Next Article in Journal
Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP
Previous Article in Journal
Bibliometric Analysis on Supercritical CO2 Power Cycles for Concentrating Solar Power Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay

School of Science, Jiangnan University, Wuxi 214122, China
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(10), 1291; https://doi.org/10.3390/e23101291
Submission received: 7 September 2021 / Revised: 24 September 2021 / Accepted: 25 September 2021 / Published: 30 September 2021
(This article belongs to the Topic Artificial Intelligence and Sustainable Energy Systems)

Abstract

:
This paper investigates the problem of adaptive event-triggered synchronization for uncertain FNNs subject to double deception attacks and time-varying delay. During network transmission, a practical deception attack phenomenon in FNNs should be considered; that is, we investigated the situation in which the attack occurs via both communication channels, from S-C and from C-A simultaneously, rather than considering only one, as in many papers; and the double attacks are described by high-level Markov processes rather than simple random variables. To further reduce network load, an advanced AETS with an adaptive threshold coefficient was first used in FNNs to deal with deception attacks. Moreover, given the engineering background, uncertain parameters and time-varying delay were also considered, and a feedback control scheme was adopted. Based on the above, a unique closed-loop synchronization error system was constructed. Sufficient conditions that guarantee the stability of the closed-loop system are ensured by the Lyapunov-Krasovskii functional method. Finally, a numerical example is presented to verify the effectiveness of the proposed method.

1. Introduction

Neural networks, which bridge the micro-world of communications with the physical world for processing information as mathematical models, widely exist in a broad range of areas, such as intelligent control, secure communication, and pattern recognition [1,2,3,4]. Due to the complexity of the dynamic characteristics of some physical systems, a traditional integer-order neural network model cannot accurately represent their dynamic behaviors. Fractional order calculus is not only a generalized form of the traditional integer-order calculus; it also has some irreplaceable properties of integral order calculus, such as the special feature of time memory [4,5,6,7]. Based on these features, the fractional order differential equation has been used to model neural networks [8,9,10,11,12]. Synchronization, among several phenomena arising from the complex nonlinear dynamics of neural networks, has gained lots of attention and has been applied in many integer-order neural networks [13,14,15,16,17]. However, there are few studies about the synchronization problem of FNNs, which was the first motivation of this paper.
The event-triggered scheme (ETS) depends on a predefined event-triggered condition to determine whether the sampled data should be transmitted to the next control unit rather than a fixed period; therefore, replacing the time-triggered scheme (TTS) to save network communication resources and guarantee the system’s performance simultaneously was suggested in [16,18,19,20,21,22,23]. Although ETS was adopted in the latest three studies of different fractional order, real-valued systems [21,22,23], there was still a common disadvantage: the threshold coefficients of traditional ETS are all constants and cannot be timely adjusted to fit a system’s evolution. However, the adaptive event-triggered scheme (AETS), as a combination of adaptive control and traditional ETS, can overcome the conservativeness to make good use of communication resources dynamically. Therefore, designing an AETS with an adaptive threshold coefficient for FNNs to further improve the utilization of communication resources was the second motivation of the current work.
On the other hand, a security problem, due to advanced modern communication technology, has recently emerged as a hot topic in the engineering applications [24,25], especially in autonomous vehicle platooning [26,27]. Since the control components such as sensors, controllers, and actuators are connected by the shared communication networks to achieve remote control, compromise by malicious adversaries is extremely risky [22,28,29]. As a typical representative of malicious attacks, a deception attack can replace the original data with false data to destroy the system [22,28,29,30,31]. To the best of the authors’ knowledge, the synchronization problem of FNNs regarding deception attacks has been investigated in the literature [22], although the deception attacks were only allowed to occur in the controller to actuator (C-A) channel, governed by a Bernoulli variable. However, in communication networks, attacks may occur in the sensor to controller (S-C) channel and C-A channel simultaneously. Moreover, it is well known that a Bernoulli process is a special kind of the Markov process. Therefore, inspired by the aforementioned discussion, investigating double deception attacks governed by Markov processes in the synchronization of FNNs under AETS was the third motivation. Given the actual environmental conditions, neural networks inevitably suffer from noise and limitations of equipment, so uncertainties in parameters and time-varying delay have also been taken into account. The main contributions are outlined below.
(1)
The synchronization problem of FNNs under network attacks is firstly proposed with an AETS to further save network bandwidth resources. The AETS has an adaptive law for adjusting its threshold coefficient such that the controller can timely access system information to stabilize the error system.
(2)
A generalized deception attack for FNNs is investigated; that is, the deception attack may occur in S-C and C-A channels simultaneously. Moreover, the attack behaviors are governed by independent Markov processes that are more extensive than the Bernoulli processes in other studies.
(3)
Parameters’ uncertainties and time-varying delay are also investigated in light of the synchronization problem of FNNs and a double deception attack in the AETS. That is more practicable to some extent.
The remainder of this paper is organized as follows. In Section 2, some preliminaries are introduced and the model is formulated. The main results, including theorems, are shown in Section 3. In Section 4, a simulation which verified the main results is presented. Finally, the discussion and conclusions are presented in Section 5.
Notation: In this paper, R n and · denote the n-dimensional Euclidean vector space and the Euclidean norm for vectors, respectively. R n × n is the set of all n × n real matrices. T denotes the transposition of the vectors or matrices. I represents the identity matrix with appropriate dimensions, and H e [ A ] = A + A T . The symbol N represents the sets of all natural numbers and N 0 = N { 0 } . The signal “*” denotes the symmetric block of matrix. c o l ( ) and d i a g ( ) represent a column vector and a diagonal matrix, respectively.
Remark 1.
Network attacks may occur in both S-C and C-A channels during network transmission, as shown in Figure 1. We only found a few studies investigating relevant network attacks, and they only used single-channel attacks: the C-A channel [22]; the S-C channel [32,33,34]. In addition, in prior studies the behaviors of network attacks were governed by Bernoulli variables, usually. To the authors’ knowledge, there is no literature simultaneously considering network attacks in S-C and C-A channels in FNNs. Moreover, in this paper, the double network attacks governed by two independent Markov processes are more general than Bernoulli processes.

2. Preliminaries and Model Formulation

In this section, the basic definitions and relations about fractional calculus are introduced; then a closed-loop synchronization error system is constructed.

2.1. Fractional Order Calculations

Definition 1.
The fractional integral of order r for an integrable function f ( x ) : [ t 0 , + ] R is defined as [19]:
t 0 I t r f ( t ) = 1 Γ ( r ) t 0 t f ( β ) ( t β ) 1 r d β ,
where 0 < r < 1 , and Γ ( · ) is the Gamma function.
Definition 2.
The Caputo fractional derivative of order r > 0 for a function f ( t ) C n ( [ t 0 , + ) , R ) is defined as [22]:
t 0 D t r f ( t ) = 1 Γ ( n r ) t 0 t f ( n ) ( β ) ( t β ) r n + 1 d β ,
where t t 0 and n is an integer such that 0 < n 1 < r < n . Moreover, when 0 < r < 1 ,
t 0 D t r f ( t ) = 1 Γ ( 1 r ) t 0 t f ( β ) ( t β ) r d β .
From the ldefinitions 1 and 2, it is clear that the Caputo fractional derivative satisfies the following properties:
(1)
t 0 D t r t 0 I t s f ( t ) = t 0 D t r t 0 D t s f ( t ) = t 0 D t r s f ( t ) , where r s 0 .
(2)
t 0 D t r C = 0 , where C is a constant.
(3)
t 0 D t r ( v 1 f ( t ) + v 2 g ( t ) ) = v 1 t 0 D t r f ( t ) + v 2 t 0 D t r g ( t ) , where v 1 and v 2 are any constants.
Lemma 1
([22]). For a differentiable function vector x ( t ) R n , an equality with the following form is true:
t 0 D t r ( x T ( t ) P x ( t ) ) 2 x T ( t ) P t 0 D t r x ( t ) ,
where r and P R n × n satisfy 0 < r < 1 and P > 0 , respectively.
Lemma 2
([35]). For a given positive definite matrix R R n × n , given scalars a , b satisfying a < b , the following inequality holds for any continuously differentiable function e ( x ) in [ a , b ] R n :
( b a ) a b e T ( s ) R e ( s ) d s ( a b e ( s ) d s ) T R ( a b e ( s ) d s ) .
Lemma 3
([36]). For η ( t ) [ 0 , η ] and any matrices R , S R n × n satisfying R S * R 0 , the following inequality holds:
η t η t e ˙ T ( s ) R e ˙ ( s ) d s ξ T ( t ) Θ ξ ( t ) ,
where ξ ( t ) = c o l { e ( t ) , e ( t η ( t ) ) , e ( t η ) } and
Θ = R R S S * 2 R + H e [ S ] R S * * R .
Lemma 4
([32]). For given matrix S = S 11 S 12 S 21 S 22 , where S 12 = S 21 T , the following conditions are equivalent.
( 1 ) S < 0 ; ( 2 ) S 22 < 0 , S 11 S 21 S 22 1 S 12 < 0 .

2.2. Model Formulation

Consider the following uncertain FNN model as the master system:
t 0 D t r x ( t ) = ( A + Δ A ( t ) ) x ( t ) + ( B + Δ B ( t ) ) f ^ ( x ( t ) ) + ( D + Δ D ( t ) ) f ^ ( x ( t η ( t ) ) ) + I ( t ) , y ( t ) = C x ( t ) , x ( t 0 ) = ϕ 1 ( t 0 ) , t 0 [ η , 0 ] ,
where 0 < r < 1 denotes the order of fractional order derivative. x ( t ) = ( x 1 ( t ) , x 2 ( t ) , , x n ( t ) ) T R n is the state vector of the neuron. y ( t ) is the measurable output vector. η ( t ) satisfies 0 η ( t ) η , and η ˙ ( t ) η ¯ denotes the time-varying coupling delay. f ^ ( x ( t ) ) = ( f ^ 1 ( x 1 ( t ) ) , f ^ 2 ( x 2 ( t ) ) , , f ^ n ( x n ( t ) ) ) and f ^ ( x ( t η ( t ) ) ) = ( f ^ 1 ( x 1 ( t η ( t ) ) ) , f ^ 2 ( x ( t η ( t ) ) ) , , f ^ n ( x ( t η ( t ) ) ) ) R n are the activation functions. I ( t ) is an external input vector. A = d i a g ( a 1 , a 2 , , a n ) R n × n , are the self-feedback connection weight matrices. B = ( b i j ) n × n R n × n , D = ( d i j ) n × n R n × n are the connection weight matrices. Furthermore, Δ A ( t ) , Δ B ( t ) , Δ D ( t ) are the matrices with time-varying parameters, which are norm bounded and satisfy
[ Δ A ( t ) , Δ B ( t ) , Δ D ( t ) ] = G S ( t ) [ E a , E b , E d ] ,
where G , E a , E b , E d are known constant matrices, S ( t ) is an unknown time-varying matrix function satisfying S T ( t ) S ( t ) I . Assume that master system (1) have a unique solution with initial value ϕ 1 ( t 0 ) and that it is continuously differential on t 0 [ η , 0 ] [37].
Next, consider the corresponding slave system as follows:
t 0 D t r x ^ ( t ) = ( A + Δ A ( t ) ) x ^ ( t ) + ( B + Δ B ( t ) ) f ^ ( x ^ ( t ) ) + ( D + Δ D ( t ) ) f ^ ( x ^ ( t η ( t ) ) ) + I ( t ) + u ( t ) , y ^ ( t ) = C x ^ ( t ) , x ^ ( t 0 ) = ϕ 2 ( t 0 ) , t 0 [ η , 0 ] ,
where x ^ ( t ) = ( x ^ 1 ( t ) , y 2 ( t ) , , x ^ n ( t ) ) T is the state vector. Similarly, assume slave system (2) also has a unique solution with initial value ϕ 2 ( t 0 ) , which is continuously differential on t 0 [ η , 0 ] , and u ( t ) is the control input, and the others are same as the master system.
In order to realize the synchronization between systems (1) and (2), define the synchronization error z ( t ) = C ( x ^ ( t ) x ( t ) ) , and the parameter uncertainty of each part is treated as a whole. The following error system can be obtained:
t 0 D t r e ( t ) = A e ( t ) + B f ( e ( t ) ) + D f ( e ( t η ( t ) ) ) + G m ( t ) + u ( t ) , m ( t ) = S ( t ) ( E a e ( t ) + E b f ( e ( t ) ) + E d f ( e ( t η ( t ) ) ) ) , z ( t ) = C e ( t ) , e ( t 0 ) = ϕ ( t 0 ) , t 0 [ η , 0 ] ,
where f ( e ( t ) ) = f ^ ( x ^ ( t ) ) f ^ ( x ( t ) ) , f ( e ( t η ( t ) ) ) = f ^ ( x ^ ( t η ( t ) ) ) f ^ ( x ( t η ( t ) ) ) . The initial value of error system (3) is ϕ ( t 0 ) = ϕ 2 ( t 0 ) ϕ 1 ( t 0 ) , t 0 [ η , 0 ] . It is well known that system (3) has a unique solution [38].
Remark 2.
The model considered in this paper can be regarded as a generalization of [22]. Such an attack has only been considered in the C-A channel and governed by a Bernoulli process in FNNs [22], in which the event-triggered threshold coefficient is a constant and cannot fit a system’s evolution dynamically. The FNNs studied in this paper not only adopt AETS to further improve the utilization of communication resources, but parameters’ uncertainties and double deception attacks are also investigated.
The following assumption will be used later on.
Assumption 1.
The neuron activation function f ( e ( t ) ) is continuous and bounded, and satisfies the following conditions:
0 f i ( e 1 ( t ) ) f i ( e 2 ( t ) ) e 1 ( t ) e 2 ( t ) ϕ i ,
for i = 1 , 2 , , n , where ϕ i are known positive constants.
Let the two adversary network attacks during the communication be characterized by two independent right-continuous Markov processes r t , q t on the probability space taking values in the finite state space M = { 1 , 2 , , s } with generator π = ( π i j ) s × s , ρ = ( ρ i j ) s × s given by
P r { r t + k = j | r t = i } = π i j k + o ( k ) i j , 1 + π i i k + o ( k ) i = j .
P r { q t + k = n | q t = m } = ρ m n k + o ( k ) m n , 1 + ρ m n k + o ( k ) m = n .
where k > 0 , lim k 0 o ( k ) k = 0 , π i j 0 , i j , ρ m n 0 , m n , and for every i , m M , π i i = j i π i j , ρ m m = n m ρ m n .
To save on network bandwidth as much as possible, an AETS was adopted in this study. The sensor with sampling period h was time-driven, and the output error z ( t ) was measured by the sensor at the sampling instant l h , l N 0 . Let t k h denote the triggered instant; then the next triggered instant is denoted by t k + 1 h . t k + i h , i N denotes the current sampling time. Whether or not the sampled data z ( t k + i h ) should be transmitted is determined by the adaptive event-triggered condition:
z ˜ k T ( t ) Ω z ˜ k ( t ) d ( t ) z T ( t k + i h ) Ω z ( t k + i h ) 0 ,
where z ˜ k ( t ) = z ( t k h ) z ( t k + i h ) , z ( t k h ) denotes the latest transmitted data, Ω > 0 is a weighting matrix to be designed, and the adaptive threshold coefficient d ( t ) satisfies the following adaptive law:
d ˙ ( t ) = ( 1 d ( t ) 2 w ¯ d ( t ) ) z ˜ k T ( t ) Ω z ˜ k ( t ) ,
where w ¯ 1 can adjust the monotonicity of d ( t ) [32], and the next triggered instant can be denoted as follows:
t k + 1 h = t k h + m i n { i h | z ˜ k T Ω z ˜ k > d ( t ) z T ( t k + i h ) Ω z ( t k + i h ) , i N } .
Based on the reality of the network communication, the delay s k is considered at the instant t k h . Assume that 0 s k s ¯ , where s ¯ = m a x { s k } . The sampling date z ( t k h ) will be transmitted at the instant t k + s k . Then the time interval [ t k h + s k , t k + 1 h + s k + 1 ) can be divided I 0 = [ t k h + s k , t k h + h + s ¯ ) , I i = [ t k h + i h + s ¯ , t k h + i h + h + s ¯ ) , i = 1 , 2 , , δ 1 , and δ = t k + 1 t k 1 , I δ = [ t k h + δ h + s ¯ , t k + 1 + d k + 1 ) . Then z ˜ k ( t ) = z ( t k h ) z ( t k h + i h ) is equivalent to:
z ˜ k ( t ) = z ( t k h ) z ( t k h ) , t I 0 , z ( t k h ) z ( t k h + i h ) , t I i , z ( t k h ) z ( t k h + δ h ) , t I δ
which can be written as
z ˜ k ( t ) = z ( t k h ) z ( t τ ( t ) ) , t [ t k h + s k , t k + 1 h + s k + 1 )
in which
τ ( t ) = t t k h , t I 0 , t t k h i h , t I i , t t k h δ h , t I δ .
According to Equation (9), it is easy to get
0 τ ( t ) h + s ¯ , t [ t k h + s k , t k + 1 h + s k + 1 ) .
Remark 3.
From the adaptive event-triggered condition (5), it is easy to know the minimum event-triggered interval is a constant, which means that there is no Zeno behavior.
As shown in Figure 1, deception attacks may occur on the S-C communication channel, and the integrity of normal transmission data will be damaged by malicious attacks. To depict the stochastic occurrence modeling of deception attacks, Markov processes are adopted in this paper. Then the control input in time interval [ t k h + s k , t k + 1 h + s k + 1 ) , k = 1 , 2 , , can be denoted as
z s ( t k h , r t ) = b s ( r t ) z ( t k h ) + b ¯ s ( r t ) g s ( z ( t k h ) ) , = b s ( r t ) z ( t τ ( t ) ) + z ˜ k ( t ) + b ¯ s ( r t ) g s ( z ( t k h ) ) .
where b s ( 1 ) = 1 , b s ( 2 ) = 0 , b ¯ s ( r t ) = 1 b s ( r t ) , and g s : R n R n is the energy bounded deception signal in the S-C communication channel satisfying
g s ( x ( t ) ) G s x ( t ) .
where G s R n × n is a known constant matrix satisfying G s > 0 . If r t = 1 , the data will be transmitted normally without any attack. Conversely, r t = 2 means that malicious attack signals occur in the S-C channel.
The main purpose of this study was to synchronize uncertain FNNs under AETS, subject to double deception attacks and time-varying delay. Construct the state feedback controller:
u ( t ) = u s ( t k h , r t ) , = K z s ( t k h , r t ) , t [ t k h + s k , t k + 1 h + s k + 1 ) ,
where the feedback gain matrix K needs to be determined.
In a similar routine to that of the S-C communication channel, when the released data u s ( t k h , r t ) are transmitted through the C-A communication channel, the channel may be attacked again. Therefore, the control output signal can be denoted as
u ( t ) = u c ( t k h , r t , q t ) , = b c ( q t ) u s ( t k h , r t ) + b ¯ c ( q t ) g c ( u s ( t k h , r t ) ) , = b c ( q t ) b s ( r t ) K C e ( t τ ( t ) ) + b c ( q t ) b s ( r t ) K z ˜ ( t ) + b c ( q t ) b ¯ s ( r t ) K g s ( z ¯ ( t ) ) + b ¯ c ( q t ) g c ( u s ( t k h , r t ) ) , t [ t k h + s k , t k + 1 h + s k + 1 ) ,
where z ¯ ( t ) = z ˜ ( t ) + z ( t τ ( t ) ) , b c ( 1 ) = 1 , b c ( 2 ) = 0 , b ¯ c ( q t ) = 1 b c ( q t ) , and g c : R n R n is the energy bounded deception signal in the C-A communication channel satisfying
g c ( x ( t ) ) G c x ( t ) .
where G c R n × n is a known constant matrix satisfying G c > 0 . For simplicity, for every i , m M , r t = i , q t = m , b s ( r t ) , b c ( q t ) are denoted in this paper by b i s and b m c , respectively. Similarly, for a matrix P 1 ( r t , q t ) , it is denoted by P 1 i m . In addition, for a matrix P 1 i m , there is the following definition:
P ¯ 1 i m = j M π i j P 1 j m + n M ρ m n P 1 i n .
Then, it is easy to obtain the error system
t 0 D t r e ( t ) = A e ( t ) + B f ( e ( t ) ) + D f ( e ( t η ( t ) ) ) + G m ( t ) + b m c b i s K z ˜ ( t ) + b m c b i s K C e ( t τ ( t ) ) + b m c b ¯ i s K g s ( z ¯ ( t ) ) + b ¯ m c g c ( u s ( t k h , r t ) ) , m ( t ) = S ( t ) ( E a e ( t ) + E b f ( e ( t ) ) + E d f ( e ( t η ( t ) ) ) ) , z ( t ) = C e ( t ) , e ( t 0 ) = ϕ ( t 0 ) , t 0 [ m a x { η , h } , 0 ] .
The following two definitions will be used in the proof of Theorem 1.
Definition 3
([39]). Let V ( t , e ( t ) , r t = i , q t = m ) be the positive Lyapunov–Krasovskii functional and L ( · ) be a weak infinitesimal operator. Then
E 0 t L V ( s , e ( s ) , i , m ) d s = E V ( t , e ( t ) , i , m ) E V ( 0 , ϕ ( t 0 ) , r 0 , q 0 ) ,
where E denotes the expectation.
Definition 4
([40,41]). The synchronization error system (16) is said to be globally, stochastically, asymptotically stable in the mean square sense, if for any initial conditions ϕ ( t 0 ) defined on [ m a x { η , h } , 0 ] and r 0 , q 0 M the following condition is satisfied:
lim t E 0 t e T ( s ) e ( s ) d s ϕ ( t 0 ) , r 0 , q 0 < .
So far, a closed-loop synchronization error system (16) has been constructed. In the following, in order to realize the synchronization between systems (1) and (2), the stability of error system (16) will be proven.

3. Results

Two theorems are developed in this section. Firstly, the synchronization criterion for systems (1) and (2) is presented in Theorem 1. Then, on the basis of Theorem 1, the criterion for feedback controller design is developed by Theorem 2.
Theorem 1.
Suppose Assumption 1 holds. The FNNs (1) and (2) are globally, stochastically, asymptotically synchronized under the feedback control scheme (12) in the mean square sense, for the given scalars r and control gain matrix K, if there exist positive definite matrices P , Ω , P 1 i m , P 3 i m , N 1 , N 3 , R 1 i m , R 2 i m , M 1 i m , M 2 i m , L 1 , L 2 , J 1 , J 2 , Q 1 , Q 2 ; positive definite diagonal matrices Δ 1 , Δ 2 ; and matrices P 2 i m , N 2 , S i m , T i m ; and positive scalars ε , λ 1 , λ 2 , such that the following LMIs for every i , m hold:
Π 1 , 1 Π 1 , 2 Π 1 , 3 Π 1 , 4 Π 1 , 5 Π 1 , 6 Π 1 , 7 * Π 2 , 2 Π 2 , 3 0 Π 2 , 5 0 0 * * Π 3 , 3 0 0 0 Π 3 , 7 * * * Π 4 , 4 0 Π 4 , 6 Π 4 , 7 * * * * Π 5 , 5 0 Π 5 , 7 * * * * * Π 6 , 6 0 * * * * * * Π 7 , 7 < 0 ,
R ¯ 1 i m < L 1 , R ¯ 2 i m < L 2 , M ¯ 1 i m < J 1 , M ¯ 2 i m < J 1 ,
R 2 i m S i m * R 2 i m 0 , M 2 i m T i m * M 2 i m 0 ,
P 1 i m P 2 i m * P 3 i m > 0 , N 1 N 2 * N 3 > 0 ,
where
Π 1 , 1 = Ξ 1 , 1 Ξ 1 , 2 * Ξ 2 , 2 , Π 1 , 2 = S i m M 2 i m T i m T i m R 2 i m S i m 0 0 , Π 1 , 3 = Ξ 1 , 6 ε E a E d + P D 0 0 , Π 6 , 6 = ( λ 2 G c T G c ) 1 , Π 1 , 4 = b m c b ¯ i s P K b ¯ m c P b m c b i s P K 0 0 λ 1 C T G s T G s , Π 1 , 5 = P 1 i m + ( P 2 i m ) T P 2 i m + P 3 i m 0 0 0 0 , Π 1 , 6 = 0 b i s C T K T , Π 1 , 7 = Ψ A T b i s b m c C T K T , Π 2 , 3 = 0 0 0 Φ Δ 2 ( 1 η ¯ ) N 2 0 0 ,
Π 2 , 2 = Q 1 R 2 i m 0 0 * Ξ 4 , 4 M 2 i m T i m * * Q 2 M 2 i m , Π 2 , 5 = P 1 i m P 2 i m 0 0 0 0 ( P 2 i m ) T P 3 i m 0 , Π 3 , 3 = Ξ 6 , 6 ε E a E d * Ξ 7 , 7 , Π 3 , 7 = Ψ B T D T , Π 4 , 4 = λ 1 I 0 0 * λ 2 I 0 * * Ξ 10 , 10 , Π 4 , 6 = b ¯ i s K T 0 b i s K T , Π 4 , 7 = Ψ b ¯ i s b m c K T b ¯ m c b i s b m c K T , Π 5 , 5 = P ¯ 1 i m R 1 i m P ¯ 2 i m 0 * P ¯ 3 i m M 1 i m 0 * * ε I , Π 5 , 7 = Ψ 0 0 G T , Π 7 , 7 = ( R 2 i m ) 1 0 0 0 * ( M 2 i m ) 1 0 0 * * 2 h ( L 2 ) 1 0 * * * 2 η ( J 2 ) 1 , Ξ 1 , 1 = 2 P A + Q 1 + Q 2 + N 1 + h 2 R 1 i m + η 2 M 1 i m + h 3 2 L 1 + η 3 2 J 1 R 2 i m M 2 i m + ε E a 2 , Ξ 1 , 2 = b m c b i s P K C + R 2 i m S i m , Ψ = h η h 2 η 2 , Ξ 2 , 2 = 2 R 2 i m + H e [ S i m ] + C T Ω C + λ 1 C T G s T G s C + Ω , Ξ 4 , 4 = ( 1 η ¯ ) N 1 2 M 2 i m + H e [ T i m ] , Ξ 6 , 6 = N 3 2 Δ 1 + ε E b 2 , Ξ 7 , 7 = ( 1 η ¯ ) N 3 2 Δ 2 + ε E d 2 , Ξ 10 , 10 = λ 1 G s T G s w ¯ Ω , Ξ 1 , 6 = P B + N 2 + Φ Δ 1 ε E a E b .
Proof. 
Consider the following fractional order Lyapunov–Krasovskii functional:
V ( t , e ( t ) ) = k = 1 9 V k ( t , e ( t ) , r t , q t ) ,
where
V 1 ( t , e ( t ) , r t , q t ) = t 0 D t r 1 e T ( t ) P e ( t ) , V 2 ( t , e ( t ) , r t , q t ) = 1 2 d T ( t ) d ( t ) , V 3 ( t , e ( t ) , r t , q t ) = t h t e ( s ) d s t η t e ( s ) d s T P 1 i m P 2 i m * P 3 i m t h t e ( s ) d s t η t e ( s ) d s , V 4 ( t , e ( t ) , r t , q t ) = t h t e T ( s ) Q 1 e ( s ) d s + t η t e T ( s ) Q 2 e ( s ) d s , V 5 ( t , e ( t ) , r t , q t ) = t η ( t ) t e ( s ) f ( e ( s ) ) T N 1 N 2 * N 3 e ( s ) f ( e ( s ) ) d s , V 6 ( t , e ( t ) , r t , q t ) = h h 0 t + θ t e ( s ) e ˙ ( s ) T R 1 i m 0 0 R 2 i m e ( s ) e ˙ ( s ) d s d θ , V 7 ( t , e ( t ) , r t , q t ) = η η 0 t + θ t e ( s ) e ˙ ( s ) T M 1 i m 0 0 M 2 i m e ( s ) e ˙ ( s ) d s d θ , V 8 ( t , e ( t ) , r t , q t ) = h h 0 θ 0 t + β t e ( s ) e ˙ ( s ) T L 1 0 0 L 2 e ( s ) e ˙ ( t ) d s d β d θ , V 9 ( t , e ( t ) , r t , q t ) = η η 0 θ 0 t + β t e ( s ) e ˙ ( s ) T J 1 0 0 J 2 e ( s ) e ˙ ( t ) d s d β d θ .
For simplicity, V i = V i ( t , e ( t ) , r t , q t ) , i = 1 , 2 , , 9 .
The weak infinitesimal operator L is defined as follows:
L V ( t , e ( t ) , r t , q t ) = V ( t , e ( t ) , r t , q t ) t + e ˙ T ( t ) V ( t , e ( t ) , r t , q t ) e ( t ) r t = i , q t = m + j = 1 2 π i j V ( e ( t ) , j , m ) + n = 1 2 ρ m n V ( e ( t ) , i , n ) .
By calculating the weak infinitesimal derivatives of V ( t , e ( t ) , r t , q t ) along with the error system (16), one has
L V 1 2 e T ( t ) P D t γ e ( t ) , L V 2 = d ( t ) d ˙ ( t ) ,
L V 3 = 2 t h t e ( s ) d s t η t e ( s ) d s T P 1 i m P 2 i m * P 3 i m e ( t ) e ( t h ) e ( t ) e ( t η ) + t h t e ( s ) d s t η t e ( s ) d s T × P ¯ 1 i m P ¯ 2 i m * P ¯ 3 i m t h t e ( s ) d s t η t e ( s ) d s ,
L V 4 = e T ( t ) ( Q 1 + Q 2 ) e ( t ) e T ( t h ) Q 1 e ( t h ) e T ( t η ) Q 2 e ( t η ) ,
L V 5 = e ( t ) f ( e ( t ) ) T N 1 N 2 * N 3 e ( t ) f ( e ( t ) ) ( 1 η ¯ ) e ( t η ( t ) ) f ( e ( t η ( t ) ) ) T × N 1 N 2 * N 3 e ( t η ( t ) ) f ( e ( t η ( t ) ) ) ,
L V 6 = h 2 e ( t ) e ˙ ( t ) T R 1 i m 0 0 R 2 i m e ( t ) e ˙ ( t ) h t h t e ( s ) e ˙ ( s ) R 1 i m 0 0 R 2 i m e ( t ) e ˙ ( t ) d s + h h 0 t + θ t e ( t ) e ˙ ( t ) R ¯ 1 i m 0 0 R ¯ 2 i m e ( t ) e ˙ ( t ) d s d θ ,
L V 7 = η 2 e ( t ) e ˙ ( t ) T M 1 i m 0 0 M 2 i m e ( t ) e ˙ ( t ) η t η t e ( s ) e ˙ ( s ) M 1 i m 0 0 M 2 i m e ( t ) e ˙ ( t ) d s + η η 0 t + θ t e ( t ) e ˙ ( t ) M ¯ 1 i m 0 0 M ¯ 2 i m e ( t ) e ˙ ( t ) d s d θ ,
L V 8 = h 3 2 e ( t ) e ˙ ( t ) T L 1 0 0 L 2 e ( t ) e ˙ ( t ) h h 0 t + θ t e ( t ) e ˙ ( t ) T L 1 0 0 L 2 e ( t ) e ˙ ( t ) d s d θ ,
L V 9 = η 3 2 e ( t ) e ˙ ( t ) T J 1 0 0 J 2 e ( t ) e ˙ ( t ) η η 0 t + θ t e ( t ) e ˙ ( t ) T J 1 0 0 J 2 e ( t ) e ˙ ( t ) d s d θ .
By using Lemmas 1 and 2, it follows that
h t h t e ˙ T ( s ) R 2 i m e ˙ ( s ) d s ξ 1 T ( t ) Θ 1 ξ 1 ( t ) ,
η t η t e ˙ T ( s ) M 2 i m e ˙ ( s ) d s ξ 2 T ( t ) Θ 2 ξ 2 ( t ) ,
h t h t e T ( s ) R 1 i m e ( s ) d s ( t h t e ( s ) d s ) T R 1 i m t h t e ( s ) d s ,
η t η t e T ( s ) M 1 i m e ( s ) d s ( t η t e ( s ) d s ) T M 1 i m t η t e ( s ) d s ,
where ξ 1 ( t ) = c o l { e ( t ) , e ( t τ ( t ) ) , e ( t h ) } , ξ 2 ( t ) = c o l { e ( t ) , e ( t η ( t ) ) , e ( t η ) } , and
Θ 1 = R 2 i m R 2 i m S i m S i m * 2 R 2 i m + H e [ S i m ] R 2 i m S i m * * R 2 i m ,
Θ 2 = M 2 i m M 2 i m T i m T i m * 2 M 2 i m + H e [ T i m ] M 2 i m T i m * * M 2 i m .
It can be obtained from m ( t ) that
ε e T ( t ) E a 2 e ( t ) 2 ε e T ( t ) E a E b f ( e ( t ) ) 2 ε e T ( t ) E a E d f ( e ( t η ( t ) ) ) + ε f T ( e ( t ) ) E b 2 f ( e ( t ) ) + 2 ε f T ( e ( t ) ) E b E d f ( e ( t η ( t ) ) ) + ε f T ( e ( t η ( t ) ) ) E d 2 f ( e ( t η ( t ) ) ) ε m T ( t ) m ( t ) 0 .
Moreover, from the adaptive event-triggered condition, activation function, (11) and (14), it follows that
d ( t ) d ˙ ( t ) z T ( T τ ( t ) ) Ω z ( T τ ( t ) ) w ¯ z ˜ T ( t ) Ω z ˜ ( t ) ,
2 f T ( e ( t ) ) Δ 1 f ( e ( t ) ) + 2 e T ( t ) Φ Δ 1 f ( e ( t ) ) 0 ,
2 f T ( e ( t η ( t ) ) ) Δ 2 f ( e ( t η ( t ) ) ) + 2 e T ( t η ( t ) ) Φ Δ 2 f ( e ( t η ( t ) ) ) 0 ,
λ 1 z ¯ T ( t ) G s T G s z ¯ ( t ) λ 1 g s T ( z ¯ ( t ) ) g s ( z ¯ ( t ) ) 0 ,
λ 2 u c T G c T G c u c λ 2 g c T ( u c ) g c ( u c ) 0 .
Let
ζ ( t ) = c o l { e ( t ) , e ( t τ ( t ) ) , e ( t h ) , e ( t η ( t ) ) , e ( t η ) , f ( e ( t ) ) , f ( e ( t η ( t ) ) ) , g s ( z ¯ ) , g c ( u c ) , z ˜ ( t ) , t h t e T ( s ) d s , t η t e T ( s ) d s , m ( t ) } ,
together with (21)–(38). Then, the following can be obtained.
L V ( t , e ( t ) , r t , q t ) ζ T ( t ) Ξ ζ ( t ) .
From the aforementioned part, we know that matrix inequality (17) guarantees Ξ < 0 holds. That further guarantees that L V ( t , e ( t ) , r t , q t ) < 0 holds for every i , m M .
Let λ 0 = λ m i n ( Ξ ) ; then λ 0 > 0 . For any t > 0 , we have:
L V ( t , e ( t ) , r t , q t ) λ 0 ζ T ( t ) ζ ( t ) λ 0 e T ( t ) e ( t ) .
By Definition 3, one can obtain:
E V ( t , e ( t ) , i , m ) E V ( 0 , ϕ ( t 0 ) , r 0 , q 0 ) λ 0 E 0 t e T ( t ) e ( t ) d s ,
hence, for t 0 :
E 0 t e T ( t ) e ( t ) d s 1 λ 0 E V ( 0 , ϕ ( t 0 ) , r 0 , q 0 ) ,
based on Definition 4, which implies that error system (16) is globally, stochastically, asymptotically stable in the mean square sense. That means systems (1) and (2) get globally, stochastically, asymptotically synchronized in the mean square sense. The proof is completed. □
Notice that Theorem 1 only gives sufficient conditions for the synchronization of systems (1) and (2), and fails to solve the design problem of the controller (12). Therefore, the design method of the control gain K is constructed in Theorem 2.
Theorem 2.
Suppose Assumption 1 holds. The FNNs (1) and (2) are globally, stochastically, asymptotically synchronized in the mean square sense, for the given scalars r, if there exist positive definite matrices P , Ω , P 1 i m , P 3 i m , N 1 , N 3 , R 1 i m , R 2 i m , M 1 i m , M 2 i m , L 1 , L 2 , J 1 , J 2 , Q 1 , Q 2 ; positive definite diagonal matrices Δ 1 , Δ 2 ; and matrices P 2 i m , N 2 , S i m , T i m , Y ; and positive scalars ε , λ 1 , λ 2 , such that the following LMIs for every i , m hold:
Π ˜ 1 , 1 Π 1 , 2 Π 1 , 3 Π ˜ 1 , 4 Π 1 , 5 Π ˜ 1 , 6 Π ˜ 1 , 7 * Π 2 , 2 Π 2 , 3 0 Π 2 , 5 0 0 * * Π 3 , 3 0 0 0 Π ˜ 3 , 7 * * * Π 4 , 4 0 Π ˜ 4 , 6 Π ˜ 4 , 7 * * * * Π 5 , 5 0 Π ˜ 5 , 7 * * * * * Π ˜ 6 , 6 0 * * * * * * Π ˜ 7 , 7 < 0 ,
R ¯ 1 i m < L 1 , R ¯ 2 i m < L 2 , M ¯ 1 i m < J 1 , M ¯ 2 i m < J 1 ,
R 2 i m S i m * R 2 i m 0 , M 2 i m T i m * M 2 i m 0 ,
P 1 i m P 2 i m * P 3 i m > 0 , N 1 N 2 * N 3 > 0 ,
where
Π ˜ 1 , 1 = Ξ 1 , 1 Ξ ˜ 1 , 2 * Ξ 2 , 2 , Π ˜ 1 , 4 = b m c b ¯ i s Y b ¯ m c P b m c b i s Y 0 0 λ 1 C T G s T G s , Π ˜ 1 , 6 = 0 b i s C T Y T , Π ˜ 1 , 7 = Ψ A T P b i s b m c C T Y T , Π ˜ 3 , 7 = Ψ B T P D T P , Π ˜ 4 , 6 = b ¯ i s Y T 0 b i s Y T , Π ˜ 4 , 7 = Ψ b ¯ i s b m c Y T b ¯ m c P b i s b m c Y T , Π ˜ 5 , 7 = Ψ 0 0 G T P , Π ˜ 6 , 6 = 2 α 1 P + α 1 2 λ 2 G c T G c , Π ˜ 7 , 7 = d i a g { 2 α 2 P + α 2 2 R 2 i m , 2 α 3 P + α 3 2 M 2 i m , 4 h α 4 P + 2 h α 4 2 L 2 , 4 h α 5 P + 2 h α 5 2 J 2 } , Ξ ˜ 1 , 2 = b m c b i s Y C + R 2 i m S i m ,
and the other parameters are the same as in Theorem 1, among them the feedback gain matrix is defined with K = P 1 Y .
Proof. 
For any scalar α > 0 , the following inequality holds:
( α Ω P ) Ω 1 ( α Ω P ) 0 .
Based on the inequality, it can be obtained that:
P Ω 1 P 2 α P + α 2 Ω .
By defining χ = d i a g { I , , I 13 , P , P , P , P , P } , multipling (17) by χ on the left side and the right side, respectively, and replacing the term in Π 6 , 6 with 2 α 1 P + α 1 2 λ 4 G c T G c , Π ˜ 6 , 6 can be obtained. In the same way, Π ˜ 7 , 7 replaces Π 7 , 7 . In addition, Y = K P is also replaced. Then linear matrix inequality (39) can be obtained. That completes the proof. □

4. Numerical Simulations

In this section, a simulation is presented to demonstrate the effectiveness of the proposed approach. Consider the FNNs which are described by Equation (1) and (2) with the following parameters:
A = 1 0 0 1 , B = 1.8 0.1 2 0.4 , D = 1.7 0.6 0.5 2.5 ,
E a = 0.01 0 0 0.01 , E b = 0.01 0 0 0.01 , E d = 0.01 0 0 0.01 ,
G = 0.01 0 0 0.02 , C = 1 0 0 1 .
The nonlinear function was selected as f ^ ( x ) = tanh ( x ) , so it can be calculated that Φ = I . Due to the time-varying delay η ( t ) = 0.1 e t 1 + e t , η = 0.1 , η ¯ = 0.025 can be obtained, respectively. The functions of deception signals are were chosen to be g s ( x ) = tanh ( x ) , g c ( x ) = tanh ( x ) ; therefore, one can get G s = I , G c = I . In this numerical example, we set the sampling period to h = 0.05 , γ = 0.98 , the initial value of the adaptive event-triggered parameter d 0 to 0.8, the external input vector I ( t ) to 0, ϵ 1 = 0.1 , ϵ 2 = 0.1 , ϵ 3 = 0.1 , ϵ 4 = 0.1 , ϵ 5 = 0.1 . Additionally, the generators of Markov process r t , q t were
π i j = 0.4 0.4 0.5 0.5 , ρ i j = 0.4 0.4 0.65 0.65 .
Based on the proposed method, by solving the LMIs in Theorem 2, one can obtain the desired controller gain and the adaptive event-triggered weighting matrix as follows:
K = 0.0178 0.0026 0.0021 0.0270 , Ω = 0.0007 0.0007 0.0007 0.0011 .
We chose the initial values ϕ 1 ( t 0 ) = ( 0.5 ; 0.1 ) , ϕ 2 ( t 0 ) = ( 0.1 ; 0.2 ) . Figure 2 shows the state trajectories of synchronization errors without control input. As can be seen from Figure 2, if there is no control input, the error system itself is unstable, which means that the systems cannot be synchronized. Using the feedback controller (12), the simulation results were obtained, as shown in Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7. Figure 3 shows the state trajectories of synchronization errors with control input, and one can see that synchronization errors finally converged to zero under the designed control protocol, which shows that the systems can achieve synchronization. Figure 4 and Figure 5 depict the states of double deception attacks, whose states caused the oscillations of the synchronization error and the control input. Figure 6 depicts the trajectories of control input, from which one can see that the control input gradually tended to 0; that is, when the system achieves synchronization, external control is no longer required. Figure 7 shows the evolution of adaptive threshold coefficient d ( t ) in AETS. From the adaptive law (6), the adaptive threshold coefficient can be timely adjusted according to the synchronization error. Therefore, when the error system is stable, that is, when synchronization is achieved, the parameter will no longer be adjusted and will tend toward a constant. From the above simulation results, it can easily be seen that the proposed synchronization problem in this paper was effectively solved.

5. Discussion and Conclusions

The adaptive event-triggered synchronization problem of uncertain FNNs with double deception attacks and time-varying delay has been investigated in this paper. Noteworthy is that, regarding fractional order systems receiving deception attacks using traditional event-triggered methods given in the literature [22], we believe that the literature has not been comprehensive enough. Not only the traditional ETS technology, but also the attack phenomena were governed by Bernoulli processes, and attacks only occurred in the C-A channel. Thus, in this study, the AETS was adopted to determine the signals the needed to be transmitted. The deception attacks in communication channels from the sensor to controller and from controller to actuator are governed by two independent Markov processes. Considering the AETS, double deception attacks, and parameter uncertainties, a time-varying closed-loop fractional order synchronization error system was constructed. Sufficient conditions were formulated to guarantee the considered system is stochastically stable by employing the Lyapunov–Krasovskii functional method. Finally, a numerical example was presented to verify its effectiveness and the feasibility of the proposed method. Thereby, we showed that our approach is more meaningful and comprehensive. It should be mentioned that besides deception attacks, denial of service (DoS) attacks is another interesting issue for FNNs and deserves further exploration. In addition, solving the problem of multiple communication channels for FNNs will be part of our future research efforts.

Author Contributions

Z.S. was in charge of the construction of model and writing. F.Y. was in charge of the simulation. J.C. and J.Z. mainly contributed to the synchronization analysis. A.H. mainly contributed via the supervision of program. M.H. was in charge of the review and editing of the whole paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work is jointly supported by the National Natural Science Foundation of China under grant 61973137 and the Natural Science Foundation of Jiangsu Province under grant BK20181342.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this paper:
FNNsFractional order neural networks
ETSEvent-triggered scheme
TTSTime-triggered scheme
AETSAdaptive event-triggered scheme
S-C ChannelSensor to controller channel
C-A ChannelController to actuator channel

References

  1. Wang, Y.; Guo, J.; Liu, G.B.; Lu, J.W. Finite-time sampled-data synchronization for uncertain neutral-type semi-Markovian jump neural networks with mixed time-varying delays. Appl. Math. Comput. 2021, 403, 126197. [Google Scholar]
  2. Ding, S.B.; Wang, Z.S.; Rong, N.N. Intermittent control for quasi synchronization of delayed discrete-time neural networks. IEEE Trans. Cybern. 2021, 51, 862–873. [Google Scholar] [CrossRef] [PubMed]
  3. Tian, Y.F.; Wang, Z.S. A new result on H performance state estimation for static neural networks with time-varying delays. Appl. Math. Comput. 2021, 388, 125556. [Google Scholar] [CrossRef]
  4. Yuan, M.M.; Wang, W.P.; Wang, Z. Exponential synchronization of delayed memristor-based uncertain complex-valued neural networks for image protection. IEEE Trans. Neural Netw. Learn. Syst. 2020, 99, 1–15. [Google Scholar] [CrossRef] [PubMed]
  5. Xi, H.L.; Li, Y.X.; Huang, X. Generation and nonlinear dynamical analyses of fractional-order memristor-based lorenz systems. Entropy 2014, 16, 6240–6253. [Google Scholar] [CrossRef] [Green Version]
  6. Sun, H.G.; Yong, Z.; Baleanu, D.; Chen, Y.Q. A new collection of real world applications of fractional calculus in science and engineering. Commun. Nonlinear Sci. Numer. Simul. 2018, 64, 213. [Google Scholar] [CrossRef]
  7. Vladimir, Z.; Ilya, K. Best approximation of the fractional semi-derivative operator by exponential series. Mathematics 2018, 6, 12. [Google Scholar]
  8. Chen, L.P.; Qu, J.F.; Chai, Y. Synchronization of a class of fractional-order chaotic neural networks. Entropy 2013, 15, 3265–3276. [Google Scholar] [CrossRef]
  9. Cao, J.D.; Stamov, G.; Stamova, I. Almost periodicity in impulsive fractional-order reaction-diffusion neural networks with time-varying delays. IEEE Trans. Cybern. 2020, 51, 151–161. [Google Scholar] [CrossRef]
  10. Jia, J.; Huang, X.; Li, Y.X.; Cao, J.D. Global stabilization of fractional-order memristor-based neural networks with time delay. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 997–1009. [Google Scholar] [CrossRef]
  11. Xiao, J.Y.; Cao, J.D.; Cheng, J. Novel methods to finite-time Mittag–Leffler synchronization problem of fractional-order quaternion-valued neural networks. Inf. Sci. 2020, 526, 221–244. [Google Scholar] [CrossRef]
  12. Hu, H.P.; Wang, J.K.; Xie, F.L. Dynamics analysis of a new fractional-order hopfield neural network with delay and its generalized projective synchronization. Entropy 2019, 21, 1. [Google Scholar] [CrossRef] [Green Version]
  13. Wu, Y.B.; Zhu, J.L.; Li, W.X. Intermittent discrete observation control for synchronization of stochastic neural networks. IEEE Trans. Cybern. 2020, 50, 2414–2424. [Google Scholar] [CrossRef]
  14. Cao, Y.T.; Wang, S.B.; Guo, Z.Y.; Huang, T.W. Synchronization of memristive neural networks with leakage delay and parameters mismatch via event-triggered control. Neural Netw. 2019, 119, 178–189. [Google Scholar] [CrossRef]
  15. Rakkiyappan, R.; Dharani, S.; Cao, J.D. Synchronization of neural networks with control packet loss and time-varying delay via stochastic sampled-data controller. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 3215–3226. [Google Scholar] [CrossRef]
  16. Dai, M.C.; Xia, J.W.; Xia, H.; Shen, H. Event-triggered passive synchronization for Markov jump neural networks subject to randomly occurring gain variations. Neurocomputing 2019, 33, 403–411. [Google Scholar] [CrossRef]
  17. Shanmugam, L.; Mani, P.; Rajan, R. Adaptive synchronization of reaction-diffusion neural networks and its application to secure communication. IEEE Trans. Cybern. 2020, 50, 911–922. [Google Scholar] [CrossRef]
  18. Hu, T.T.; He, Z.; Zhang, X.J.; Zhong, S.M. Leader-following consensus of fractional-order multi-agent systems based on event-triggered control. Nonlinear Dyn. 2020, 99, 2219–2232. [Google Scholar] [CrossRef]
  19. Cheng, Y.L.; Hu, T.T.; Li, Y.H.; Zhong, S.M. Consensus of fractional-order multi-agent systems with uncertain topological structure: A Takagi-Sugeno fuzzy event-triggered control strategy. Fuzzy Sets Syst. 2021, 416, 64–85. [Google Scholar] [CrossRef]
  20. Wei, M.; Li, Y.X.; Tong, S. Event-triggered adaptive neural control of fractional-order nonlinear systems with full-state constraints. Neurocomputing 2020, 412, 320–326. [Google Scholar] [CrossRef]
  21. Li, Q.P.; Liu, S.Y.; Chen, Y.G. Combination event-triggered adaptive networked synchronization communication for nonlinear uncertain fractional-order chaotic systems. Appl. Math. Comput. 2018, 333, 521–535. [Google Scholar] [CrossRef]
  22. Xiong, M.H.; Tan, Y.S.; Zhang, B.Y.; Fei, S.M. Observer-based event-triggered output feedback control for fractional-order cyber–physical systems subject to stochastic network attacks. ISA Trans. 2020, 104, 15–25. [Google Scholar] [CrossRef] [PubMed]
  23. Yu, N.X.; Zhu, W. Event-triggered impulsive chaotic synchronization of fractional-order differential systems. Appl. Math. Comput. 2021, 388, 125554. [Google Scholar] [CrossRef]
  24. Zouad, F.; Kemih, K.; Hamiche, H. A new secure communication scheme using fractional order delayed chaotic system: Design and electronics circuit simulation. Analog Integr. Circ. Signal Process. 2019, 99, 619–632. [Google Scholar] [CrossRef]
  25. Bettayeb, M.; Said, D. Single channel secure communication scheme based on synchronization of fractional-order chaotic chua’s systems. Trans. Inst. Meas. Control 2018, 40, 3651–3664. [Google Scholar] [CrossRef]
  26. Zhao, C.C.; Duan, X.M.; Cai, L.; Cheng, P. Vehicle platooning with non-ideal communication networks. IEEE Trans. Veh. Technol. 2021, 70, 18–32. [Google Scholar] [CrossRef]
  27. Petrillo, A.; Pescape, A.; Santini, S. A collaborative approach for improving the security of vehicular scenarios: The case of platooning. Comput. Commun. 2018, 122, 59–75. [Google Scholar] [CrossRef]
  28. Wang, Z.B.; Song, M.K.; Zheng, S.Y. Invisible adversarial attack against deep neural networks: An adaptive penalization approach. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1474–1488. [Google Scholar] [CrossRef]
  29. Rahman, R.; Tomar, D. Threats of price scraping on e-commerce websites: Attack model and its detection using neural network. J. Comput. Virol. Hacking Tech. 2021, 17, 75–89. [Google Scholar] [CrossRef]
  30. Deng, Z.; Lun, X.; Yu, R. Data security transmission mechanism in industrial neural control systems against deception attack. Int. J. Secur. Appl. 2016, 10, 391–404. [Google Scholar]
  31. Shen, B.; Wang, Z.D.; Wang, D.; Li, Q. State-saturated recursive filter design for stochastic time-varying nonlinear complex networks under deception attacks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 3788–3800. [Google Scholar] [CrossRef]
  32. Pan, R.Q.; Tan, Y.S.; Du, D.S. Adaptive event-triggered synchronization control complex networks with quantization and cyber-attacks. Neurocomputing 2020, 382, 249–258. [Google Scholar] [CrossRef]
  33. Liu, J.L.; Xia, J.L.; Cao, J.; Tian, E.G. Quantized state estimation for neural networks with cyber attacks and hybrid triggered communication scheme. Neurocomputing 2018, 291, 35–49. [Google Scholar] [CrossRef]
  34. Sun, Y.M.; Yu, J.Y.; Yu, X.H.; Gao, H.J. Decentralized adaptive event-triggered control for a class of uncertain systems with deception attacks and its application to electronic circuits. IEEE Trans. Circ. Syst. 2020, 67, 12. [Google Scholar] [CrossRef]
  35. Song, Q.K.; Shu, H.Q.; Zhao, Z.J.; Liu, Y.R. Lagrange stability analysis for complex-valued neural networks with leakage delay and mixed time-varying delays. Neurocomputing 2017, 244, 33–41. [Google Scholar] [CrossRef]
  36. Peng, C.; Han, Q.L.; Yue, D. Communication delay distribution dependent decentralized control for large-scale systems with IP-based communication networks. IEEE Trans. Control Syst. Technol. 2013, 21, 820–830. [Google Scholar] [CrossRef]
  37. Chen, G.R.; Zhou, J.; Liu, Z.R. Global synchronization of couple delayed neural networks and applications to chaotic cnn models. Int. J. Bifurc. Chaos 2004, 14, 2229–2240. [Google Scholar] [CrossRef]
  38. Yu, W.W.; Cao, J.D. Synchronization control of stochastic delayed neural networks. Phys. A 2007, 373, 252–260. [Google Scholar] [CrossRef]
  39. Vijay Aravind, R.; Balasubramaniam, P. Stochastic stability of fractional-order Markovian jumping complex-valued neural networks with time-varying delays. Neurocomputing 2021, 439, 122–133. [Google Scholar] [CrossRef]
  40. Tian, J.K.; Li, Y.M.; Zhao, J.; Zhong, S. Delay-dependent stochastic stability criteria for Markovian jumping neural networks with mode-dependent time-varying delays and partially known transition rates. Appl. Math. Comput. 2012, 218, 5769–5781. [Google Scholar] [CrossRef]
  41. Balasubramaniam, P.; Rakkiyappan, R. Delay-dependent robust stability analysis for Markovian jumping stochastic Cohen–Grossberg neural networks with discrete interval and distributed time-varying delays. Nonlinear Anal. Hybrid Syst. 2009, 3, 207–214. [Google Scholar] [CrossRef]
Figure 1. The framework of the closed-loop synchronization error system.
Figure 1. The framework of the closed-loop synchronization error system.
Entropy 23 01291 g001
Figure 2. Synchronization error e i ( t ) ( i = 1 , 2 ) without control input.
Figure 2. Synchronization error e i ( t ) ( i = 1 , 2 ) without control input.
Entropy 23 01291 g002
Figure 3. Synchronization error e i ( t ) ( i = 1 , 2 ) with control input u i ( t ) ( i = 1 , 2 ) .
Figure 3. Synchronization error e i ( t ) ( i = 1 , 2 ) with control input u i ( t ) ( i = 1 , 2 ) .
Entropy 23 01291 g003
Figure 4. The state of the deception signal in the S-C channel.
Figure 4. The state of the deception signal in the S-C channel.
Entropy 23 01291 g004
Figure 5. The state of the deception signal in the C-A channel.
Figure 5. The state of the deception signal in the C-A channel.
Entropy 23 01291 g005
Figure 6. The trajectories of control input u i ( t ) ( i = 1 , 2 ) .
Figure 6. The trajectories of control input u i ( t ) ( i = 1 , 2 ) .
Entropy 23 01291 g006
Figure 7. The trajectory of event-triggered parameter d ( t ) .
Figure 7. The trajectory of event-triggered parameter d ( t ) .
Entropy 23 01291 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shen, Z.; Yang, F.; Chen, J.; Zhang, J.; Hu, A.; Hu, M. Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay. Entropy 2021, 23, 1291. https://doi.org/10.3390/e23101291

AMA Style

Shen Z, Yang F, Chen J, Zhang J, Hu A, Hu M. Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay. Entropy. 2021; 23(10):1291. https://doi.org/10.3390/e23101291

Chicago/Turabian Style

Shen, Zhuan, Fan Yang, Jing Chen, Jingxiang Zhang, Aihua Hu, and Manfeng Hu. 2021. "Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay" Entropy 23, no. 10: 1291. https://doi.org/10.3390/e23101291

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop