This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates senso...This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates sensor and actuator disturbances within the dynamics of follower robots.Each follower robot has unknown dynamics and control inputs,which expose it to the risks of both sensor and actuator attacks.The leader robot,described by a secondorder,time-varying nonlinear model,transmits its position,velocity,and acceleration information to follower robots through a wireless connection.To handle the complex setup and communication among robots in the network,we design a robust hybrid distributed adaptive control strategy combining the effect of sensor and actuator attack,which ensures asymptotic consensus,extending beyond conventional bounded consensus results.The proposed framework employs fuzzy logic systems(FLSs)as proactive controllers to estimate unknown nonlinear behaviors,while also effectively managing sensor and actuator attacks,ensuring stable consensus among all agents.To counter the impact of the combined signal attack on follower dynamics,a specialized robust control mechanism is designed,sustaining system stability and performance under adversarial conditions.The efficiency of this control strategy is demonstrated through simulations conducted across two different directed communication topologies,underscoring the protocol’s adaptability,resilience,and effectiveness in maintaining global consensus under complex attack scenarios.展开更多
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter...The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC.展开更多
This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid ag...This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid aggregation and often discard fine-grained boundary information.In contrast,our method computes soft membershipswithin each receptive field and aggregates cluster-wise responses throughmembership-weighted pooling,thereby preserving informative structure while reducing dimensionality.Being differentiable,the proposed layer operates as standard two-dimensional pooling.We evaluate our approach across various CNN backbones and open datasets,including CIFAR-10/100,STL-10,LFW,and ImageNette,and further probe small training set restrictions on MNIST and Fashion-MNIST.In these settings,the proposed pooling consistently improves accuracy and weighted F1 over conventional baselines,with particularly strong gains when training data are scarce.Even with less than 1%of the training set,ourmethodmaintains reliable performance,indicating improved sample efficiency and robustness to noisy or ambiguous local patterns.Overall,integrating soft memberships into the pooling operator provides a practical and generalizable inductive bias that enhances robustness and generalization in modern CNN pipelines.展开更多
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner...Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.展开更多
In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free...In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions.展开更多
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man...Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.展开更多
Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attracti...Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attractive victims for themalicious actions of adversaries.Within the spectrumof existing threats,Side-ChannelAttacks(SCAs)have established themselves as an effective way to compromise cryptographic implementations.These attacks exploit unintended,unintended physical leakage that occurs during the cryptographic execution of devices,bypassing the theoretical strength of the crypto design.In recent times,the advancement of deep learning has provided SCAs with a powerful ally.Well-trained deep-learningmodels demonstrate an exceptional capacity to identify correlations between side-channel measurements and sensitive data,thereby significantly enhancing such attacks.To further understand the security threats posed by deep-learning SCAs and to aid in formulating robust countermeasures in the future,this paper undertakes an exhaustive investigation of leading-edge SCAs targeting Advanced Encryption Standard(AES)implementations.The study specifically focuses on attacks that exploit power consumption and electromagnetic(EM)emissions as primary leakage sources,systematically evaluating the extent to which diverse deep learning techniques enhance SCAs acrossmultiple critical dimensions.These dimensions include:(i)the characteristics of publicly available datasets derived from various hardware and software platforms;(ii)the formalization of leakage models tailored to different attack scenarios;(iii)the architectural suitability and performance of state-of-the-art deep learning models.Furthermore,the survey provides a systematic synthesis of current research findings,identifies significant unresolved issues in the existing literature and suggests promising directions for future work,including cross-device attack transferability and the impact of quantum-classical hybrid computing on side-channel security.展开更多
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug...Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.展开更多
This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems.A particular feature of our work is that we consider systems in which the state is constrained...This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems.A particular feature of our work is that we consider systems in which the state is constrained by saturation.Measurements are transmitted to nodes of a sensor network over unreliable wireless channels.We propose a linear coding mechanism,together with a distributed method for obtaining a state estimate at each node.These designs aim to minimize the state estimation error covariance.In addition,we derive a bound on this covariance,and accommodate the design parameters to minimize this bound.The resulting design depends on the packet loss probabilities of the wireless channels.This permits applying the proposed scheme to systems in which communications suffer from denial-of-service attacks,as such attacks typically affect those probabilities.Finally,we present a numerical example illustrating this application.展开更多
An attack-resilient distributed Nash equilibrium(NE) seeking problem is addressed for noncooperative games of networked systems under malicious cyber-attacks,i.e.,false data injection(FDI) attacks.Different from many ...An attack-resilient distributed Nash equilibrium(NE) seeking problem is addressed for noncooperative games of networked systems under malicious cyber-attacks,i.e.,false data injection(FDI) attacks.Different from many existing distributed NE seeking works,it is practical and challenging to get resilient adaptively distributed NE seeking under unknown and unbounded FDI attacks.An attack-resilient NE seeking algorithm that is distributed(i.e.,independent of global information on the graph's algebraic connectivity,Lipschitz and monotone constants of pseudo-gradients,or number of players),is presented by means of incorporating the consensus-based gradient play with a distributed attack identifier so as to achieve simultaneous NE seeking and attack identification asymptotically.Another key characteristic is that FDI attacks are allowed to be unknown and unbounded.By exploiting nonsmooth analysis and stability theory,the global asymptotic convergence of the developed algorithm to the NE is ensured.Moreover,we extend this design to further consider the attack-resilient NE seeking of double-integrator players.Lastly,numerical simulation and practical experiment results are presented to validate the developed algorithms' effectiveness.展开更多
Deep learning attentionmechanisms have achieved remarkable progress in computer vision,but still face limitations when handling images with ambiguous boundaries and uncertain feature representations.Conventional atten...Deep learning attentionmechanisms have achieved remarkable progress in computer vision,but still face limitations when handling images with ambiguous boundaries and uncertain feature representations.Conventional attention modules such as SE-Net,CBAM,ECA-Net,and CA adopt a deterministic paradigm,assigning fixed scalar weights to features without modeling ambiguity or confidence.To overcome these limitations,this paper proposes the Fuzzy Attention Network Layer(FANL),which integrates intuitionistic fuzzy set theory with convolutional neural networks to explicitly represent feature uncertainty through membership(μ),non-membership(ν),and hesitation(π)degrees.FANLconsists of four coremodules:(1)feature dimensionality reduction via global pooling,(2)fuzzymodeling using learnable clustering centers,(3)adaptive attention generation through weighted fusion of fuzzy components,and(4)feature refinement through residual connections.A cross-layer guidance mechanism is further introduced to enhance hierarchical feature propagation,allowing high-level semantic features to incorporate fine-grained texture information from shallow layers.Comprehensive experiments on three benchmark datasets—PathMNIST-30000,full PathMNIST,and Blood MNIST—demonstrate the effectiveness and generalizability of FANL.The model achieves 84.41±0.56%accuracy and a 1.69%improvement over the baseline CNN while maintaining lightweight computational complexity.Ablation studies show that removing any component causes a 1.7%–2.0%performance drop,validating the synergistic contribution of each module.Furthermore,FANL provides superior uncertainty calibration(ECE=0.0452)and interpretable selective prediction under uncertainty.Overall,FANL presents an efficient and uncertaintyaware attention framework that improves both accuracy and reliability,offering a promising direction for robust visual recognition under ambiguous or noisy conditions.展开更多
Pull-ups are a very common fitness exercise that can be seen in many gyms.For athletes,it is very important to perform pull-ups correctly and scientifically.The pull-up scoring method designed in this paper can score ...Pull-ups are a very common fitness exercise that can be seen in many gyms.For athletes,it is very important to perform pull-ups correctly and scientifically.The pull-up scoring method designed in this paper can score the quality of pull-up movement scientifically and objectively,and provide guidance to help athletes better complete the pull-up movement.In this method,the OpenPose algorithm is used to identify the coordinates of skeleton points,and then the coordinate data are processed by a Kalman filter to obtain coordinates closer to the true values.Finally,the filtered data are input into the scoring algorithm designed based on the fuzzy comprehensive evaluation algorithm,and the results of the pull-up quality score and the corresponding guidance are obtained.展开更多
The wide-area damping controllers(WADCs),which are essential for mitigating regional low-frequency oscillations,face cyber-physical security threats due to the vulnerability of wide-area measurement system to cyber at...The wide-area damping controllers(WADCs),which are essential for mitigating regional low-frequency oscillations,face cyber-physical security threats due to the vulnerability of wide-area measurement system to cyber attacks and wind power uncertainties.This paper introduces reachability analysis method to quantify the impact of varying-amplitude attacks and uncertain wind fluctuations on the performance of WADC.Firstly,considering wind farm integration and attack injection,a nonlinear power system model with multiple buses is constructed based on Kron reduction method to improve computational efficiency and mitigate the constraints imposed by algebraic constraints.Then,a zonotope-based polytope construction method is employed to effectively model the range of attack amplitudes and wind uncertainties.By conducting reachability analysis,the reachable set preserving the nonlinear characteristics of studied system is computed,which enables the quantification of the maximum fluctuation range of regional oscillations under the dual disturbances.Case studies are undertaken on two multi-machine power systems with wind farm integration.The obtained results emphasize the efficacy of designed method,providing valuable insights into the magnitude of the impact that attacks exert on the operational characteristics of power system under various uncertain factors.展开更多
In this paper,we propose a fuzzy logic-based coded event-triggered control with self-adjustable prescribed performance(FL-CEC-SPP)to address the trade-off between control performance and communication efficiency in re...In this paper,we propose a fuzzy logic-based coded event-triggered control with self-adjustable prescribed performance(FL-CEC-SPP)to address the trade-off between control performance and communication efficiency in resource-constrained networked control systems.The method integrates a fuzzy-coded event-triggered controller into a coded control framework to dynamically adjust the triggering threshold,thereby reducing unnecessary transmissions while maintaining system stability.A self-adjustable prescribed performance constraint is also incorporated to ensure that the tracking error remains within predefined bounds under arbitrary initial conditions.Theoretical analyses and simulation comparisons show that the method proposed in this paper maintains good tracking performance and stability while reducing the communication burden,and has wide applications in resource-constrained network control systems.展开更多
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass...Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.展开更多
Satellite image segmentation plays a crucial role in remote sensing,supporting applications such as environmental monitoring,land use analysis,and disaster management.However,traditional segmentation methods often rel...Satellite image segmentation plays a crucial role in remote sensing,supporting applications such as environmental monitoring,land use analysis,and disaster management.However,traditional segmentation methods often rely on large amounts of labeled data,which are costly and time-consuming to obtain,especially in largescale or dynamic environments.To address this challenge,we propose the Semi-Supervised Multi-View Picture Fuzzy Clustering(SS-MPFC)algorithm,which improves segmentation accuracy and robustness,particularly in complex and uncertain remote sensing scenarios.SS-MPFC unifies three paradigms:semi-supervised learning,multi-view clustering,and picture fuzzy set theory.This integration allows the model to effectively utilize a small number of labeled samples,fuse complementary information from multiple data views,and handle the ambiguity and uncertainty inherent in satellite imagery.We design a novel objective function that jointly incorporates picture fuzzy membership functions across multiple views of the data,and embeds pairwise semi-supervised constraints(must-link and cannot-link)directly into the clustering process to enhance segmentation accuracy.Experiments conducted on several benchmark satellite datasets demonstrate that SS-MPFC significantly outperforms existing state-of-the-art methods in segmentation accuracy,noise robustness,and semantic interpretability.On the Augsburg dataset,SS-MPFC achieves a Purity of 0.8158 and an Accuracy of 0.6860,highlighting its outstanding robustness and efficiency.These results demonstrate that SSMPFC offers a scalable and effective solution for real-world satellite-based monitoring systems,particularly in scenarios where rapid annotation is infeasible,such as wildfire tracking,agricultural monitoring,and dynamic urban mapping.展开更多
Orthogonal Frequency Division Multiplexing(OFDM)enables efficient Dynamic Spectrum Access(DSA)but suffers from high sidelobe that causes excessive out-of-band(OOB)emissions and expose the system to spectrum-layer cybe...Orthogonal Frequency Division Multiplexing(OFDM)enables efficient Dynamic Spectrum Access(DSA)but suffers from high sidelobe that causes excessive out-of-band(OOB)emissions and expose the system to spectrum-layer cyberattacks such as man-in-the-middle(MITM),eavesdropping,and primary user emulation(PUE)attacks.To address both spectral leakage and its security implications,this paper introduces a secure and intelligent hybrid optimization strategy that combinesan Eigenspace-based Generalized Sidelobe Canceller(ES-GSC)with a Genetic Algorithm(GA),to derive optimally weighted cancellation carriers.The proposed method jointly suppresses sidelobes and reinforces resistance to leakage-based attacks.MATLAB Simulation demonstrate considerable reductions in OOB emissions and higher resilience against spectrum-layer threats compared with existing techniques.展开更多
Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary freque...Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary frequency regulation(PFR),this paper proposes a novel hybrid energy storage system(HESS)control strategy based on Newton-Raphson optimization algorithm(NRBO)-VMD and a fuzzy neural network(FNN)for PFR.In the primary power allocation stage,the high inertia and slow response of thermal power units prevent them from promptly responding to the high-frequency components of PFR signals,leading to increased mechanical stress.To address the distinct response characteristics of thermal units and HESS,an NRBO-VMD based decomposition method for PFR signals is proposed,enabling a flexible system response to grid frequency deviations.Within the HESS,an adaptive coordinated control strategy and a State of Charge(SOC)self-recovery strategy are introduced.These strategies autonomously adjust the virtual inertia and droop coefficients based on the depth of frequency regulation and the real-time SOC.Furthermore,a FNN is constructed to perform secondary refinement of the internal power distribution within the HESS.Finally,simulations under various operational conditions demonstrate that the proposed strategy effectively mitigates frequent power adjustments of the thermal unit during PFR,adaptively achieves optimal power decomposition and distribution,maintains the flywheel energy storage’s SOC within an optimal range,and ensures the long-term stable operation of the HESS.展开更多
The construction of spot electricity markets plays a pivotal role in power system reforms,where market clearing systems profoundly influence market efficiency and security.Current clearing systems predominantly adopt ...The construction of spot electricity markets plays a pivotal role in power system reforms,where market clearing systems profoundly influence market efficiency and security.Current clearing systems predominantly adopt a single-system architecture,with research focusing primarily on accelerating solution algorithms through techniques such as high-efficiency parallel solvers and staggered decomposition of mixed-integer programming models.Notably absent are systematic studies evaluating the adaptability of primary-backup clearing systems incontingency scenarios—a critical gap given redundant systems’expanding applications in operational environments.This paper proposes a comprehensive evaluation framework for analyzing dual-system adaptability,demonstrated through an in-depth case study of the Inner Mongolia power market.First,we establish the innovative“Dual-Active Heterogeneous”architecture that enables independent parallelized operation and fault-isolated redundancy.Subsequently,key performance indices are quantitatively evaluated across four critical dimensions:unit commitment decisions,generator output constraints,transmission section congestion patterns,and clearing price formation mechanisms.An integrated fuzzy evaluation methodology incorporating grey relational analysis is employed for objective indicator weighting,enabling systematic quantification of system superiority under specific grid operating states.Empirical results based on actual operational data from 200 generation units demonstrate the framework’s efficacy in guiding optimal system selection,with particularly strong performance observed during peak load periods.The proposed approach shows high generalization potential for other regional markets employing redundant clearing mechanisms—particularly those with increasing renewable penetration and associated uncertainty.展开更多
文摘This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems,focusing on robust control systems against an advanced signal attack that integrates sensor and actuator disturbances within the dynamics of follower robots.Each follower robot has unknown dynamics and control inputs,which expose it to the risks of both sensor and actuator attacks.The leader robot,described by a secondorder,time-varying nonlinear model,transmits its position,velocity,and acceleration information to follower robots through a wireless connection.To handle the complex setup and communication among robots in the network,we design a robust hybrid distributed adaptive control strategy combining the effect of sensor and actuator attack,which ensures asymptotic consensus,extending beyond conventional bounded consensus results.The proposed framework employs fuzzy logic systems(FLSs)as proactive controllers to estimate unknown nonlinear behaviors,while also effectively managing sensor and actuator attacks,ensuring stable consensus among all agents.To counter the impact of the combined signal attack on follower dynamics,a specialized robust control mechanism is designed,sustaining system stability and performance under adversarial conditions.The efficiency of this control strategy is demonstrated through simulations conducted across two different directed communication topologies,underscoring the protocol’s adaptability,resilience,and effectiveness in maintaining global consensus under complex attack scenarios.
文摘The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC.
文摘This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid aggregation and often discard fine-grained boundary information.In contrast,our method computes soft membershipswithin each receptive field and aggregates cluster-wise responses throughmembership-weighted pooling,thereby preserving informative structure while reducing dimensionality.Being differentiable,the proposed layer operates as standard two-dimensional pooling.We evaluate our approach across various CNN backbones and open datasets,including CIFAR-10/100,STL-10,LFW,and ImageNette,and further probe small training set restrictions on MNIST and Fashion-MNIST.In these settings,the proposed pooling consistently improves accuracy and weighted F1 over conventional baselines,with particularly strong gains when training data are scarce.Even with less than 1%of the training set,ourmethodmaintains reliable performance,indicating improved sample efficiency and robustness to noisy or ambiguous local patterns.Overall,integrating soft memberships into the pooling operator provides a practical and generalizable inductive bias that enhances robustness and generalization in modern CNN pipelines.
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.
文摘Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.
文摘In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions.
基金supported by 2023 Higher Education Scientific Research Planning Project of China Society of Higher Education(No.23PG0408)2023 Philosophy and Social Science Research Programs in Jiangsu Province(No.2023SJSZ0993)+2 种基金Nantong Science and Technology Project(No.JC2023070)Key Project of Jiangsu Province Education Science 14th Five-Year Plan(Grant No.B-b/2024/02/41)the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202407).
文摘Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.
基金The Key R&D Program of Hunan Province(Grant No.2025AQ2024)of the Department of Science and Technology of Hunan Province.Distinguished Young Scientists Fund(Grant No.24B0446)of Hunan Education Department.
文摘Internet of Things(IoTs)devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location.However,The extensive deployment of these devices also makes them attractive victims for themalicious actions of adversaries.Within the spectrumof existing threats,Side-ChannelAttacks(SCAs)have established themselves as an effective way to compromise cryptographic implementations.These attacks exploit unintended,unintended physical leakage that occurs during the cryptographic execution of devices,bypassing the theoretical strength of the crypto design.In recent times,the advancement of deep learning has provided SCAs with a powerful ally.Well-trained deep-learningmodels demonstrate an exceptional capacity to identify correlations between side-channel measurements and sensitive data,thereby significantly enhancing such attacks.To further understand the security threats posed by deep-learning SCAs and to aid in formulating robust countermeasures in the future,this paper undertakes an exhaustive investigation of leading-edge SCAs targeting Advanced Encryption Standard(AES)implementations.The study specifically focuses on attacks that exploit power consumption and electromagnetic(EM)emissions as primary leakage sources,systematically evaluating the extent to which diverse deep learning techniques enhance SCAs acrossmultiple critical dimensions.These dimensions include:(i)the characteristics of publicly available datasets derived from various hardware and software platforms;(ii)the formalization of leakage models tailored to different attack scenarios;(iii)the architectural suitability and performance of state-of-the-art deep learning models.Furthermore,the survey provides a systematic synthesis of current research findings,identifies significant unresolved issues in the existing literature and suggests promising directions for future work,including cross-device attack transferability and the impact of quantum-classical hybrid computing on side-channel security.
基金supported by Key Laboratory of Cyberspace Security,Ministry of Education,China。
文摘Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.
基金supported by the KGJ Basic Research Fund(JCKY2023110C080)the National Natural Science Foundation of China(62322306,62173057,62033006)+2 种基金Aviation Science Foundation Project(2022Z018063001)the Argentinean Agency for Scientific and Technological Promotion(PICT-2021-I-A-00730)the National Foreign Expert Individual Project(H20240983).
文摘This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems.A particular feature of our work is that we consider systems in which the state is constrained by saturation.Measurements are transmitted to nodes of a sensor network over unreliable wireless channels.We propose a linear coding mechanism,together with a distributed method for obtaining a state estimate at each node.These designs aim to minimize the state estimation error covariance.In addition,we derive a bound on this covariance,and accommodate the design parameters to minimize this bound.The resulting design depends on the packet loss probabilities of the wireless channels.This permits applying the proposed scheme to systems in which communications suffer from denial-of-service attacks,as such attacks typically affect those probabilities.Finally,we present a numerical example illustrating this application.
基金supported in part by the National Natural Science Foundation of China(62373022,U2241217,62141604)Beijing Natural Science Foundation(4252043,JQ23019)+4 种基金the Fundamental Research Funds for the Central Universities(JKF-2025037448805,JKF-2025086098295)the Aeronautical Science Fund(2023Z034051001)the Academic Excellence Foundation of BUAA for Ph.D. Studentsthe Science and Technology Innovation2030—Key Project of New Generation Artificial Intelligence(2020AAA0108200)the National Key Research and Development Program of China(2022YFB3305600)。
文摘An attack-resilient distributed Nash equilibrium(NE) seeking problem is addressed for noncooperative games of networked systems under malicious cyber-attacks,i.e.,false data injection(FDI) attacks.Different from many existing distributed NE seeking works,it is practical and challenging to get resilient adaptively distributed NE seeking under unknown and unbounded FDI attacks.An attack-resilient NE seeking algorithm that is distributed(i.e.,independent of global information on the graph's algebraic connectivity,Lipschitz and monotone constants of pseudo-gradients,or number of players),is presented by means of incorporating the consensus-based gradient play with a distributed attack identifier so as to achieve simultaneous NE seeking and attack identification asymptotically.Another key characteristic is that FDI attacks are allowed to be unknown and unbounded.By exploiting nonsmooth analysis and stability theory,the global asymptotic convergence of the developed algorithm to the NE is ensured.Moreover,we extend this design to further consider the attack-resilient NE seeking of double-integrator players.Lastly,numerical simulation and practical experiment results are presented to validate the developed algorithms' effectiveness.
文摘Deep learning attentionmechanisms have achieved remarkable progress in computer vision,but still face limitations when handling images with ambiguous boundaries and uncertain feature representations.Conventional attention modules such as SE-Net,CBAM,ECA-Net,and CA adopt a deterministic paradigm,assigning fixed scalar weights to features without modeling ambiguity or confidence.To overcome these limitations,this paper proposes the Fuzzy Attention Network Layer(FANL),which integrates intuitionistic fuzzy set theory with convolutional neural networks to explicitly represent feature uncertainty through membership(μ),non-membership(ν),and hesitation(π)degrees.FANLconsists of four coremodules:(1)feature dimensionality reduction via global pooling,(2)fuzzymodeling using learnable clustering centers,(3)adaptive attention generation through weighted fusion of fuzzy components,and(4)feature refinement through residual connections.A cross-layer guidance mechanism is further introduced to enhance hierarchical feature propagation,allowing high-level semantic features to incorporate fine-grained texture information from shallow layers.Comprehensive experiments on three benchmark datasets—PathMNIST-30000,full PathMNIST,and Blood MNIST—demonstrate the effectiveness and generalizability of FANL.The model achieves 84.41±0.56%accuracy and a 1.69%improvement over the baseline CNN while maintaining lightweight computational complexity.Ablation studies show that removing any component causes a 1.7%–2.0%performance drop,validating the synergistic contribution of each module.Furthermore,FANL provides superior uncertainty calibration(ECE=0.0452)and interpretable selective prediction under uncertainty.Overall,FANL presents an efficient and uncertaintyaware attention framework that improves both accuracy and reliability,offering a promising direction for robust visual recognition under ambiguous or noisy conditions.
文摘Pull-ups are a very common fitness exercise that can be seen in many gyms.For athletes,it is very important to perform pull-ups correctly and scientifically.The pull-up scoring method designed in this paper can score the quality of pull-up movement scientifically and objectively,and provide guidance to help athletes better complete the pull-up movement.In this method,the OpenPose algorithm is used to identify the coordinates of skeleton points,and then the coordinate data are processed by a Kalman filter to obtain coordinates closer to the true values.Finally,the filtered data are input into the scoring algorithm designed based on the fuzzy comprehensive evaluation algorithm,and the results of the pull-up quality score and the corresponding guidance are obtained.
基金supported in part by the Young Elite Scientists Sponsorship Program by the Chinese Society for Electrical Engineering under Grant CSEE-YESS-2022019in part by the Guangzhou Basic and Applied Basic Research Foundation under Grand 2024A04J3672in part by the National Natural Science Foundation of China under Grant 52207106.
文摘The wide-area damping controllers(WADCs),which are essential for mitigating regional low-frequency oscillations,face cyber-physical security threats due to the vulnerability of wide-area measurement system to cyber attacks and wind power uncertainties.This paper introduces reachability analysis method to quantify the impact of varying-amplitude attacks and uncertain wind fluctuations on the performance of WADC.Firstly,considering wind farm integration and attack injection,a nonlinear power system model with multiple buses is constructed based on Kron reduction method to improve computational efficiency and mitigate the constraints imposed by algebraic constraints.Then,a zonotope-based polytope construction method is employed to effectively model the range of attack amplitudes and wind uncertainties.By conducting reachability analysis,the reachable set preserving the nonlinear characteristics of studied system is computed,which enables the quantification of the maximum fluctuation range of regional oscillations under the dual disturbances.Case studies are undertaken on two multi-machine power systems with wind farm integration.The obtained results emphasize the efficacy of designed method,providing valuable insights into the magnitude of the impact that attacks exert on the operational characteristics of power system under various uncertain factors.
基金supported by Singapore RIE2025 Manufacturing,Trade and Connectivity Industry Alignment Fund-Pre-Positioning(IAF-PP)under Grant M24N2a0039 through WP2-Intelligent Switching Controlthe National Research Foundation Singapore under its AI Singapore Programme under Grant AISG4-GC-2023-007-1B.
文摘In this paper,we propose a fuzzy logic-based coded event-triggered control with self-adjustable prescribed performance(FL-CEC-SPP)to address the trade-off between control performance and communication efficiency in resource-constrained networked control systems.The method integrates a fuzzy-coded event-triggered controller into a coded control framework to dynamically adjust the triggering threshold,thereby reducing unnecessary transmissions while maintaining system stability.A self-adjustable prescribed performance constraint is also incorporated to ensure that the tracking error remains within predefined bounds under arbitrary initial conditions.Theoretical analyses and simulation comparisons show that the method proposed in this paper maintains good tracking performance and stability while reducing the communication burden,and has wide applications in resource-constrained network control systems.
文摘Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.
基金funded by the Research Project:THTETN.05/24-25,VietnamAcademy of Science and Technology.
文摘Satellite image segmentation plays a crucial role in remote sensing,supporting applications such as environmental monitoring,land use analysis,and disaster management.However,traditional segmentation methods often rely on large amounts of labeled data,which are costly and time-consuming to obtain,especially in largescale or dynamic environments.To address this challenge,we propose the Semi-Supervised Multi-View Picture Fuzzy Clustering(SS-MPFC)algorithm,which improves segmentation accuracy and robustness,particularly in complex and uncertain remote sensing scenarios.SS-MPFC unifies three paradigms:semi-supervised learning,multi-view clustering,and picture fuzzy set theory.This integration allows the model to effectively utilize a small number of labeled samples,fuse complementary information from multiple data views,and handle the ambiguity and uncertainty inherent in satellite imagery.We design a novel objective function that jointly incorporates picture fuzzy membership functions across multiple views of the data,and embeds pairwise semi-supervised constraints(must-link and cannot-link)directly into the clustering process to enhance segmentation accuracy.Experiments conducted on several benchmark satellite datasets demonstrate that SS-MPFC significantly outperforms existing state-of-the-art methods in segmentation accuracy,noise robustness,and semantic interpretability.On the Augsburg dataset,SS-MPFC achieves a Purity of 0.8158 and an Accuracy of 0.6860,highlighting its outstanding robustness and efficiency.These results demonstrate that SSMPFC offers a scalable and effective solution for real-world satellite-based monitoring systems,particularly in scenarios where rapid annotation is infeasible,such as wildfire tracking,agricultural monitoring,and dynamic urban mapping.
文摘Orthogonal Frequency Division Multiplexing(OFDM)enables efficient Dynamic Spectrum Access(DSA)but suffers from high sidelobe that causes excessive out-of-band(OOB)emissions and expose the system to spectrum-layer cyberattacks such as man-in-the-middle(MITM),eavesdropping,and primary user emulation(PUE)attacks.To address both spectral leakage and its security implications,this paper introduces a secure and intelligent hybrid optimization strategy that combinesan Eigenspace-based Generalized Sidelobe Canceller(ES-GSC)with a Genetic Algorithm(GA),to derive optimally weighted cancellation carriers.The proposed method jointly suppresses sidelobes and reinforces resistance to leakage-based attacks.MATLAB Simulation demonstrate considerable reductions in OOB emissions and higher resilience against spectrum-layer threats compared with existing techniques.
基金supported by the Lanzhou Science and Technology Plan Project(XM1753694781389).
文摘Facing the economic challenges of significant frequency regulation wear and tear on thermal power units and short energy storage lifespan in thermal-energy storage combined systems participating in grid primary frequency regulation(PFR),this paper proposes a novel hybrid energy storage system(HESS)control strategy based on Newton-Raphson optimization algorithm(NRBO)-VMD and a fuzzy neural network(FNN)for PFR.In the primary power allocation stage,the high inertia and slow response of thermal power units prevent them from promptly responding to the high-frequency components of PFR signals,leading to increased mechanical stress.To address the distinct response characteristics of thermal units and HESS,an NRBO-VMD based decomposition method for PFR signals is proposed,enabling a flexible system response to grid frequency deviations.Within the HESS,an adaptive coordinated control strategy and a State of Charge(SOC)self-recovery strategy are introduced.These strategies autonomously adjust the virtual inertia and droop coefficients based on the depth of frequency regulation and the real-time SOC.Furthermore,a FNN is constructed to perform secondary refinement of the internal power distribution within the HESS.Finally,simulations under various operational conditions demonstrate that the proposed strategy effectively mitigates frequent power adjustments of the thermal unit during PFR,adaptively achieves optimal power decomposition and distribution,maintains the flywheel energy storage’s SOC within an optimal range,and ensures the long-term stable operation of the HESS.
基金supported by NARI Relays Electric Co.,Ltd.under the Project“Research on Evaluation of Clearing Results and Switching Criteria for Primary-Backup Systems in Electricity SpotMarkets”(Project No.CGSQ240800443).
文摘The construction of spot electricity markets plays a pivotal role in power system reforms,where market clearing systems profoundly influence market efficiency and security.Current clearing systems predominantly adopt a single-system architecture,with research focusing primarily on accelerating solution algorithms through techniques such as high-efficiency parallel solvers and staggered decomposition of mixed-integer programming models.Notably absent are systematic studies evaluating the adaptability of primary-backup clearing systems incontingency scenarios—a critical gap given redundant systems’expanding applications in operational environments.This paper proposes a comprehensive evaluation framework for analyzing dual-system adaptability,demonstrated through an in-depth case study of the Inner Mongolia power market.First,we establish the innovative“Dual-Active Heterogeneous”architecture that enables independent parallelized operation and fault-isolated redundancy.Subsequently,key performance indices are quantitatively evaluated across four critical dimensions:unit commitment decisions,generator output constraints,transmission section congestion patterns,and clearing price formation mechanisms.An integrated fuzzy evaluation methodology incorporating grey relational analysis is employed for objective indicator weighting,enabling systematic quantification of system superiority under specific grid operating states.Empirical results based on actual operational data from 200 generation units demonstrate the framework’s efficacy in guiding optimal system selection,with particularly strong performance observed during peak load periods.The proposed approach shows high generalization potential for other regional markets employing redundant clearing mechanisms—particularly those with increasing renewable penetration and associated uncertainty.