Research article

Robust neural network-driven control for multi-agent formation in the presence of Byzantine attacks and time delays

  • This paper presents an adaptive leader-follower formation control strategy for second-order nonlinear multi-agent systems with unknown dynamics. To handle system uncertainties, we used neural networks (NNs) to approximate and compensate for nonlinear effects. A key feature of our approach is its ability to deal with Byzantine attacks and time delays, which can disrupt coordination among agents. Unlike existing methods, our control strategy actively accounts for these challenges while ensuring stable formation tracking. Using Lyapunov stability theory, we proved that all system errors remain within a bounded range. Numerical simulations confirmed the effectiveness of our approach, showing that it successfully maintains formation control even in the presence of adversarial attacks and delays.

    Citation: Asad Khan, Azmat Ullah Khan Niazi, Saadia Rehman, Saba Shaheen, Taoufik Saidani, Adnan Burhan Rajab, Muhammad Awais Javeed, Yubin Zhong. Robust neural network-driven control for multi-agent formation in the presence of Byzantine attacks and time delays[J]. AIMS Mathematics, 2025, 10(6): 12956-12979. doi: 10.3934/math.2025583

    Related Papers:

    [1] Jawdat Alebraheem . Asymptotic stability of deterministic and stochastic prey-predator models with prey herd immigration. AIMS Mathematics, 2025, 10(3): 4620-4640. doi: 10.3934/math.2025214
    [2] Chuanfu Chai, Yuanfu Shao, Yaping Wang . Analysis of a Holling-type IV stochastic prey-predator system with anti-predatory behavior and Lévy noise. AIMS Mathematics, 2023, 8(9): 21033-21054. doi: 10.3934/math.20231071
    [3] Chuangliang Qin, Jinji Du, Yuanxian Hui . Dynamical behavior of a stochastic predator-prey model with Holling-type III functional response and infectious predator. AIMS Mathematics, 2022, 7(5): 7403-7418. doi: 10.3934/math.2022413
    [4] Yingyan Zhao, Changjin Xu, Yiya Xu, Jinting Lin, Yicheng Pang, Zixin Liu, Jianwei Shen . Mathematical exploration on control of bifurcation for a 3D predator-prey model with delay. AIMS Mathematics, 2024, 9(11): 29883-29915. doi: 10.3934/math.20241445
    [5] Francesca Acotto, Ezio Venturino . How do predator interference, prey herding and their possible retaliation affect prey-predator coexistence?. AIMS Mathematics, 2024, 9(7): 17122-17145. doi: 10.3934/math.2024831
    [6] Xuyang Cao, Qinglong Wang, Jie Liu . Hopf bifurcation in a predator-prey model under fuzzy parameters involving prey refuge and fear effects. AIMS Mathematics, 2024, 9(9): 23945-23970. doi: 10.3934/math.20241164
    [7] Saiwan Fatah, Arkan Mustafa, Shilan Amin . Predator and n-classes-of-prey model incorporating extended Holling type Ⅱ functional response for n different prey species. AIMS Mathematics, 2023, 8(3): 5779-5788. doi: 10.3934/math.2023291
    [8] Naret Ruttanaprommarin, Zulqurnain Sabir, Salem Ben Said, Muhammad Asif Zahoor Raja, Saira Bhatti, Wajaree Weera, Thongchai Botmart . Supervised neural learning for the predator-prey delay differential system of Holling form-III. AIMS Mathematics, 2022, 7(11): 20126-20142. doi: 10.3934/math.20221101
    [9] Xuegui Zhang, Yuanfu Shao . Analysis of a stochastic predator-prey system with mixed functional responses and Lévy jumps. AIMS Mathematics, 2021, 6(5): 4404-4427. doi: 10.3934/math.2021261
    [10] Wei Ou, Changjin Xu, Qingyi Cui, Yicheng Pang, Zixin Liu, Jianwei Shen, Muhammad Zafarullah Baber, Muhammad Farman, Shabir Ahmad . Hopf bifurcation exploration and control technique in a predator-prey system incorporating delay. AIMS Mathematics, 2024, 9(1): 1622-1651. doi: 10.3934/math.2024080
  • This paper presents an adaptive leader-follower formation control strategy for second-order nonlinear multi-agent systems with unknown dynamics. To handle system uncertainties, we used neural networks (NNs) to approximate and compensate for nonlinear effects. A key feature of our approach is its ability to deal with Byzantine attacks and time delays, which can disrupt coordination among agents. Unlike existing methods, our control strategy actively accounts for these challenges while ensuring stable formation tracking. Using Lyapunov stability theory, we proved that all system errors remain within a bounded range. Numerical simulations confirmed the effectiveness of our approach, showing that it successfully maintains formation control even in the presence of adversarial attacks and delays.



    Saddle point problems occur in many scientific and engineering applications. These applications inlcudes mixed finite element approximation of elliptic partial differential equations (PDEs) [1,2,3], parameter identification problems [4,5], constrained and weighted least squares problems [6,7], model order reduction of dynamical systems [8,9], computational fluid dynamics (CFD) [10,11,12], constrained optimization [13,14,15], image registration and image reconstruction [16,17,18], and optimal control problems [19,20,21]. Mostly iterative solvers are used for solution of such problem due to its usual large, sparse or ill-conditioned nature. However, there exists some applications areas such as optimization problems and computing the solution of subproblem in different methods which requires direct methods for solving saddle point problem. We refer the readers to [22] for detailed survey.

    The Finite element method (FEM) is usually used to solve the coupled systems of differential equations. The FEM algorithm contains solving a set of linear equations possessing the structure of the saddle point problem [23,24]. Recently, Okulicka and Smoktunowicz [25] proposed and analyzed block Gram-Schmidt methods using thin Householder QR factorization for solution of 2×2 block linear system with emphasis on saddle point problems. Updating techniques in matrix factorization is studied by many researchers, for example, see [6,7,26,27,28]. Hammarling and Lucas [29] presented updating of the QR factorization algorithms with applications to linear least squares (LLS) problems. Yousaf [30] studied QR factorization as a solution tools for LLS problems using repeated partition and updating process. Andrew and Dingle [31] performed parallel implementation of the QR factorization based updating algorithms on GPUs for solution of LLS problems. Zeb and Yousaf [32] studied equality constraints LLS problems using QR updating techniques. Saddle point problems solver with improved Variable-Reduction Method (iVRM) has been studied in [33]. The analysis of symmetric saddle point systems with augmented Lagrangian method using Generalized Singular Value Decomposition (GSVD) has been carried out by Dluzewska [34]. The null-space approach was suggested by Scott and Tuma to solve large-scale saddle point problems involving small and non-zero (2, 2) block structures [35].

    In this article, we proposed an updating QR factorization technique for numerical solution of saddle point problem given as

    Mz=f(ABBTC)(xy)=(f1f2), (1.1)

    which is a linear system where ARp×p, BRp×q (qp) has full column rank matrix, BT represents transpose of the matrix B, and CRq×q. There exists a unique solution z=(x,y)T of problem (1.1) if 2×2 block matrix M is nonsingular. In our proposed technique, instead of working with large system having a number of complexities such as memory consumption and storage requirements, we compute QR factorization of matrix A and then updated its upper triangular factor R by appending B and (BTC) to obtain the solution. The QR factorization updated process consists of updating of the upper triangular factor R and avoiding the involvement of orthogonal factor Q due to its expensive storage requirements [6]. The proposed technique is not only applicable for solving saddle point problem but also can be used as an updating strategy when QR factorization of matrix A is in hand and one needs to add matrices of similar nature to its right end or at bottom position for solving the modified problems.

    The paper is organized according to the following. The background concepts are presented in Section 2. The core concept of the suggested technique is presented in Section 3, along with a MATLAB implementation of the algorithm for problem (1.1). In Section 4 we provide numerical experiments to illustrate its applications and accuracy. Conclusion is given in Section 5.

    Some important concepts are given in this section. These concepts will be used further in our main Section 3.

    The QR factorization of a matrix SRp×q is defined as

    S=QR, QRp×p, RRp×q, (2.1)

    where Q is an orthogonal matrix and R is an upper trapezoidal matrix. It can be computed using Gram Schmidt orthogonalization process, Givens rotations, and Householder reflections.

    The QR factorization using Householder reflections can be obtained by successively pre-multiplying matrix S with series of Householder matrices HqH2H1 which introduces zeros in all the subdiagonal elements of a column simultaneously. The HRq×q matrix for a non-zero Householder vector uRq is in the form

    H=IqτuuT, τ=2uTu. (2.2)

    Householder matrix is symmetric and orthogonal. Setting

    u=t±||t||2e1, (2.3)

    we have

    Ht=tτuuTt=αe1, (2.4)

    where t is a non-zero vector, α is a scalar, ||||2 is the Euclidean norm, and e1 is a unit vector.

    Choosing the negative sign in (2.3), we get positive value of α. However, severe cancellation error can occur if α is close to a positive multiple of e1 in (2.3). Let tRq be a vector and t1 be its first element, then the following Parlett's formula [36]

    u1=t1||t||2=t21||t||22t1+||t||2=(t22++t2n)t1+||t||2,

    can be used to avoid the cancellation error in the case when t1>0. For further details regarding QR factorization, we refer to [6,7].

    With the aid of the following algorithm, the Householder vector u required for the Householder matrix H is computed.

    Algorithm 1 Computing parameter τ and Householder vector u [6]
    Input: tRq
    Output: u, τ
       σ=||t||22
       u=t,u(1)=1
       if (σ=0) then
         τ=0
       else
         μ=t21+σ
       end if
       if t10 then
        u(1)=t1μ
       else
         u(1)=σ/(t1+μ)
       end if
       τ=2u(1)2/(σ+u(1)2)
       u=u/u(1)

     | Show Table
    DownLoad: CSV

    We consider problem (1.1) as

    Mz=f,

    where

    M=(ABBTC)R(p+q)×(p+q), z=(xy)Rp+q, and f=(f1f2)Rp+q.

    Computing QR factorization of matrix A, we have

    ˆR=ˆQTA, ˆd=ˆQTf1, (3.1)

    where ˆRRp×p is the upper triangular matrix, ˆdRp is the corresponding right hand side (RHS) vector, and ˆQRp×p is the orthogonal matrix. Moreover, multiplying the transpose of matrix ˆQ with matrix Mc=BRp×q, we get

    Nc=ˆQTMcRp×q. (3.2)

    Equation (3.1) is obtained using MATLAB build-in command qr which can also be computed by constructing Householder matrices H1Hp using Algorithm 1 and applying Householder QR algorithm [6]. Then, we have

    ˆR=HpH1A, ˆd=HpH1f1,

    where ˆQ=H1Hp and Nc=HpH1Mc. It gives positive diagonal values of ˆR and also economical with respect to storage requirements and times of calculation [6].

    Appending matrix Nc given in Eq (3.2) to the right end of the upper triangular matrix ˆR in (3.1), we get

    ˊR=[ˆR(1:p,1:p)Nc(1:p,1:q)]Rp×(p+q). (3.3)

    Here, if the factor ˊR has the upper triangular structure, then ˊR=ˉR. Otherwise, by using Algorithm 1 to form the Householder matrices Hp+1Hp+q and applying it to ˊR as

    ˉR=Hp+qHp+1ˊR and ˉd=Hp+qHp+1ˆd, (3.4)

    we obtain the upper triangular matrix ˉR.

    Now, the matrix Mr=(BTC) and its corresponding RHS f2Rq are added to the ˉR factor and ˉd respectively in (3.4)

    ˉRr=(ˉR(1:p,1:p+q)Mr(q:p+q,q:p+q)) and ˉdr=(ˉd(1:p)f2(1:q)).

    Using Algorithm 1 to build the householder matrices H1Hp+q and apply it to ˉRr and its RHS ˉdr, this implies

    ˜R=Hp+qH1(ˉRMr), ˜d=Hp+qH1(ˉdf2).

    Hence, we determine the solution of problem (1.1) as ˜z=backsub(˜R,˜d), where backsub is the MATLAB built-in command for backward substitution.

    The algorithmic representation of the above procedure for solving problem (1.1) is given in Algorithm 2.

    Algorithm 2 Algorithm for solution of problem (1.1)
    Input: ARp×p, BRp×q, CRq×q, f1Rp, f2Rq
    Output: ˜zRp+q
       [ˆQ,ˆR]=qr(A), ˆd=ˆQTf1, and Nc=ˆQTMc
       ˆR(1:p,q+1:p+q)=Nc(1:p,1:q)
       if pp+q then
         ˉR=triu(ˆR), ˉd=ˆd
       else
         for m=p1 to min(p,p+q) do
           [u,τ,ˆR(m,m)]=householder(ˆR(m,m),ˆR(m+1:p,m))
           W=ˆR(m,m+1:p+q)+uTˆR(m+1:p,m+1:p+q)
           ˆR(m,m+1:p+q)=ˆR(m,m+1:p+q)τW
            if m<p+q then
             ˆR(m+1:p,m+1:p+q)=ˆR(m+1:p,m+1:p+q)τuW
           end if
           ˉd(m:p)=ˆd(m:p)τ(1u)(1uT)ˆd(m:p)
         end for
         ˉR=triu(ˆR)
       end if
       for m=1 to min(p,p+q) do
           [u,τ,ˉR(m,m)]=householder(ˉR(m,m),Mr(1:q,m))
           W1=ˉR(m,m+1:p+q)+uTMr(1:q,m+1:p+q)
           ˉR(m,m+1:p+q)=ˉR(m,m+1:p+q)τW1
           if m<p+q then
             Mr(1:q,m+1:p+q)=Mr(1:q,m+1:p+q)τuW1
           end if
           ˉdm=ˉd(m)
           ˉd(m)=(1τ)ˉd(m)τuTf2(1:q)
           f3(1:q)=f2(1:q)τuˉdmτu(uTf2(1:q))
       end for
       if p<p+q then
         [ˊQr,ˊRr]=qr(Mr(:,p+1:p+q))
         ˉR(p+1:p+q,p+1:p+q)=ˊRr
         f3=ˊQTrf2
       end if
       ˜R=triu(ˉR)
       ˜d=f3
       ˜z=backsub(˜R(1:p+q,1:p+q),˜d(1:p+q))

     | Show Table
    DownLoad: CSV

    To demonstrate applications and accuracy of our suggested algorithm, we give several numerical tests done in MATLAB in this section. Considering that z=(x,y)T be the actual solution of the problem (1.1) where x=ones(p,1) and y=ones(q,1). Let ˜z be our proposed Algorithm 2 solution. In our test examples, we consider randomly generated test problems of different sizes and compared the results with the block classical block Gram-Schmidt re-orthogonalization method (BCGS2) [25]. Dense matrices are taken in our test problems. We carried out numerical experiments as follow.

    Example 1. We consider

    A=A1+A12, B=randn(state,0), and C=C1+C12,

    where randn(state,0) is the MATLAB command used to reset to its initial state the random number generator; A1=P1D1P1, C1=P2D2P2, P1=orth(rand(p)) and P2=orth(rand(q)) are randomly orthogonal matrices, D1=logspace(0,k,p) and D2=logspace(0,k,q) are diagonal matrices which generates p and q points between decades 1 and 10k respectively. We describe the test matrices in Table 1 by giving its size and condition number κ. The condition number κ for a matrix S is defined as κ(S)=||S||2||S1||2. Moreover, the results comparison and numerical illustration of backward error tests of the algorithm are given respectively in Tables 2 and 3.

    Table 1.  Test problems description.
    Problem size(A) κ(A) size(B) κ(B) size(C) κ(C)
    (1) 16×16 1.0000e+05 16×9 6.1242 9×9 1.0000e+05
    (2) 120×120 1.0000e+05 120×80 8.4667 80×80 1.0000e+05
    (3) 300×300 1.0000e+06 300×200 9.5799 200×200 1.0000e+06
    (4) 400×400 1.0000e+07 400×300 13.2020 300×300 1.0000e+07
    (5) 900×900 1.0000e+08 900×700 15.2316 700×700 1.0000e+08

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results.
    Problem size(M) κ(M) ||z˜z||2||z||2 ||zzBCGS2||2||z||2
    (1) 25×25 7.7824e+04 6.9881e-13 3.3805e-11
    (2) 200×200 2.0053e+06 4.3281e-11 2.4911e-09
    (3) 500×500 3.1268e+07 1.0582e-09 6.3938e-08
    (4) 700×700 3.5628e+08 2.8419e-09 4.3195e-06
    (5) 1600×1600 2.5088e+09 7.5303e-08 3.1454e-05

     | Show Table
    DownLoad: CSV
    Table 3.  Backward error tests results.
    Problem ||M˜Q˜R||F||M||F ||I˜QT˜Q||F
    (1) 6.7191e-16 1.1528e-15
    (2) 1.4867e-15 2.7965e-15
    (3) 2.2052e-15 4.1488e-15
    (4) 2.7665e-15 4.9891e-15
    (5) 3.9295e-15 6.4902e-15

     | Show Table
    DownLoad: CSV

    The relative errors for the presented algorithm and its comparison with BCGS2 method in Table 2 showed that the algorithm is applicable and have good accuracy. Moreover, the numerical results for backward stability analysis of the suggested updating algorithm is given in Table 3.

    Example 2. In this experiment, we consider A=H where H is a Hilbert matrix generated with MATLAB command hilb(p). It is symmetric, positive definite, and ill-conditioned matrix. Moreover, we consider test matrices B and C similar to that as given in Example 1 but with different dimensions. Tables 46 describe the test matrices, numerical results and backward error results, respectively.

    Table 4.  Test problems description.
    Problem size(A) κ(A) size(B) κ(B) size(C) κ(C)
    (6) 6×6 1.4951e+07 6×3 2.6989 3×3 1.0000e+05
    (7) 8×8 1.5258e+10 8×4 2.1051 4×4 1.0000e+06
    (8) 12×12 1.6776e+16 12×5 3.6108 5×5 1.0000e+07
    (9) 13×13 1.7590e+18 13×6 3.5163 6×6 1.0000e+10
    (10) 20×20 2.0383e+18 20×10 4.4866 10×10 1.0000e+10

     | Show Table
    DownLoad: CSV
    Table 5.  Numerical results.
    Problem size(M) κ(M) ||z˜z||2||z||2 ||zzBCGS2||2||z||2
    (6) 9×9 8.2674e+02 9.4859e-15 2.2003e-14
    (7) 12×12 9.7355e+03 2.2663e-13 9.3794e-13
    (8) 17×17 6.8352e+08 6.8142e-09 1.8218e-08
    (9) 19×19 2.3400e+07 2.5133e-10 1.8398e-09
    (10) 30×30 8.0673e+11 1.9466e-05 1.0154e-03

     | Show Table
    DownLoad: CSV
    Table 6.  Backward error tests results.
    Problem ||M˜Q˜R||F||M||F ||I˜QT˜Q||F
    (6) 5.0194e-16 6.6704e-16
    (7) 8.4673e-16 1.3631e-15
    (8) 7.6613e-16 1.7197e-15
    (9) 9.1814e-16 1.4360e-15
    (10) 7.2266e-16 1.5554e-15

     | Show Table
    DownLoad: CSV

    From Table 5, it can bee seen that the presented algorithm is applicable and showing good accuracy. Table 6 numerically illustrates the backward error results of the proposed Algorithm 2.

    In this article, we have considered the saddle point problem and studied updated of the Householder QR factorization technique to compute its solution. The results of the considered test problems with dense matrices demonstrate that the proposed algorithm is applicable and showing good accuracy to solve saddle point problems. In future, the problem can be studied further for sparse data problems which are frequently arise in many applications. For such problems updating of the Givens QR factorization will be effective to avoid unnecessary fill-in in sparse data matrices.

    The authors Aziz Khan, Bahaaeldin Abdalla and Thabet Abdeljawad would like to thank Prince Sultan university for paying the APC and support through TAS research lab.

    There does not exist any kind of competing interest.



    [1] D. Maldonado, E. Cruz, J. A. Torres, P. J. Cruz, S. del Pilar, S. Gamboa, Multi-agent Systems: A survey about its components, framework and workflo, IEEE Access, 12 (2024), 80950–80975. https://doi.org/10.1109/ACCESS.2024.3409051 doi: 10.1109/ACCESS.2024.3409051
    [2] M. Abbasi, H. J. Marquez, Dynamic event-triggered formation control of multi-agent systems with non-uniform time-varying communication delays, IEEE T. Autom. Sci. Eng., 22 (2025), 8988–9000. https://doi.org/10.1109/TASE.2024.3494658 doi: 10.1109/TASE.2024.3494658
    [3] X. L. Quan, R. J. Du, R. C. Wang, Z. S. Bing, Q. Shi, An efficient closed-loop adaptive controller for a small-sized quadruped robotic rat, Cyborg and Bionic Systems, 5 (2024), 0096. https://doi.org/10.34133/cbsystems.0096 doi: 10.34133/cbsystems.0096
    [4] L. H. Ji, Z. Q. Lin, C. J. Zhang, S. S. Yang, J. Li, H. Q. Li, Data-based optimal consensus control for multiagent systems with time delays: using prioritized experience replay, IEEE T. Syst. Man Cy., 54 (2024), 3244–3256. https://doi.org/10.1109/TSMC.2024.3358293 doi: 10.1109/TSMC.2024.3358293
    [5] Y. H. Sun, Z. N. Peng, J. P. Hu, B. K. Ghosh, Event-triggered critic learning impedance control of lower limb exoskeleton robots in interactive environments, Neurocomputing, 564 (2024), 126963. https://doi.org/10.1016/j.neucom.2023.126963 doi: 10.1016/j.neucom.2023.126963
    [6] B. Ibrahim, H. Noura, Formation flight control of multi-UAV system using neighbor-based trajectory generation topology, Wseas Transactions on Applied and Theoretical Mechanics, 15 (2020), 173–181. https://doi.org/10.37394/232011.2020.15.20 doi: 10.37394/232011.2020.15.20
    [7] J. P. Hu, B. Chen, B. K. Ghosh, Formation-circumnavigation switching control of multiple ODIN systems via finite-time intermittent control strategies, IEEE T. Control Netw., 11 (2024), 1986–1997. https://doi.org/10.1109/TCNS.2024.3371597 doi: 10.1109/TCNS.2024.3371597
    [8] A. Khan, A. U. K. Niazi, W. Abbasi, F. Awan, M. M. A. Khan, F. Imtiaz, Cyber secure consensus of fractional order multi-agent systems with distributed delays: Defense strategy against denial-of-service attacks, Ain Shams Eng. J., 15 (2024), 102609. https://doi.org/10.1016/j.asej.2023.102609 doi: 10.1016/j.asej.2023.102609
    [9] H. T. Reda, A. Anwar, A. Mahmood, Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts, Renew. Sust. Energy Rev., 163 (2022), 112423. https://doi.org/10.1016/j.rser.2022.112423 doi: 10.1016/j.rser.2022.112423
    [10] N. Suryanto, Y. Kim, H. Kang, H. T. Larasati, Y. Yun, T. T. H. Le, et al., DTA: Physical camouflage attacks using differentiable transformation network, In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, 15305–15314. https://islab-ai.github.io/dta-cvpr2022/
    [11] Y. S. Liu, W. X. Li, X. W. Dong, Z. Ren, Resilient formation tracking for networked swarm systems under Malicious data deception attacks, Int. Jo. Robust Nonlin., 35 (2024), 2043–2052. https://doi.org/10.1002/rnc.7777 doi: 10.1002/rnc.7777
    [12] A. Khan, M. A. Javeed, A. U. K. Niazi, S. Rehman, W. U. Hassan, Y. B. Zhong, A robust control framework for multi-agent systems under Byzantine attacks using hybrid event-triggered techniques, Ain Shams Eng. J., 15 (2024), 103149. https://doi.org/10.1016/j.asej.2024.103149 doi: 10.1016/j.asej.2024.103149
    [13] F. Ding, R. Wang, T. D. Zhang, G. Zheng, Z. X. Wu, S. Wang, Real-time trajectory planning and tracking control of bionic underwater robot in dynamic environment, Cyborg and Bionic Systems, 5 (2024), 0112. https://doi.org/10.34133/cbsystems.0112 doi: 10.34133/cbsystems.0112
    [14] J. F. Hao, P. Chen, J. Chen, X. Li, Effectively detecting and diagnosing distributed multivariate time series anomalies via Unsupervised Federated Hypernetwork, Inform. Process. Manag., 62 (2025), 104107. https://doi.org/10.1016/j.ipm.2025.104107 doi: 10.1016/j.ipm.2025.104107
    [15] Z. Wang, M. L. Chen, Y. L. Guo, Z. Li, Q. F. Yu, Bridging the domain gap in satellite pose estimation: A self-training approach based on geometrical constraints, IEEE T. Aero. Elec. Sys., 60 (2023), 2500–2514. https://doi.org/10.1109/TAES.2023.3250385 doi: 10.1109/TAES.2023.3250385
    [16] H. B. Zeng, Z. J. Zhu, T. S. Peng, W. Wang, X. M. Zhang, Robust tracking control design for a class of nonlinear networked control systems considering bounded package dropouts and external disturbance, IEEE T. Fuzzy Syst., 32 (2024), 3608–3617. https://doi.org/10.1109/TFUZZ.2024.3377799 doi: 10.1109/TFUZZ.2024.3377799
    [17] D. B. Tong, B. Ma, Q. Y. Chen, Y. B. Wei, P. Shi, Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks, IEEE T. Circuits-II, 70 (2023), 2176–2180. https://doi.org/10.1109/TCSII.2022.3233420 doi: 10.1109/TCSII.2022.3233420
    [18] J. L. Guo, Y. K. Li, B. Huang, L. Ding, H. B. Gao, M. Zhong, An online optimization escape entrapment strategy for planetary rovers based on Bayesian optimization, J. Field Robot., 41 (2024), 2518–2529. https://doi.org/10.1002/rob.22361 doi: 10.1002/rob.22361
    [19] M. Shi, D. B. Tong, Q. Y. Chen, W. N. Zhou, Pth moment exponential synchronization for delayed multi-agent systems with Lévy noise and Markov switching, IEEE T. Circuits-II, 71 (2023), 697–701. https://doi.org/10.1109/TCSII.2023.3304635 doi: 10.1109/TCSII.2023.3304635
    [20] X. Liu, S. C. Lou, W. Dai, Further results on "System identification of nonlinear state-space models", Automatica, 148 (2023), 110760. https://doi.org/10.1016/j.automatica.2022.110760 doi: 10.1016/j.automatica.2022.110760
    [21] W. M. Wang, H. B. Zeng, J. M. Liang, S. P. Xiao, Sampled-data-based load frequency control for power systems considering time delays, J. Franklin I., 362 (2025), 107477. https://doi.org/10.1016/j.jfranklin.2024.107477 doi: 10.1016/j.jfranklin.2024.107477
    [22] J. X. Lv, X. Z. Ju, C. H. Wang, Neural network prescribed-time observer-based output-feedback control for uncertain pure-feedback nonlinear systems, Expert Syst. Appl., 264 (2025), 125813. https://doi.org/10.1016/j.eswa.2024.125813 doi: 10.1016/j.eswa.2024.125813
    [23] Z. S. Zhou, Y. F. Wang, G. F. Zhou, X. L. Liu, M. Y. Wu, K. P. Dai, Vehicle lateral dynamics-inspired hybrid model using neural network for parameter identification and error characterization, IEEE T. Veh. Technol., 73 (2024), 16173–16186. https://doi.org/10.1109/TVT.2024.3416317 doi: 10.1109/TVT.2024.3416317
    [24] L. Fu, J. Q. Wang, X. W. Fu, G. L. Zhao, Finite-time Pade-based adaptive FNN controller implementation for microbial fuel cell with delay and multi-disturbance, Int. J. Hydrogen Energ., 98 (2025), 1034–1043. https://doi.org/10.1016/j.ijhydene.2024.10.372 doi: 10.1016/j.ijhydene.2024.10.372
    [25] F. Z. Song, Y. Liu, Y. Dong, X. K. Chen, J. B. Tan, Motion control of wafer scanners in lithography systems: From setpoint generation to multi-stage coordination, IEEE T. Instrum. Meas., 73 (2024), 7508040. https://doi.org/10.1109/TIM.2024.3413202 doi: 10.1109/TIM.2024.3413202
    [26] Y. Y. Liu, Q. L. Hu, G. Feng, Navigation functions on 3-manifold with boundary as a disjoint union of Hopf tori, IEEE T. Automat. Contr., 70 (2025), 219–234. https://doi.org/10.1109/TAC.2024.3419817 doi: 10.1109/TAC.2024.3419817
    [27] B. Xu, X. Y. Wang, J. Zhang, Y. Guo, A. A. Razzaqi, A novel adaptive filtering for cooperative localization under compass failure and non-gaussian noise, IEEE T. Veh. Technol., 71 (2022), 3737–3749. https://doi.org/10.1109/TVT.2022.3145095 doi: 10.1109/TVT.2022.3145095
    [28] Z. M. Zou, S. M. Yang, L. Zhao, Dual-loop control and state prediction analysis of QUAV trajectory tracking based on biological swarm intelligent optimization algorithm, Sci. Rep., 14 (2024), 19091. https://doi.org/10.1038/s41598-024-69911-5 doi: 10.1038/s41598-024-69911-5
    [29] Y. F. Yin, Z. T. Wang, L. L. Zheng, Q. R. Su, Y. Guo, Autonomous UAV navigation with adaptive control based on deep reinforcement learning, Electronics, 13 (2024), 2432. https://doi.org/10.3390/electronics13132432 doi: 10.3390/electronics13132432
    [30] G. L. Jing, Y. F. Zou, M. H. Xu, Y. Q. Zhang, D. X. Yu, Z. G. Shan, et al., Nicaea: A Byzantine fault tolerant consensus under unpredictable message delivery failures for parallel and distributed computing, IEEE T. Comput., 74 (2025), 915–928. https://doi.org/10.1109/TC.2024.3506856 doi: 10.1109/TC.2024.3506856
    [31] H. L. Wei, H. Zhang, K. AI-Haddad, Y. Shi, Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework, Engineering, 33 (2024), 35–46. https://doi.org/10.1016/j.eng.2023.10.007 doi: 10.1016/j.eng.2023.10.007
    [32] J. A. V. Trejo, M. Adam-Medina, C. D. Garcia-Beltran, G. V. G. Ramírez, B. yolanda lópez Zapata, E. M. Sanchez-Coronado, et al., Robust formation control based on leader-following consensus in multi-agent systems with faults in the information exchange: Application in a fleet of unmanned aerial vehicles, IEEE Access, 9 (2021), 104940–104949. https://doi.org/10.1109/ACCESS.2021.3098303 doi: 10.1109/ACCESS.2021.3098303
    [33] S. Manfredi, Robust consensus design of uncertain multiagent systems with bounded gains and incremental nonlinear interactions, IEEE T. Ind. Inform., 20 (2024), 11844–11853. https://doi.org/10.1109/TII.2024.3413319 doi: 10.1109/TII.2024.3413319
    [34] H. Meng, D. H. Pang, J. D. Cao, Y. C. Guo, A. U. K. Niazi, Optimal bipartite consensus control for heterogeneous unknown multi-agent systems via reinforcement learning, Appl. Math. Comput., 476 (2024), 128785. https://doi.org/10.1016/j.amc.2024.128785 doi: 10.1016/j.amc.2024.128785
    [35] Y. H. Lan, J. Y. Zhao, Improving track performance by combining padé-approximation-based preview repetitive control and equivalent-input-disturbance, J. Electr. Eng. Technol., 19 (2024), 3781–3794. https://doi.org/10.1007/s42835-024-01830-x doi: 10.1007/s42835-024-01830-x
    [36] X. Z. Ju, Y. S. Jiang, L. Jing, P. Liu, Quantized predefined-time control for heavy-lift launch vehicles under actuator faults and rate gyro malfunctions, ISA T., 138 (2023), 133–150. https://doi.org/10.1016/j.isatra.2023.02.022 doi: 10.1016/j.isatra.2023.02.022
    [37] F. Ding, K. C. Zhu, J. Liu, C. Peng, Y. F. Wang, J. G. Lu, Adaptive memory event triggered output feedback finite-time lane keeping control for autonomous heavy truck with roll prevention, IEEE T. Fuzzy Syst., 32 (2024), 6607–6621. https://doi.org/10.1109/TFUZZ.2024.3454344 doi: 10.1109/TFUZZ.2024.3454344
    [38] S. B. Long, W. C. Huang, J. H. Wang, J. R. Liu, Y. X. Gu, Z. A. Wang, A fixed-time consensus control with prescribed performance for multi-agent systems under full-state constraints, IEEE T. Autom. Sci. Eng., 22 (2025), 6398–6407. https://doi.org/10.1109/TASE.2024.3445135 doi: 10.1109/TASE.2024.3445135
    [39] G. X. Wen, C. Y. Zhang, P. Hu, Y. Cui, Adaptive neural network leader-follower formation control for a class of second-order nonlinear multi-agent systems with unknown dynamics, IEEE Access, 8 (2020), 148149–148156. https://doi.org/10.1109/ACCESS.2020.3015957 doi: 10.1109/ACCESS.2020.3015957
    [40] X. Xu, B. Li, Semi-global stabilization of parabolic PDE–ODE systems with input saturation, Automatica, 171 (2025), 111931. https://doi.org/10.1016/j.automatica.2024.111931 doi: 10.1016/j.automatica.2024.111931
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(167) PDF downloads(20) Cited by(0)

Figures and Tables

Figures(8)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog