constraints, IEEE Trans. Fuzzy Syst., 30 (2022), 4530–4540. https://doi.org/10.1109/TFUZZ.2022.3155297 doi: 10.1109/TFUZZ.2022.3155297
![]() |
[26] |
X. Zhao, H. Wu, J. Cao, L. Wang, Prescribed-time synchronization for complex dynamic networks of piecewise smooth systems: a hybrid event-triggering control approach, Qual. Theory Dyn. Syst., 24 (2025), 11. https://doi.org/10.1007/s12346-024-01166-x doi: 10.1007/s12346-024-01166-x
![]() |
[27] |
W. Wu, L. He, J. Zhou, Z. Xuan, S. Arik, Disturbance-term-based switching event-triggered synchronization control of chaotic Lurie systems subject to a joint performance guarantee, Commun. Nonlinear Sci. Numer. Simul., 115 (2022), 106774. https://doi.org/10.1016/j.cnsns.2022.106774 doi: 10.1016/j.cnsns.2022.106774
![]() |
[28] |
Y. Cao, S. Wang, Z. Guo, T. Huang, S. Wen, Synchronization of memristive neural networks with leakage delay and parameters mismatch via event-triggered control, Neural Network, 119 (2019), 178–189. https://doi.org/10.1016/j.neunet.2019.08.011 doi: 10.1016/j.neunet.2019.08.011
![]() |
[29] |
Y. Tan, Y. Liu, B. Niu, S. Fei, Event-triggered synchronization control for T–S fuzzy neural networked systems with time delay, J. Franklin Inst., 357 (2020), 5934–5953. https://doi.org/10.1016/j.jfranklin.2020.03.024 doi: 10.1016/j.jfranklin.2020.03.024
![]() |
[30] | A. Selivanov, E. Fridman, A switching approach to event-triggered control, in 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, (2015), 5468–5473. https://doi.org/10.1109/CDC.2015.7403076 |
[31] |
P. Zeng, F. Deng, X. Liu, X. Gao, Event-triggered H∞ control for network-based uncertain Markov jump systems under dos attacks, J. Franklin Inst., 358 (2021), 2895–2914. https://doi.org/10.1016/j.jfranklin.2021.01.026 doi: 10.1016/j.jfranklin.2021.01.026
![]() |
[32] |
Y. Yao, J. Tan, J. Wu, X. Zhang, Event-triggered fixed-time adaptive neural dynamic surface control for stochastic non-triangular structure nonlinear systems, Inf. Sci., 569 (2021), 527–543. https://doi.org/10.1016/j.ins.2021.05.028 doi: 10.1016/j.ins.2021.05.028
![]() |
[33] |
Y. Yao, J. Tan, J. Wu, X. Zhang, Event-triggered fixed-time adaptive fuzzy control for state-constrained stochastic nonlinear systems without feasibility conditions, Nonlinear Dyn., 105 (2021), 403–416. https://doi.org/10.21203/rs.3.rs-322781/v1 doi: 10.21203/rs.3.rs-322781/v1
![]() |
[34] |
F. Yang, H. Dong, Z. Wang, W. Ren, F. E. Alsaadi, A new approach to non-fragile state estimation for continuous neural networks with time-delays, Neurocomputing, 197 (2016), 205–211. https://doi.org/10.1016/j.neucom.2016.02.062 doi: 10.1016/j.neucom.2016.02.062
![]() |
[35] |
H. B. Zeng, Y. He, M. Wu, J. She, Free-matrix-based integral inequality for stability analysis of systems with time-varying delay, IEEE Trans. Autom. Control, 60 (2015), 2768–2772. https://doi.org/10.1109/TAC.2015.2404271 doi: 10.1109/TAC.2015.2404271
![]() |
[36] |
J. Zhou, J. H. Park, Q. Ma, Non-fragile observer-based H∞ control for stochastic time-delay systems, Appl. Math. Comput., 291 (2016), 69–83. https://doi.org/10.1016/j.amc.2016.06.024 doi: 10.1016/j.amc.2016.06.024
![]() |
[37] |
W. Tai, X. Li. J. Zhou, S. Arik, Asynchronous dissipative stabilization for stochastic Markov-switching neural networks with completely-and incompletely-known transition rates, Neural Network, 161 (2023), 55–64. https://doi.org/10.1016/j.neunet.2023.01.039 doi: 10.1016/j.neunet.2023.01.039
![]() |
[38] |
J. Sun, G. P. Liu, J. Chen, D. Rees, Improved delay-range-dependent stability criteria for linear systems with time-varying delays, Automatica, 46 (2010), 466–470. https://doi.org/10.1016/j.automatica.2009.11.002 doi: 10.1016/j.automatica.2009.11.002
![]() |
[39] |
Z. Fei, C. Guan, H. Gao, Exponential synchronization of networked chaotic delayed neural network by a hybrid event trigger scheme, IEEE Trans. Neural Network Learn. Syst., 29 (2017), 2558–2567. https://doi.org/10.1109/TNNLS.2017.2700321 doi: 10.1109/TNNLS.2017.2700321
![]() |
[40] |
W. Li, H. Du, D. Ning, W. Li, S. Sun, J. Wei, Event-triggered H∞ control for active seat suspension systems based on relaxed conditions for stability, Mech. Syst. Signal Process., 149 (2024), 107210. https://doi.org/10.1016/j.ymssp.2020.107210 doi: 10.1016/j.ymssp.2020.107210
![]() |
[41] |
Y. Zhu, Y. Yao, Y. Kang, Y. Zhao, J. Tan, L. Gu, et al., Event-based enhancing prescribed performance control for stochastic non-triangular structure nonlinear systems: a MTBFs-based approach, Nonlinear Dyn., 113 (2025), 533–545. https://doi.org/10.1007/s11071-024-10242-5 doi: 10.1007/s11071-024-10242-5
![]() |
[42] |
Y. Yao, Y. Kang, Y. Zhao, P. Li, J. Tan, Prescribed-time output feedback control for cyber-physical systems under output constraints and malicious attacks, IEEE Trans. Cybern., 54 (2024), 6518–6530. https://doi.org/10.1109/TCYB.2024.3418384 doi: 10.1109/TCYB.2024.3418384
![]() |
[43] |
X. Hou, H. Wu, J. Cao, Practical finite-time synchronization for Lur'e systems with performance constraint and actuator faults: A memory-based quantized dynamic event-triggered control strategy, Appl. Math. Comput., 487 (2025), 129108. https://doi.org/10.1016/j.amc.2024.129108 doi: 10.1016/j.amc.2024.129108
![]() |
h | SMs of the ETS (2.9) | SMs of the ETS in [40] |
0.06 | 84 | 119 |
0.09 | 58 | |
0.12 | 50 | |
0.15 | 47 |