This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,i...This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.展开更多
This paper presents an adaptive multi-agent coordination(AMAC)strategy suitable for complex scenarios,which only requires information exchange between neighbouring robots.Unlike traditional multi-agent coordination me...This paper presents an adaptive multi-agent coordination(AMAC)strategy suitable for complex scenarios,which only requires information exchange between neighbouring robots.Unlike traditional multi-agent coordination methods that are solved by neural dynamics,the proposed strategy displays greater flexibility,adaptability and scalability.Furthermore,the proposed AMAC strategy is reconstructed as a time-varying complex-valued matrix equation.By introducing a dynamic error function,a fixed-time convergent zeroing neural network(FTCZNN)model is designed for the online solution of the AMAC strategy,with its convergence time upper bound derived theoretically.Finally,the effectiveness and applicability of the coordination control method are demonstrated by numerical simulations and physical experiments.Numerical results indicate that this method can reduce the formation error to the order of 10^(-6)within 1.8 s.展开更多
In this paper,a class of discontinuous Cohen-Grossberg neural networks with timevarying delays is considered.Firstly,under the extended Filippov differential inclusions framework,the problem of periodic solutions of t...In this paper,a class of discontinuous Cohen-Grossberg neural networks with timevarying delays is considered.Firstly,under the extended Filippov differential inclusions framework,the problem of periodic solutions of the considered neural networks with more relaxed conditions imposed on the amplification functions is analyzed by using set-valued mapping and Kakutani's fixed point theorem,which has rarely been used to study such problem.Secondly,the fixed-time synchronization of the error system of the considered neural networks is also investigated by designing a novel control strategy,which can improve not only the previous ones with sign function greatly,but also can reduce the chattering phenomenon.Finally,two numerical examples are presented to further illustrate the validity of the obtained results.展开更多
This paper is dedicated to solving the problem of adaptive fuzzy fault-tolerant tracking control for a class of time-varying high-order uncertain nonlinear systems.The motivation comes from how to construct a compact ...This paper is dedicated to solving the problem of adaptive fuzzy fault-tolerant tracking control for a class of time-varying high-order uncertain nonlinear systems.The motivation comes from how to construct a compact set large enough in which the approximation of any unknown continuous function by a fuzzy logic system(FLS)is effective while compensating sensor/actuator faults and external disturbances.The difficulty is to verify the boundedness of closed-loop signals on the constructed compact set and to reduce the number of the variables of the fuzzy membership functions as many as possible.By a new lemma,linear/nonlinear terms are introduced in adaptive laws to dominate unknown residual terms.With adding a power integrator method,a unified fault-tolerant controller is designed to drive the tracking error to converge to a small compact set of the origin within a fixed time,regardless of whether the system suffers from faults and disturbances.Superior to the existing results,in the presence of time-varying factors the scheme of this paper clarifies the logical relationship between the compactness of the approximation and the boundedness of the state variables.Finally,the application of control strategy is demonstrated by numerical/practical examples.展开更多
This paper presents an investigation on the target-guided coordinated control(TACC)of unmanned surface vehicles(USVs).In the scenario of tracking non-cooperative targets,the status information of the target can only b...This paper presents an investigation on the target-guided coordinated control(TACC)of unmanned surface vehicles(USVs).In the scenario of tracking non-cooperative targets,the status information of the target can only be obtained by some USVs.In order to achieve semi-encirclement tracking of noncooperative targets under maritime security conditions,a fixed-time tracking control method based on dynamic surface control(DSC)is proposed in this paper.Firstly,a novel TACC architecture with decoupled kinematic control law and decoupled kinetic control law was designed to reduce the complexity of control system design.Secondly,the proposed DSC-based target-guided kinematic control law including tracking points pre-allocation strategy and sigmoid artificial potential functions(SigAPFs)can avoid collisions during tracking process and optimize kinematic control output.Finally,a fixed-time TACC system was proposed to achieve fast convergence of kinematic and kinetics errors.The effectiveness of the proposed TACC approach in improving target tracking safety and reducing control output chattering was verified by simulation comparison results.展开更多
In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy...In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy is used to reconstruct the communication channel for the system that suffers from DoS attacks to prevent the discontinuous transmission information of the communication network from affecting MASs formation.Then,considering that the leader state is not available to each follower under DoS attacks,a fixed-time distributed observer without velocity information is constructed to estimate the tracking error between followers and the leader.Finally,adaptive radial basis function neural network(RBFNN) is used to approximate the unknown ensemble disturbances in the system,and the fixed-time time-varying formation scheme is designed with the constructed observer.The effectiveness of the proposed control algorithm is demonstrated by the numerical simulation.展开更多
In this paper,the problem of non-singular fixed-time control with prescribed performance is studied for multi-agent systems characterized by uncertain states,nonlinearities,and nonstrict feedback.To mitigate the nonli...In this paper,the problem of non-singular fixed-time control with prescribed performance is studied for multi-agent systems characterized by uncertain states,nonlinearities,and nonstrict feedback.To mitigate the nonlinearity,a fuzzy logic algorithm is applied to approximate the intrinsic dynamics of the system.Furthermore,a fuzzy logic system state observer based on leader state information is designed to address the partial unob-servability of followers.Subsequently,the power integral method is incorporated into the backstepping approach to avoid singularities in the fixed-time controller.A command filter method is introduced into the standard backstepping approach to reduce the computational complexity of controller design.Then,a non-singular fixed-time adaptive control strategy with prescribed performance is proposed by constraining the tracking error within a prescribed range.Rigorous theoretical analysis ensures the convergence of consensus error in the multi-agent system to the prescribed performance region within a fixed time.Finally,the practicality of the algorithm is validated through numerical simulations.展开更多
This paper investigates modified fixed-time synchronization(FxTS)of complex networks(CNs)with time-varying delays based on continuous and discontinuous controllers.First,for the sake of making the settling time(ST)of ...This paper investigates modified fixed-time synchronization(FxTS)of complex networks(CNs)with time-varying delays based on continuous and discontinuous controllers.First,for the sake of making the settling time(ST)of FxTS is independent of the initial values and parameters of the CNs,a modified fixed-time(FxT)stability theorem is proposed,where the ST is determined by an arbitrary positive number given in advance.Then,continuous controller and discontinuous controller are designed to realize the modified FxTS target of CNs.In addition,based on the designed controllers,CNs can achieve synchronization at any given time,or even earlier.And control strategies effectively solve the problem of ST related to the parameters of CNs.Finally,an appropriate simulation example is conducted to examine the effectiveness of the designed control strategies.展开更多
This paper presents a fixed-time cooperative gui-dance method with impact angle constraints for multiple flight vehicles (MFV) to address the challenges of intercepting large maneuvering targets with difficulty and lo...This paper presents a fixed-time cooperative gui-dance method with impact angle constraints for multiple flight vehicles (MFV) to address the challenges of intercepting large maneuvering targets with difficulty and low precision. A coopera-tive guidance model is proposed, transforming the cooperative interception problem into a consensus problem based on the remaining flight time of the flight vehicles. First, the impact angle constraint is converted into the line of sight (LOS) angle con-straint, and a new fixed-time convergent non-singular terminal sliding surface is introduced, which resolves the singularity issue of the traditional sliding surfaces. With this approach, LOS angle rate and normal overloads can converge in fixed time, ensuring that the upper bound of the system convergence time is not affected by the initial value of the system. Furthermore, the maneuvering movement of the target is considered as a system disturbance, and an extended state observer is employed to estimate and compensate for it in the guidance law. Lastly, by applying consensus theory and distributed communication topology, the remaining flight time of each flight vehicle is syn-chronized to ensure that they intercept the target simulta-neously with different impact angles. Simulation experiments are conducted to validate the effectiveness of the proposed cooper-ative interception and guidance method.展开更多
In this paper, a class of discontinuous neutral-type neural networks (NTNNs) with proportional delays is considered. The targets of the paper are to study the problem of periodic solutions and fixed-time (FXT) stabili...In this paper, a class of discontinuous neutral-type neural networks (NTNNs) with proportional delays is considered. The targets of the paper are to study the problem of periodic solutions and fixed-time (FXT) stabilization of the addressed neural networks. In order to complete the targets, based on set-valued map, differential inclusions theory, coincidence theorem and Hölder inequality technique, some new proportional delay-dependent criteria shown by the inequalities are derived. Based on the fact of the existence of solution, further by applying the FXT stability lemmas and equivalent transformation, the zero solution of closed-loop system achieves FXT stabilization and the corresponding settling-times are estimated. Some previous related works on NTNNs are extended. Finally, one typical example is provided to show the effectiveness of the established results.展开更多
This paper investigates the sliding-mode-based fixed-time distributed average tracking (DAT) problem for multiple Euler-Lagrange systems in the presence of external distur-bances. The primary objective is to devise co...This paper investigates the sliding-mode-based fixed-time distributed average tracking (DAT) problem for multiple Euler-Lagrange systems in the presence of external distur-bances. The primary objective is to devise controllers for each agent, enabling them to precisely track the average of multiple time-varying reference signals. By averaging these signals, we can mitigate the influence of errors and uncertainties arising dur-ing measurements, thereby enhancing the robustness and stabi-lity of the system. A distributed fixed-time average estimator is proposed to estimate the average value of global reference sig-nals utilizing local information and communication with neigh-bors. Subsequently, a fixed-time sliding mode controller is intro-duced incorporating a state-dependent sliding mode function coupled with a variable exponent coefficient to achieve dis-tributed average tracking of reference signals, and rigorous ana-lytical methods are employed to substantiate the fixed-time sta-bility. Finally, numerical simulation results are provided to vali-date the effectiveness of the proposed methodology, offering insights into its practical application and robust performance.展开更多
In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mec...In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mechanisms during aggregation,it is difficult to conduct effective backdoor attacks.In addition,existing backdoor attack methods are faced with challenges,such as low backdoor accuracy,poor ability to evade anomaly detection,and unstable model training.To address these challenges,a method called adaptive simulation backdoor attack(ASBA)is proposed.Specifically,ASBA improves the stability of model training by manipulating the local training process and using an adaptive mechanism,the ability of the malicious model to evade anomaly detection by combing large simulation training and clipping,and the backdoor accuracy by introducing a stimulus model to amplify the impact of the backdoor in the global model.Extensive comparative experiments under five advanced defense scenarios show that ASBA can effectively evade anomaly detection and achieve high backdoor accuracy in the global model.Furthermore,it exhibits excellent stability and effectiveness after multiple rounds of attacks,outperforming state-of-the-art backdoor attack methods.展开更多
According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subseq...According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subsequently forming cross-domain cascading failures(CDCF)that cross cyber-domain and power-domain and endanger the stable running of GCPS.To reveal the evolutionary mechanism of CDCF,an optimal attack scheme evaluation method is proposed,considering the spatiotemporal synergy of multiple attack-event-chains.First,in accordance with the spatiotemporal synergy of multiple attack-event-chains,the CDCF evolutionary mechanism is analyzed from the attackers'perspective,and a CDCF mathematical model is established.Furthermore,an attack graph model of CDCF evolution and its hazard calculation method are proposed.Then,the attackers'decision-making process for the optimal attack scheme of CDCF is deduced based on the attack graph model.Finally,both the evaluation and implementation processes of the optimal attack scheme are simulated in the GCPS experimental system based on IEEE-39 bus systems.展开更多
Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global...Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global model through compromised updates,posing significant threats to model integrity and becoming a key focus in FL security.Existing backdoor attack methods typically embed triggers directly into original images and consider only data heterogeneity,resulting in limited stealth and adaptability.To address the heterogeneity of malicious client devices,this paper proposes a novel backdoor attack method named Capability-Adaptive Shadow Backdoor Attack(CASBA).By incorporating measurements of clients’computational and communication capabilities,CASBA employs a dynamic hierarchical attack strategy that adaptively aligns attack intensity with available resources.Furthermore,an improved deep convolutional generative adversarial network(DCGAN)is integrated into the attack pipeline to embed triggers without modifying original data,significantly enhancing stealthiness.Comparative experiments with Shadow Backdoor Attack(SBA)across multiple scenarios demonstrate that CASBA dynamically adjusts resource consumption based on device capabilities,reducing average memory usage per iteration by 5.8%.CASBA improves resource efficiency while keeping the drop in attack success rate within 3%.Additionally,the effectiveness of CASBA against three robust FL algorithms is also validated.展开更多
The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integra...The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies.展开更多
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner...Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.展开更多
Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.Howev...Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations.展开更多
In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free...In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions.展开更多
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man...Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.展开更多
基金supported by the National Natural Science Foundation of China(62373317)the Tianshan Talent Training Program(2022TSYCCX0013)+3 种基金the Key Project of Natural Science Foundation of Xinjiang(2021D01D10)the Basic Research Foundation for Universities of Xinjiang(XJEDU2023P023)the Xinjiang Key Laboratory of Applied Mathematics(XJDX1401)the Intelligent Control and Optimization Research Platform in Xinjiang University.
文摘This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.
基金supported by the National Natural Science Foundation of China under Grants 61962023,61562029 and 62466019.
文摘This paper presents an adaptive multi-agent coordination(AMAC)strategy suitable for complex scenarios,which only requires information exchange between neighbouring robots.Unlike traditional multi-agent coordination methods that are solved by neural dynamics,the proposed strategy displays greater flexibility,adaptability and scalability.Furthermore,the proposed AMAC strategy is reconstructed as a time-varying complex-valued matrix equation.By introducing a dynamic error function,a fixed-time convergent zeroing neural network(FTCZNN)model is designed for the online solution of the AMAC strategy,with its convergence time upper bound derived theoretically.Finally,the effectiveness and applicability of the coordination control method are demonstrated by numerical simulations and physical experiments.Numerical results indicate that this method can reduce the formation error to the order of 10^(-6)within 1.8 s.
基金Supported by the National Natural Science Foundation of China(62576008)University Annual Scientific Research Plan of Anhui Province(2022AH030023)。
文摘In this paper,a class of discontinuous Cohen-Grossberg neural networks with timevarying delays is considered.Firstly,under the extended Filippov differential inclusions framework,the problem of periodic solutions of the considered neural networks with more relaxed conditions imposed on the amplification functions is analyzed by using set-valued mapping and Kakutani's fixed point theorem,which has rarely been used to study such problem.Secondly,the fixed-time synchronization of the error system of the considered neural networks is also investigated by designing a novel control strategy,which can improve not only the previous ones with sign function greatly,but also can reduce the chattering phenomenon.Finally,two numerical examples are presented to further illustrate the validity of the obtained results.
基金supported by National Natural Science Foundation of China[grant number 62173208]Taishan Scholar Project of Shandong Province of China[grant number tsqn202103061]。
文摘This paper is dedicated to solving the problem of adaptive fuzzy fault-tolerant tracking control for a class of time-varying high-order uncertain nonlinear systems.The motivation comes from how to construct a compact set large enough in which the approximation of any unknown continuous function by a fuzzy logic system(FLS)is effective while compensating sensor/actuator faults and external disturbances.The difficulty is to verify the boundedness of closed-loop signals on the constructed compact set and to reduce the number of the variables of the fuzzy membership functions as many as possible.By a new lemma,linear/nonlinear terms are introduced in adaptive laws to dominate unknown residual terms.With adding a power integrator method,a unified fault-tolerant controller is designed to drive the tracking error to converge to a small compact set of the origin within a fixed time,regardless of whether the system suffers from faults and disturbances.Superior to the existing results,in the presence of time-varying factors the scheme of this paper clarifies the logical relationship between the compactness of the approximation and the boundedness of the state variables.Finally,the application of control strategy is demonstrated by numerical/practical examples.
文摘This paper presents an investigation on the target-guided coordinated control(TACC)of unmanned surface vehicles(USVs).In the scenario of tracking non-cooperative targets,the status information of the target can only be obtained by some USVs.In order to achieve semi-encirclement tracking of noncooperative targets under maritime security conditions,a fixed-time tracking control method based on dynamic surface control(DSC)is proposed in this paper.Firstly,a novel TACC architecture with decoupled kinematic control law and decoupled kinetic control law was designed to reduce the complexity of control system design.Secondly,the proposed DSC-based target-guided kinematic control law including tracking points pre-allocation strategy and sigmoid artificial potential functions(SigAPFs)can avoid collisions during tracking process and optimize kinematic control output.Finally,a fixed-time TACC system was proposed to achieve fast convergence of kinematic and kinetics errors.The effectiveness of the proposed TACC approach in improving target tracking safety and reducing control output chattering was verified by simulation comparison results.
文摘In this paper,the fixed-time time-varying formation of heterogeneous multi-agent systems(MASs) based on tracking error observer under denial-of-service(DoS) attacks is investigated.Firstly,the dynamic pinning strategy is used to reconstruct the communication channel for the system that suffers from DoS attacks to prevent the discontinuous transmission information of the communication network from affecting MASs formation.Then,considering that the leader state is not available to each follower under DoS attacks,a fixed-time distributed observer without velocity information is constructed to estimate the tracking error between followers and the leader.Finally,adaptive radial basis function neural network(RBFNN) is used to approximate the unknown ensemble disturbances in the system,and the fixed-time time-varying formation scheme is designed with the constructed observer.The effectiveness of the proposed control algorithm is demonstrated by the numerical simulation.
基金supported by the National Natural Science Foundation of China(62203356).
文摘In this paper,the problem of non-singular fixed-time control with prescribed performance is studied for multi-agent systems characterized by uncertain states,nonlinearities,and nonstrict feedback.To mitigate the nonlinearity,a fuzzy logic algorithm is applied to approximate the intrinsic dynamics of the system.Furthermore,a fuzzy logic system state observer based on leader state information is designed to address the partial unob-servability of followers.Subsequently,the power integral method is incorporated into the backstepping approach to avoid singularities in the fixed-time controller.A command filter method is introduced into the standard backstepping approach to reduce the computational complexity of controller design.Then,a non-singular fixed-time adaptive control strategy with prescribed performance is proposed by constraining the tracking error within a prescribed range.Rigorous theoretical analysis ensures the convergence of consensus error in the multi-agent system to the prescribed performance region within a fixed time.Finally,the practicality of the algorithm is validated through numerical simulations.
基金Supported by the National Natural Science Foundation of China(62476082)。
文摘This paper investigates modified fixed-time synchronization(FxTS)of complex networks(CNs)with time-varying delays based on continuous and discontinuous controllers.First,for the sake of making the settling time(ST)of FxTS is independent of the initial values and parameters of the CNs,a modified fixed-time(FxT)stability theorem is proposed,where the ST is determined by an arbitrary positive number given in advance.Then,continuous controller and discontinuous controller are designed to realize the modified FxTS target of CNs.In addition,based on the designed controllers,CNs can achieve synchronization at any given time,or even earlier.And control strategies effectively solve the problem of ST related to the parameters of CNs.Finally,an appropriate simulation example is conducted to examine the effectiveness of the designed control strategies.
基金supported by the National Natural Science Foundation of China(61903099)the Natural Science Foundation of Heilongjiang Province(LH2020F025)+2 种基金the Project of Science and Technology Research Program of Chongqing Education Commission of China(KJZD-K20200470)the Postdoctoral Science Foundation of China(2021M690812)the Postdoctoral Science Fund of Heilongjiang Province(LBH-Z21048).
文摘This paper presents a fixed-time cooperative gui-dance method with impact angle constraints for multiple flight vehicles (MFV) to address the challenges of intercepting large maneuvering targets with difficulty and low precision. A coopera-tive guidance model is proposed, transforming the cooperative interception problem into a consensus problem based on the remaining flight time of the flight vehicles. First, the impact angle constraint is converted into the line of sight (LOS) angle con-straint, and a new fixed-time convergent non-singular terminal sliding surface is introduced, which resolves the singularity issue of the traditional sliding surfaces. With this approach, LOS angle rate and normal overloads can converge in fixed time, ensuring that the upper bound of the system convergence time is not affected by the initial value of the system. Furthermore, the maneuvering movement of the target is considered as a system disturbance, and an extended state observer is employed to estimate and compensate for it in the guidance law. Lastly, by applying consensus theory and distributed communication topology, the remaining flight time of each flight vehicle is syn-chronized to ensure that they intercept the target simulta-neously with different impact angles. Simulation experiments are conducted to validate the effectiveness of the proposed cooper-ative interception and guidance method.
基金supported by Social Science Fund of Hunan province(Grant No.22JD074)the Research Foundation of Education Bureau of Hunan province(Grant No.22B0912).
文摘In this paper, a class of discontinuous neutral-type neural networks (NTNNs) with proportional delays is considered. The targets of the paper are to study the problem of periodic solutions and fixed-time (FXT) stabilization of the addressed neural networks. In order to complete the targets, based on set-valued map, differential inclusions theory, coincidence theorem and Hölder inequality technique, some new proportional delay-dependent criteria shown by the inequalities are derived. Based on the fact of the existence of solution, further by applying the FXT stability lemmas and equivalent transformation, the zero solution of closed-loop system achieves FXT stabilization and the corresponding settling-times are estimated. Some previous related works on NTNNs are extended. Finally, one typical example is provided to show the effectiveness of the established results.
基金supported by the National Natural Science Foundation of China(61673130).
文摘This paper investigates the sliding-mode-based fixed-time distributed average tracking (DAT) problem for multiple Euler-Lagrange systems in the presence of external distur-bances. The primary objective is to devise controllers for each agent, enabling them to precisely track the average of multiple time-varying reference signals. By averaging these signals, we can mitigate the influence of errors and uncertainties arising dur-ing measurements, thereby enhancing the robustness and stabi-lity of the system. A distributed fixed-time average estimator is proposed to estimate the average value of global reference sig-nals utilizing local information and communication with neigh-bors. Subsequently, a fixed-time sliding mode controller is intro-duced incorporating a state-dependent sliding mode function coupled with a variable exponent coefficient to achieve dis-tributed average tracking of reference signals, and rigorous ana-lytical methods are employed to substantiate the fixed-time sta-bility. Finally, numerical simulation results are provided to vali-date the effectiveness of the proposed methodology, offering insights into its practical application and robust performance.
文摘In federated learning,backdoor attacks have become an important research topic with their wide application in processing sensitive datasets.Since federated learning detects or modifies local models through defense mechanisms during aggregation,it is difficult to conduct effective backdoor attacks.In addition,existing backdoor attack methods are faced with challenges,such as low backdoor accuracy,poor ability to evade anomaly detection,and unstable model training.To address these challenges,a method called adaptive simulation backdoor attack(ASBA)is proposed.Specifically,ASBA improves the stability of model training by manipulating the local training process and using an adaptive mechanism,the ability of the malicious model to evade anomaly detection by combing large simulation training and clipping,and the backdoor accuracy by introducing a stimulus model to amplify the impact of the backdoor in the global model.Extensive comparative experiments under five advanced defense scenarios show that ASBA can effectively evade anomaly detection and achieve high backdoor accuracy in the global model.Furthermore,it exhibits excellent stability and effectiveness after multiple rounds of attacks,outperforming state-of-the-art backdoor attack methods.
基金supported by National Natural Science Foundation of China(51977155 and 61833008).
文摘According to the dynamic interaction process between cyber flow and power flow in grid cyber-physical systems(GCPS),attackers could gradually trigger large-scale power failures through cooperative cyber-attacks,subsequently forming cross-domain cascading failures(CDCF)that cross cyber-domain and power-domain and endanger the stable running of GCPS.To reveal the evolutionary mechanism of CDCF,an optimal attack scheme evaluation method is proposed,considering the spatiotemporal synergy of multiple attack-event-chains.First,in accordance with the spatiotemporal synergy of multiple attack-event-chains,the CDCF evolutionary mechanism is analyzed from the attackers'perspective,and a CDCF mathematical model is established.Furthermore,an attack graph model of CDCF evolution and its hazard calculation method are proposed.Then,the attackers'decision-making process for the optimal attack scheme of CDCF is deduced based on the attack graph model.Finally,both the evaluation and implementation processes of the optimal attack scheme are simulated in the GCPS experimental system based on IEEE-39 bus systems.
基金supported by the National Natural Science Foundation of China(Grant No.62172123)the Key Research and Development Program of Heilongjiang Province,China(GrantNo.2022ZX01A36).
文摘Federated Learning(FL)protects data privacy through a distributed training mechanism,yet its decentralized nature also introduces new security vulnerabilities.Backdoor attacks inject malicious triggers into the global model through compromised updates,posing significant threats to model integrity and becoming a key focus in FL security.Existing backdoor attack methods typically embed triggers directly into original images and consider only data heterogeneity,resulting in limited stealth and adaptability.To address the heterogeneity of malicious client devices,this paper proposes a novel backdoor attack method named Capability-Adaptive Shadow Backdoor Attack(CASBA).By incorporating measurements of clients’computational and communication capabilities,CASBA employs a dynamic hierarchical attack strategy that adaptively aligns attack intensity with available resources.Furthermore,an improved deep convolutional generative adversarial network(DCGAN)is integrated into the attack pipeline to embed triggers without modifying original data,significantly enhancing stealthiness.Comparative experiments with Shadow Backdoor Attack(SBA)across multiple scenarios demonstrate that CASBA dynamically adjusts resource consumption based on device capabilities,reducing average memory usage per iteration by 5.8%.CASBA improves resource efficiency while keeping the drop in attack success rate within 3%.Additionally,the effectiveness of CASBA against three robust FL algorithms is also validated.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,under Grant No.(GPIP:1074-612-2024).
文摘The surge in smishing attacks underscores the urgent need for robust,real-time detection systems powered by advanced deep learning models.This paper introduces PhishNet,a novel ensemble learning framework that integrates transformer-based models(RoBERTa)and large language models(LLMs)(GPT-OSS 120B,LLaMA3.370B,and Qwen332B)to enhance smishing detection performance significantly.To mitigate class imbalance,we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques.Our system employs a duallayer voting mechanism:weighted majority voting among LLMs and a final ensemble vote to classify messages as ham,spam,or smishing.Experimental results show an average accuracy improvement from 96%to 98.5%compared to the best standalone transformer,and from 93%to 98.5%when compared to LLMs across datasets.Furthermore,we present a real-time,user-friendly application to operationalize our detection model for practical use.PhishNet demonstrates superior scalability,usability,and detection accuracy,filling critical gaps in current smishing detection methodologies.
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.
文摘Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks.
基金funded by the National Key Research and Development Program of China(Grant No.2024YFE0209000)the NSFC(Grant No.U23B2019).
文摘Graph Neural Networks(GNNs)have proven highly effective for graph classification across diverse fields such as social networks,bioinformatics,and finance,due to their capability to learn complex graph structures.However,despite their success,GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy.Existing adversarial attack strategies primarily rely on label information to guide the attacks,which limits their applicability in scenarios where such information is scarce or unavailable.This paper introduces an innovative unsupervised attack method for graph classification,which operates without relying on label information,thereby enhancing its applicability in a broad range of scenarios.Specifically,our method first leverages a graph contrastive learning loss to learn high-quality graph embeddings by comparing different stochastic augmented views of the graphs.To effectively perturb the graphs,we then introduce an implicit estimator that measures the impact of various modifications on graph structures.The proposed strategy identifies and flips edges with the top-K highest scores,determined by the estimator,to maximize the degradation of the model’s performance.In addition,to defend against such attack,we propose a lightweight regularization-based defense mechanism that is specifically tailored to mitigate the structural perturbations introduced by our attack strategy.It enhances model robustness by enforcing embedding consistency and edge-level smoothness during training.We conduct experiments on six public TU graph classification datasets:NCI1,NCI109,Mutagenicity,ENZYMES,COLLAB,and DBLP_v1,to evaluate the effectiveness of our attack and defense strategies.Under an attack budget of 3,the maximum reduction in model accuracy reaches 6.67%on the Graph Convolutional Network(GCN)and 11.67%on the Graph Attention Network(GAT)across different datasets,indicating that our unsupervised method induces degradation comparable to state-of-the-art supervised attacks.Meanwhile,our defense achieves the highest accuracy recovery of 3.89%(GCN)and 5.00%(GAT),demonstrating improved robustness against structural perturbations.
文摘In recent years,with the rapid advancement of artificial intelligence,object detection algorithms have made significant strides in accuracy and computational efficiency.Notably,research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images(ORSIs).However,in the realmof adversarial attacks,developing adversarial techniques tailored to Anchor-Freemodels remains challenging.Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures.Furthermore,the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks.This study presents an improved cross-conv-block feature fusion You Only Look Once(YOLO)architecture,meticulously engineered to facilitate the extraction ofmore comprehensive semantic features during the backpropagation process.To address the asymmetry between densely distributed objects in ORSIs and the corresponding detector outputs,a novel dense bounding box attack strategy is proposed.This approach leverages dense target bounding boxes loss in the calculation of adversarial loss functions.Furthermore,by integrating translation-invariant(TI)and momentum-iteration(MI)adversarial methodologies,the proposed framework significantly improves the transferability of adversarial attacks.Experimental results demonstrate that our method achieves superior adversarial attack performance,with adversarial transferability rates(ATR)of 67.53%on the NWPU VHR-10 dataset and 90.71%on the HRSC2016 dataset.Compared to ensemble adversarial attack and cascaded adversarial attack approaches,our method generates adversarial examples in an average of 0.64 s,representing an approximately 14.5%improvement in efficiency under equivalent conditions.
基金supported by 2023 Higher Education Scientific Research Planning Project of China Society of Higher Education(No.23PG0408)2023 Philosophy and Social Science Research Programs in Jiangsu Province(No.2023SJSZ0993)+2 种基金Nantong Science and Technology Project(No.JC2023070)Key Project of Jiangsu Province Education Science 14th Five-Year Plan(Grant No.B-b/2024/02/41)the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202407).
文摘Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.