期刊文献+
共找到54篇文章
< 1 2 3 >
每页显示 20 50 100
Exploring DeepSeek:A Survey on Advances,Applications,Challenges and Future Directions 被引量:6
1
作者 Zehang Deng Wanlun Ma +4 位作者 qing-long han Wei Zhou Xiaogang Zhu Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期872-893,共22页
The rapid advancement of large models has led to the development of increasingly sophisticated models capable of generating diverse,personalized,and high-quality content.Among these,DeepSeek has emerged as a pivotal o... The rapid advancement of large models has led to the development of increasingly sophisticated models capable of generating diverse,personalized,and high-quality content.Among these,DeepSeek has emerged as a pivotal open-source initiative,demonstrating high performance at significantly lower computation costs compared to closed-source counterparts.This survey provides a comprehensive overview of the DeepSeek family of models,including DeepSeek-V3 and DeepSeek-R1,covering their core innovations in architecture,system pipeline,algorithm,and infrastructure.We explore their practical applications across various domains,such as healthcare,finance,and education,highlighting their impact on both industry and society.Further-more,we examine potential security,privacy,and ethical concerns arising from the widespread deployment of these models,emphasizing the need for responsible AI development.Finally,we outline future research directions to enhance the performance,safety,and scalability of DeepSeek models,aiming to foster further advancements in the open-source large model community. 展开更多
关键词 DeepSeek large language model large multimodal model
在线阅读 下载PDF
When Embodied AI Meets Industry 5.0:Human-Centered Smart Manufacturing 被引量:4
2
作者 Jing Xu Qiyu Sun +1 位作者 qing-long han Yang Tang 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期485-501,共17页
As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social syste... As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape. 展开更多
关键词 Embodied AI human-centered manufacturing Industry 5.0 internet of things large multi-mode language models
在线阅读 下载PDF
The Security of Using Large Language Models:A Survey With Emphasis on ChatGPT 被引量:2
3
作者 Wei Zhou Xiaogang Zhu +4 位作者 qing-long han Lin Li Xiao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期1-26,共26页
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec... ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users. 展开更多
关键词 Artificial intelligence(AI) ChatGPT large language models(LLMs) SECURITY
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:2
4
作者 Xiaogang Zhu Wei Zhou +3 位作者 qing-long han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
Online Estimation of DC-link Capacitor Parameters of Three-Level NPC Converters Using Inherent Signals Analysis
5
作者 Ricardo Lucio de Araujo Ribeiro Reuben Palmer Rezende de Sousa +2 位作者 Alexandre Cunha Oliveira Antonio Marcus Nogueira Lima qing-long han 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1434-1444,共11页
This paper presents a method for estimating the parameters of DC-link capacitors in three-level NPC voltage source inverters(3L-NPC-VSI)used in grid-tied systems.The technique uses the signals generated by the intermo... This paper presents a method for estimating the parameters of DC-link capacitors in three-level NPC voltage source inverters(3L-NPC-VSI)used in grid-tied systems.The technique uses the signals generated by the intermodulation caused by the PWM strategy and converter topology interaction to estimate the capacitor parameters of the converter DC-link.It utilizes an observer-based structure consisting of a recursive noninteger sliding discrete Fourier transform(rnSDFT)and an RLS filter improved with a forgetting factor(oSDFT-RLS)to accurately estimate the capacitance and equivalent series resistance(ESR).Importantly,this method does not require additional sensors beyond those already installed in off-the-shelf 3L-NPC-VSI systems,ensuring its noninvasiveness.Furthermore,the oSDFTRLS estimates capacitor parameters in the time-frequency domain,enabling the tracking of capacitor degradation and predicting potential faults.Experimental results from the laboratory setup demonstrate the effectiveness of the proposed condition monitoring method. 展开更多
关键词 Aluminum electrolytic capacitors(AEC) condition monitoring forgetting factor inherent signals parameter estimation recursive least squares(RLS) sliding discrete Fourier transform(SDFT) three-level NPC converter
在线阅读 下载PDF
DeepSeek:Paradigm Shifts and Technical Evolution in Large AI Models
6
作者 Luolin Xiong Haofen Wang +7 位作者 Xi Chen Lu Sheng Yun Xiong Jingping Liu Yanghua Xiao Huajun Chen qing-long han Yang Tang 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期841-858,共18页
DeepSeek,a Chinese artificial intelligence(AI)startup,has released their V3 and R1 series models,which attracted global attention due to their low cost,high performance,and open-source advantages.This paper begins by ... DeepSeek,a Chinese artificial intelligence(AI)startup,has released their V3 and R1 series models,which attracted global attention due to their low cost,high performance,and open-source advantages.This paper begins by reviewing the evolution of large AI models focusing on paradigm shifts,the mainstream large language model(LLM)paradigm,and the DeepSeek paradigm.Subsequently,the paper highlights novel algorithms introduced by DeepSeek,including multi-head latent attention(MLA),mixture-of-experts(MoE),multi-token prediction(MTP),and group relative policy optimization(GRPO).The paper then explores DeepSeek's engineering breakthroughs in LLM scaling,training,inference,and system-level optimization architecture.Moreover,the impact of DeepSeek models on the competitive AI landscape is analyzed,comparing them to mainstream LLMs across various fields.Finally,the paper reflects on the insights gained from DeepSeek's innovations and discusses future trends in the technical and engineering development of large AI models,particularly in data,training,and reasoning. 展开更多
关键词 DeepSeek large AI models reasoning capability reinforcement learning test-time scaling
在线阅读 下载PDF
Accumulative-Error-Based Event-Triggered Control for Discrete-Time Linear Systems:A Discrete-Time Looped Functional Method
7
作者 Xian-Ming Zhang qing-long han +1 位作者 Xiaohua Ge Bao-Lin Zhang 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期683-693,共11页
This paper is concerned with event-triggered control of discrete-time systems with or without input saturation.First,an accumulative-error-based event-triggered scheme is devised for control updates.When the accumulat... This paper is concerned with event-triggered control of discrete-time systems with or without input saturation.First,an accumulative-error-based event-triggered scheme is devised for control updates.When the accumulated error between the current state and the latest control update exceeds a certain threshold,an event is triggered.Such a scheme can ensure the event-generator works at a relatively low rate rather than falls into hibernation especially after the system steps into its steady state.Second,the looped functional method for continuous-time systems is extended to discrete-time systems.By introducing an innovative looped functional that links the event-triggered scheme,some sufficient conditions for the co-design of control gain and event-triggered parameters are obtained in terms of linear matrix inequalities with a couple of tuning parameters.Then,the proposed method is applied to discrete-time systems with input saturation.As a result,both suitable control gains and event-triggered parameters are also co-designed to ensure the system trajectories converge to the region of attraction.Finally,an unstable reactor system and an inverted pendulum system are given to show the effectiveness of the proposed method. 展开更多
关键词 Discrete-time linear systems event-triggered control input saturation looped functional method
在线阅读 下载PDF
Set-Valued State Estimation of Nonlinear Discrete-Time Systems and Its Application to Attack Detection
8
作者 Hao Liu qing-long han Yuzhe Li 《IEEE/CAA Journal of Automatica Sinica》 2025年第10期2015-2025,共11页
This paper investigates set-valued state estimation of nonlinear systems with unknown-but-bounded(UBB)noises based on constrained polynomial zonotopes which is utilized to characterize non-convex sets.First,properties... This paper investigates set-valued state estimation of nonlinear systems with unknown-but-bounded(UBB)noises based on constrained polynomial zonotopes which is utilized to characterize non-convex sets.First,properties of constrained polynomial zonotopes are provided and the order reduction method is given to reduce the computational complexity.Then,the corresponding improved prediction-update algorithm is proposed so that it can be adapted to non-convex sets.Based on generalized intersection,the utilization of set-based estimation for attack detection is analyzed.Finally,an example is given to show the efficiency of our results. 展开更多
关键词 Attack detection constrained polynomial zonotopes nonlinear systems set-valued estimation
在线阅读 下载PDF
A Brief Overview of ChatGPT:The History,Status Quo and Potential Future Development 被引量:197
9
作者 Tianyu Wu Shizhu He +4 位作者 Jingping Liu Siqi Sun Kang Liu qing-long han Yang Tang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1122-1136,共15页
ChatG PT,an artificial intelligence generated content (AIGC) model developed by OpenAI,has attracted worldwide attention for its capability of dealing with challenging language understanding and generation tasks in th... ChatG PT,an artificial intelligence generated content (AIGC) model developed by OpenAI,has attracted worldwide attention for its capability of dealing with challenging language understanding and generation tasks in the form of conversations.This paper briefly provides an overview on the history,status quo and potential future development of ChatGPT,helping to provide an entry point to think about ChatGPT.Specifically,from the limited open-accessed resources,we conclude the core techniques of ChatGPT,mainly including large-scale language models,in-context learning,reinforcement learning from human feedback and the key technical steps for developing ChatGPT.We further analyze the pros and cons of ChatGPT and we rethink the duality of ChatGPT in various fields.Although it has been widely acknowledged that ChatGPT brings plenty of opportunities for various fields,mankind should still treat and use ChatG PT properly to avoid the potential threat,e.g.,academic integrity and safety challenge.Finally,we discuss several open problems as the potential development of ChatGPT. 展开更多
关键词 AIGC ChatGPT GPT-3 GPT-4 human feedback large language models
在线阅读 下载PDF
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:35
10
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 qing-long han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(VANETs)
在线阅读 下载PDF
Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks 被引量:23
11
作者 Xiaohua Ge qing-long han +1 位作者 Qing Wu Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1234-1251,共18页
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti... Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumption and vehicle emissions.A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads.This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service(DoS)attacks that disrupt vehicle-to-vehicle communications.First,a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties,including diverse vehicle masses and engine inertial delays,unknown and nonlinear resistance forces,and a dynamic platoon leader.Then,a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability,attack resilience,platoon safety and scalability.Furthermore,a numerically efficient offline design algorithm for determining the desired platoon control law is developed,under which the platoon resilience against DoS attacks can be maximized but the anticipated stability,safety and scalability requirements remain preserved.Finally,extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method. 展开更多
关键词 Connected automated vehicles(CAVs) cooperative adaptive cruise control denial-of-service(DoS)attacks resilient control vehicle platooning vehicle-to-vehicle communication
在线阅读 下载PDF
Consensus Control of Multi-Agent Systems Using Fault-Estimation-in-the-Loop:Dynamic Event-Triggered Case 被引量:24
12
作者 Yamei Ju Derui Ding +2 位作者 Xiao He qing-long han Guoliang Wei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第8期1440-1451,共12页
The paper develops a novel framework of consensus control with fault-estimation-in-the-loop for multi-agent systems(MASs)in the presence of faults.A dynamic event-triggered protocol(DETP)by adding an auxiliary variabl... The paper develops a novel framework of consensus control with fault-estimation-in-the-loop for multi-agent systems(MASs)in the presence of faults.A dynamic event-triggered protocol(DETP)by adding an auxiliary variable is utilized to improve the utilization of communication resources.First,a novel estimator with a noise bias is put forward to estimate the existed fault and then a consensus controller with fault compensation(FC)is adopted to realize the demand of reliability and safety of addressed MASs.Subsequently,a novel consensus control framework with fault-estimation-in-the-loop is developed to achieve the predetermined consensus performance with the l_(2)-l_(∞)constraint by employing the variance analysis and the Lyapunov stability approaches.Furthermore,the desired estimator and controller gains are obtained in light of the solution to an algebraic matrix equation and a linear matrix inequality in a recursive way,respectively.Finally,a simulation result is employed to verify the usefulness of the proposed design framework. 展开更多
关键词 Consensus control dynamic event-triggered protocol(DETP) fault compensation(FC) fault estimation multi-agent systems(MASs)
在线阅读 下载PDF
Unmanned Aerial Vehicles:Control Methods and Future Challenges 被引量:21
13
作者 Zongyu Zuo Cunjia Liu +1 位作者 qing-long han Jiawei Song 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期601-614,共14页
With the rapid development of computer technology,automatic control technology and communication technology,research on unmanned aerial vehicles(UAVs)has attracted extensive attention from all over the world during th... With the rapid development of computer technology,automatic control technology and communication technology,research on unmanned aerial vehicles(UAVs)has attracted extensive attention from all over the world during the last decades.Particularly due to the demand of various civil applications,the conceptual design of UAV and autonomous flight control technology have been promoted and developed mutually.This paper is devoted to providing a brief review of the UAV control issues,including motion equations,various classical and advanced control approaches.The basic ideas,applicable conditions,advantages and disadvantages of these control approaches are illustrated and discussed.Some challenging topics and future research directions are raised. 展开更多
关键词 Aircraft control disturbance rejection PATH-FOLLOWING trajectory tracking unmanned aerial vehicle
在线阅读 下载PDF
Dynamic Event-triggered Control and Estimation: A Survey 被引量:18
14
作者 Xiaohua Ge qing-long han +1 位作者 Xian-Ming Zhang Derui Ding 《International Journal of Automation and computing》 EI CSCD 2021年第6期857-886,共30页
The efficient utilization of computation and communication resources became a critical design issue in a wide range of networked systems due to the finite computation and processing capabilities of system components(e... The efficient utilization of computation and communication resources became a critical design issue in a wide range of networked systems due to the finite computation and processing capabilities of system components(e.g., sensor, controller) and shared network bandwidth. Event-triggered mechanisms(ETMs) are regarded as a major paradigm shift in resource-constrained applications compared to the classical time-triggered mechanisms, which allows a trade-off to be achieved between desired control/estimation performance and improved resource efficiency. In recent years, dynamic event-triggered mechanisms(DETMs) are emerging as a promising enabler to fulfill more resource-efficient and flexible design requirements. This paper provides a comprehensive review of the latest developments in dynamic event-triggered control and estimation for networked systems. Firstly, a unified event-triggered control and estimation framework is established, which empowers several fundamental issues associated with the construction and implementation of the desired ETM and controller/estimator to be systematically investigated. Secondly, the motivations of DETMs and their main features and benefits are outlined. Then, two typical classes of DETMs based on auxiliary dynamic variables(ADVs) and dynamic threshold parameters(DTPs) are elaborated. In addition, the main techniques of constructing ADVs and DTPs are classified, and their corresponding analysis and design methods are discussed. Furthermore, three application examples are provided to evaluate different ETMs and verify how and under what conditions DETMs are superior to their static and periodic counterparts. Finally, several challenging issues are envisioned to direct the future research. 展开更多
关键词 Networked systems dynamic event-triggered control dynamic event-triggered estimation dynamic event-triggered mechanisms vehicle active suspension system water distribution and supply system
原文传递
Chat with ChatGPT on Industry 5.0:Learning and Decision-Making for Intelligent Industries 被引量:34
15
作者 Fei-Yue Wang Jing Yang +2 位作者 Xingxia Wang Juanjuan Li qing-long han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期831-834,共4页
THE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence where interactive activities between actual and artificial,real and virt... THE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence where interactive activities between actual and artificial,real and virtual,human and machine play an active and important role online and in real-time.At IEEE/CAA JAS,we are interested in investigating the impact and significance of this new era on industrial development,especially control and automation for manufacturing and production. 展开更多
关键词 GPT artificial AUTOMATION
在线阅读 下载PDF
Cooperative and Competitive Multi-Agent Systems:From Optimization to Games 被引量:16
16
作者 Jianrui Wang Yitian Hong +4 位作者 Jiali Wang Jiapeng Xu Yang Tang qing-long han Jürgen Kurths 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第5期763-783,共21页
Multi-agent systems can solve scientific issues related to complex systems that are difficult or impossible for a single agent to solve through mutual collaboration and cooperation optimization.In a multi-agent system... Multi-agent systems can solve scientific issues related to complex systems that are difficult or impossible for a single agent to solve through mutual collaboration and cooperation optimization.In a multi-agent system,agents with a certain degree of autonomy generate complex interactions due to the correlation and coordination,which is manifested as cooperative/competitive behavior.This survey focuses on multi-agent cooperative optimization and cooperative/non-cooperative games.Starting from cooperative optimization,the studies on distributed optimization and federated optimization are summarized.The survey mainly focuses on distributed online optimization and its application in privacy protection,and overviews federated optimization from the perspective of privacy protection me-chanisms.Then,cooperative games and non-cooperative games are introduced to expand the cooperative optimization problems from two aspects of minimizing global costs and minimizing individual costs,respectively.Multi-agent cooperative and non-cooperative behaviors are modeled by games from both static and dynamic aspects,according to whether each player can make decisions based on the information of other players.Finally,future directions for cooperative optimization,cooperative/non-cooperative games,and their applications are discussed. 展开更多
关键词 Cooperative games counterfactual regret minimization distributed optimization federated optimization fictitious
在线阅读 下载PDF
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity:A Survey 被引量:16
17
作者 Jun Zhang Lei Pan +3 位作者 qing-long han Chao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第3期377-391,共15页
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opport... With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research. 展开更多
关键词 Cyber-physical system CYBERSECURITY deep learning intrusion detection pattern classification
在线阅读 下载PDF
Decentralized Dynamic Event-Triggered Communication and Active Suspension Control of In-Wheel Motor Driven Electric Vehicles with Dynamic Damping 被引量:15
18
作者 Iftikhar Ahmad Xiaohua Ge qing-long han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第5期971-986,共16页
This paper addresses the co-design problem of decentralized dynamic event-triggered communication and active suspension control for an in-wheel motor driven electric vehicle equipped with a dynamic damper. The main ob... This paper addresses the co-design problem of decentralized dynamic event-triggered communication and active suspension control for an in-wheel motor driven electric vehicle equipped with a dynamic damper. The main objective is to simultaneously improve the desired suspension performance caused by various road disturbances and alleviate the network resource utilization for the concerned in-vehicle networked suspension system. First, a T-S fuzzy active suspension model of an electric vehicle under dynamic damping is established. Second,a novel decentralized dynamic event-triggered communication mechanism is developed to regulate each sensor's data transmissions such that sampled data packets on each sensor are scheduled in an independent manner. In contrast to the traditional static triggering mechanisms, a key feature of the proposed mechanism is that the threshold parameter in the event trigger is adjusted adaptively over time to reduce the network resources occupancy. Third, co-design criteria for the desired event-triggered fuzzy controller and dynamic triggering mechanisms are derived. Finally, comprehensive comparative simulation studies of a 3-degrees-of-freedom quarter suspension model are provided under both bump road disturbance and ISO-2631 classified random road disturbance to validate the effectiveness of the proposed co-design approach. It is shown that ride comfort can be greatly improved in either road disturbance case and the suspension deflection, dynamic tyre load and actuator control input are all kept below the prescribed maximum allowable limits, while simultaneously maintaining desirable communication efficiency. 展开更多
关键词 Active suspension control decentralized eventtriggered control dynamic damper dynamic eventtriggered communication in-wheel motor driven electric vehicle
在线阅读 下载PDF
A Scalable Adaptive Approach to Multi-Vehicle Formation Control with Obstacle Avoidance 被引量:11
19
作者 Xiaohua Ge qing-long han +1 位作者 Jun Wang Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期990-1004,共15页
This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden environments.The MVS under consideration consists of a leader v... This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden environments.The MVS under consideration consists of a leader vehicle with an unknown control input and a group of follower vehicles,connected via a directed interaction topology,subject to simultaneous unknown heterogeneous nonlinearities and external disturbances.The central aim is to achieve effective and collisionfree formation tracking control for the nonlinear and uncertain MVS with obstacles encountered in formation maneuvering,while not demanding global information of the interaction topology.Toward this goal,a radial basis function neural network is used to model the unknown nonlinearity of vehicle dynamics in each vehicle and repulsive potentials are employed for obstacle avoidance.Furthermore,a scalable distributed adaptive formation tracking control protocol with a built-in obstacle avoidance mechanism is developed.It is proved that,with the proposed protocol,the resulting formation tracking errors are uniformly ultimately bounded and obstacle collision avoidance is guaranteed.Comprehensive simulation results are elaborated to substantiate the effectiveness and the promising collision avoidance performance of the proposed scalable adaptive formation control approach. 展开更多
关键词 Adaptive control collision avoidance distributed formation control multi-vehicle systems neural networks obstacle avoidance repulsive potential
在线阅读 下载PDF
Secure Impulsive Synchronization in Lipschitz-Type Multi-Agent Systems Subject to Deception Attacks 被引量:18
20
作者 Wangli He Zekun Mo +1 位作者 qing-long han Feng Qian 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1326-1334,共9页
Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heav... Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy loss.Therefore,the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper.The control signals can be replaced with false data from controllerto-actuator channels or the controller.The success of the attack is measured through a stochastic variable.A distributed impulsive controller using a pinning strategy is redesigned,which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks.Some sufficient conditions are derived,in which upper bounds of the synchronization error are given.Finally,two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results. 展开更多
关键词 Deception attacks impulsive control multi-agent systems(MASs) SYNCHRONIZATION
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部