2021
DOI: 10.1002/rnc.5500
|View full text |Cite
|
Sign up to set email alerts
|

Quantized control for a class of neural networks with adaptive event‐triggered scheme and complex cyber‐attacks

Abstract: This article is concerned with the quantized control problem for neural networks with adaptive event-triggered scheme (AETS) and complex cyber-attacks. By fully considering the characteristics of cyber-attacks, a mathematical model of complex cyber-attacks, which consists of replay attacks, deception attacks, and denial-of-service (DoS) attacks, is firstly built for neural networks. For the sake of relieving the pressure under limited communication resources, an AETS and a quantization mechanism are employed i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
30
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 42 publications
(31 citation statements)
references
References 42 publications
0
30
0
1
Order By: Relevance
“…In the networked environment, the cyber-attacks occur frequently which pose a serious threat on the network security and the system performance. [24][25][26] According to different attack characteristics, common cyber-attacks include the following three categories: deception attacks, 27 replay attacks, 28 and denial-of-service 29 attacks. Specifically, the deception attacks including false data injection and data modification do not prevent data transmission while destroying the authenticity of transmitted data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the networked environment, the cyber-attacks occur frequently which pose a serious threat on the network security and the system performance. [24][25][26] According to different attack characteristics, common cyber-attacks include the following three categories: deception attacks, 27 replay attacks, 28 and denial-of-service 29 attacks. Specifically, the deception attacks including false data injection and data modification do not prevent data transmission while destroying the authenticity of transmitted data.…”
Section: Introductionmentioning
confidence: 99%
“…In the networked environment, the cyber‐attacks occur frequently which pose a serious threat on the network security and the system performance 24‐26 . According to different attack characteristics, common cyber‐attacks include the following three categories: deception attacks, 27 replay attacks, 28 and denial‐of‐service 29 attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In an early attempt to categorize music reviews, for example, work on multi-class genre categorization and star rating prediction is mentioned. Using an innovative method for predicting how people would use music, known as agglomerative clustering, they discovered that bigram characteristics were more informative than unigram features in their research [ 17 ]. Thus, POS tags and pattern mining techniques are employed to extract descriptive patterns for discriminating between positive and negative reviews.…”
Section: Introductionmentioning
confidence: 99%
“…To decrease transmission frequency while ensuring the stability of the system, event-triggered scheme was proposed to save the limited network resources, under which the sampled data to be released into the network only when the corresponding event occurs. [14][15][16][17] The effectiveness of the event-triggered scheme in getting rid of the redundant data has been illustrated by some researchers. For instance, Yue et al proposed an event-triggered scheme based on period sampling 14 and discussed the stability of NCS under the developed event-triggered scheme.…”
Section: Introductionmentioning
confidence: 99%