Article
Computer Science, Information Systems
Hong Lin, James Lam, Zheng Wang
Summary: The study focuses on state estimation for cyber-physical systems under mixed denial-of-service (DoS) and false data injection (FDI) attacks. An optimal estimator with exponentially growing components is obtained, but an approximate estimator using the generalized pseudo-Bayesian algorithm is proposed for efficient computation. Both the optimal estimator and the proposed approximate estimator are proven to be secure for stable systems, with boundedness theoretically characterized between the two estimates.
INFORMATION SCIENCES
(2021)
Article
Engineering, Mechanical
Wu Yang, Xiao-Kang Liu, Yan-Wu Wang, Zhi-Wei Liu, Jiang-Wen Xiao
Summary: This paper investigates the stabilization problem of singularly perturbed switched systems subject to unmodeled dynamics and deception attacks. A robust observer is designed to estimate the system states and deception attacks bound, and a sliding mode surface with multiple time scales is constructed. Stability conditions are given using multiple Lyapunov functions and average dwell time technique, and an adaptive sliding mode control law is synthesized. Numerical simulation results demonstrate the effectiveness of the proposed approach.
NONLINEAR DYNAMICS
(2022)
Article
Automation & Control Systems
Xin-Yu Shen, Xiao-Jian Li
Summary: This article proposes a new approach to address the issue of actuator attacks in unknown cyber-physical systems, ensuring the security and stability of the system through a data-driven residual generator and approximate dynamic programming technology.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2021)
Article
Automation & Control Systems
Eman Mousavinejad, Ljubo Vlacic
Summary: This paper studies the problem of secure control of automated vehicles in a platoon-based driving pattern over a vehicular ad-hoc network subject to various cyber attacks. It proposes a reliable control method that estimates vehicle states and designs effective control protocols to achieve secure platooning control and reduce tracking errors for following vehicles.
Article
Automation & Control Systems
Jing Zhou, Bo Chen, Tongxiang Li, Li Yu
Summary: This article focuses on the secure estimation problem for cyber-physical systems with sparse attacks and noises. A novel l1-minimization algorithm based on QR decomposition is proposed to reconstruct malicious attacks, and a secure conservative estimation method based on Kalman filter is introduced to handle estimation errors caused by Gaussian noises.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Engineering, Electrical & Electronic
Min Zhou, Chensheng Liu, Amir Abiri Jahromi, Deepa Kundur, Jing Wu, Chengnian Long
Summary: This paper examines the impacts of coordinated cyber-physical attacks on the vulnerability of power systems with N-1 security criterion. Through a tri-level model and semidefinite programming technique, it is shown that such attacks can cause N-1-1 contingency and cascading failures.
IEEE TRANSACTIONS ON POWER SYSTEMS
(2023)
Article
Automation & Control Systems
Meng Li, Yong Chen, Yuezhi Liu
Summary: This paper addresses the secure control strategy design issue for jump cyber-physical systems (CPSs) with malicious attacks, and presents a secure control strategy based on robust sliding-mode control (SMC). By constructing an integral sliding-mode hyperplane, solving the slide-mode parameters, and proposing a robust sliding-mode controller, the approach effectively deals with malicious attacks in CPSs.
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS
(2021)
Article
Computer Science, Artificial Intelligence
Xiaojian Yi, Huiyang Yu, Pengxiang Wang, Shulin Liu, Lifeng Ma
Summary: This paper focuses on the set-membership filtering issue for a class of artificial neural networks subject to mixed attacks. The encoding-decoding communication mechanism is used for data sharing between neurons. The paper presents an algorithm to estimate the neurons' states in the presence of mixed attacks and ensure that the estimation errors are confined within a prescribed ellipsoidal region. Sufficient conditions are derived using convex optimization to ensure the existence of the desired filter, and explicit filtering parameters are obtained by solving a set of matrix inequalities.
Article
Computer Science, Information Systems
Yajing Ma, Zhanjie Li
Summary: This paper proposes a secure event-triggered control method to ensure the stability and security of a class of industrial cyber-physical systems under limited resource budget and deception attacks. The method uses a neural network learning-based approximation algorithm to separate the coupling influence and estimate the uncertain nonlinearities. Nussbaum-type functions are introduced to handle the unknown sign of the time-varying attack injection signal. An event triggering mechanism is developed to reduce communication load. The effectiveness of the proposed method is validated through a benchmark control example.
INFORMATION SCIENCES
(2023)
Article
Mathematics, Applied
Jipeng Zhao, Guang-Hong Yang
Summary: This paper investigates the problem of fuzzy adaptive secure tracking control for nonstrict-feedback nonlinear systems with unknown false data injection (FDI) attacks and input quantization. It proposes a secure tracking control strategy that ensures the convergence of tracking error to a small neighborhood of the origin and bounded signals of the closed-loop systems even in the presence of unknown FDI attacks. The paper also addresses the algebraic-loop problem and tremor problem caused by input quantization by combining variable separation method, fuzzy basis functions, and nonlinear function separation technique. The effectiveness of the proposed control algorithm is verified through simulation results.
APPLIED MATHEMATICS AND COMPUTATION
(2023)
Article
Computer Science, Information Systems
Sushree Padhan, Ashok Kumar Turuk
Summary: Cyber-physical systems (CPSs) are prone to false data injection (FDI) attacks, which can be launched at any location in the CPS. This paper investigates the impact of FDI attacks at single and multiple locations on the security of CPS and validates their effectiveness through simulation examples.
INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Jing-Jing Yan, Guang-Hong Yang
Summary: This article discusses the secure state estimation problem for cyber-physical systems under intermittent denial-of-service (DoS) attacks, proposing a novel resilient state observer with a switched compensation mechanism and revealing a quantitative relationship between resilience against DoS attacks and design parameters. By employing the proposed observer scheme, exponential convergence of the estimation error is achieved, improving estimation performance. Simulation results are provided to demonstrate the effectiveness and merits of the proposed methods.
IEEE TRANSACTIONS ON CYBERNETICS
(2022)
Article
Automation & Control Systems
Renjie Ma, Peng Shi, Ligang Wu
Summary: This article focuses on the secure reconstruction of Cyber-physical systems (CPSs), identifying combinational attack modes and effectively reconstructing sparse injection attacks with the use of switched descriptor sliding mode observers, while ensuring the accuracy of state estimation. Two numerical examples are provided to validate the applicability of the theoretical derivation.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2021)
Article
Automation & Control Systems
Yabing Huang, Jun Zhao
Summary: The security issue of switched systems is investigated using a non-cooperative dynamic game-theoretic approach in this paper. A Stackelberg game is developed to model malicious attacks on switched autonomous systems and the equilibrium switching and attack strategies are determined. This approach is then extended to switched control systems, where a Stackelberg Nash game is established to characterize the hierarchical decision-making processes and provide a condition for the construction of the Stackelberg Nash equilibrium. The effectiveness and applicability of the proposed results are validated using a continuous stirred tank reactor.
NONLINEAR ANALYSIS-HYBRID SYSTEMS
(2021)
Article
Automation & Control Systems
Lijing Zhai, Kyriakos G. Vamvoudakis
Summary: In this paper, a completely model-free moving target defense framework is developed for cyber-physical systems with discrete-time dynamics to detect and mitigate sensor and/or actuator attacks. An intrusion detection mechanism based on approximate dynamic programming is incorporated to learn optimal regulation and tracking policies while defending against attacks, ensuring stability.
SYSTEMS & CONTROL LETTERS
(2021)
Article
Automation & Control Systems
Kamal Mammadov, Cheng-Chew Lim, Peng Shi
Summary: In this manuscript, we formulate the general Target-Attacker-Defender differential game in both continuous-time and discrete-time turn-based variants in n-dimensional Euclidean space. The objective of the Attackers is to get as close as possible to the Target before collision with the Defender, while the Target and Defender coordinate to achieve the opposite. We consider the most general setting for this zero-sum differential game, where the agents can move at different speeds, and prove the Nash equilibrium strategies in the discrete-time turn-based variant.
INTERNATIONAL JOURNAL OF CONTROL
(2022)
Article
Automation & Control Systems
Ting Shi, Peng Shi, Liping Zhang
Summary: This paper investigates the leader-following consensus problem for general linear multi-agent systems under external disturbances. The communication topologies are time-varying and switched from a finite set. A switched control system is introduced to model these topologies, and the weighted L-2 - L-infinity performance is analyzed. A topology-dependent controller is designed based on local information from the neighbors. Conditions are developed for the existence of a control protocol that achieves the leader-following consensus with a certain level of weighted L-2 - L-infinity performance. The design algorithm is formulated as a set of linear matrix inequalities (LMIs), and a numerical example is provided to demonstrate the effectiveness of the proposed consensus algorithm.
INTERNATIONAL JOURNAL OF CONTROL
(2022)
Article
Automation & Control Systems
Ning Zhao, Peng Shi, Wen Xing
Summary: This article introduces a resilient event-triggered communication mechanism to address the issues of network congestion and redundant communication caused by DoS attacks in networked control systems. By adjusting the threshold parameter in the event-triggered condition, designing an event-driven control protocol, and constructing a new switched NCS model, the exponential stability and Script capital L-2-gain performance of the system are ensured. Additionally, a co-design scheme for the parameters in the event-triggered condition and controller gain is provided for improved system performance.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2021)
Article
Automation & Control Systems
Yulong Huang, Yonggang Zhang, Peng Shi, Jonathon Chambers
Summary: This article introduces a new variational adaptive Kalman filter using a Gaussian-inverse-Wishart mixture distribution for linear systems with partially unknown state and measurement noise covariance matrices. By establishing a hierarchical Gaussian model, the system state vector and noise covariance matrices are jointly estimated. Examples are provided to demonstrate the effectiveness and potential of this new filtering design technique.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2021)
Article
Engineering, Electrical & Electronic
Yang Fei, Peng Shi, Cheng-Chew Lim
Summary: This paper studies the formation control problem for second-order multi-agent systems with practical issues like mismatched uncertainties and obstacle avoidance. A reference correction algorithm based sliding mode control scheme is proposed to tackle the challenges, and both disturbance observer and artificial potential field are implemented to address obstacle avoidance with the existence of mismatched uncertainties. The effectiveness of obstacle avoidance and boundedness of position tracking error are verified by Lyapunov stability theory in the end.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
(2021)
Article
Engineering, Electrical & Electronic
Bo Ding, Dezhi Xu, Bin Jiang, Peng Shi, Weilin Yang
Summary: This article proposes a terminal sliding mode control strategy for the speed tracking problem of permanent-magnet linear synchronous traction systems in urban rail transit, utilizing a nonlinear disturbance observer (NDO) and prescribed performance method. The system design combines prescribed performance control, terminal sliding mode control with backstepping, and disturbance estimation using NDO for feedforward compensation, demonstrating effectiveness and advantages through computer simulations and experiments in dSPACE.
IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION
(2021)
Article
Engineering, Marine
Yuanjie Ren, Lanyong Zhang, Peng Shi, Ziqi Zhang
Summary: A hierarchical collaborative control energy management scheme is proposed for the propulsion system of hybrid electric ships. The scheme effectively solves the problems of steady-state oscillation and deviation from the tracking direction caused by volatility and uncertainty, achieving significant improvement.
JOURNAL OF MARINE SCIENCE AND ENGINEERING
(2022)
Letter
Automation & Control Systems
Zhijian Hu, Rong Su, Kai Zhang, Zeyuan Xu, Renjie Ma
IEEE-CAA JOURNAL OF AUTOMATICA SINICA
(2023)
Article
Automation & Control Systems
Hongyan Yang, Renjie Ma
Summary: This paper focuses on enhancing the trustworthy estimation problem in wireless sensor networks under simultaneous malicious false data injection (FDI) attacks on sensor and actuator components. The research findings demonstrate that the proposed estimation scheme has better stability and security compared to existing methods.
NONLINEAR ANALYSIS-HYBRID SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Renjie Ma, Zhijian Hu, Hongyan Yang, Yuchen Jiang, Mingyi Huo, Hao Luo, Rongni Yang
Summary: With the advancement of computational and communication resources, industrial electronics systems can now utilize networked structures to enable wireless remote control. However, due to the open nature of their cyberrealms, adversaries can eavesdrop on sensitive information and conduct insidious false data injection (FDI) attacks. In this article, different FDI attack monitoring architectures are introduced and their applicability and limitations are discussed. The significance of FDI attack monitoring in deploying secure defense control is also discussed, including the relationship between safety and security, methodologies for FDI attack-resilient control, and integration with information security and machine learning techniques. This review aims to provide insights for advancing the safety and reliability of cyberphysical systems (CPSs) through the retrospective analysis of representative results on FDI attack monitoring and control.
IEEE INDUSTRIAL ELECTRONICS MAGAZINE
(2023)
Article
Automation & Control Systems
Zhijian Hu, Rong Su, Keck-Voon Ling, Yao Guo, Renjie Ma
Summary: This paper investigates the applicability of integrating wind turbines into load frequency control (LFC) under an economic MPC framework. In the context of potential false data injection (FDI) attacks on vulnerable communication networks among different control areas, an intrusion detection unit is proposed to enhance resilience. Unlike existing works, this paper meticulously explores the relationships between alarming thresholds and key performance indicators (KPIs) to provide valuable references for power operators and managers. Additionally, an intensified event-triggered scheme is proposed to alleviate the computation burden of the MPC algorithm, considering incomplete and inaccurate modeling issues. Simulations validate the effectiveness and feasibility of the resilient event-triggered MPC strategy for frequency regulation under FDI attacks.
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING
(2023)
Article
Engineering, Electrical & Electronic
Huiyan Zhang, Hao Sun, Peng Shi, Luis Ismael Minchala
Summary: This article proposes a novel chip detection method that combines attentional feature fusion and cosine nonlocal attention to effectively handle chip images with multiple classes or complex backgrounds. Experimental results demonstrate that the proposed method outperforms the benchmark method on a medium-scale dataset.
Article
Remote Sensing
Yang Fei, Yuan Sun, Peng Shi
Summary: In this study, a hierarchical formation control strategy is used to address the robust formation control problem for a group of UAVs with system uncertainty. A sliding mode neural-based observer is constructed to estimate the nonlinear uncertainty in the UAV model, and sliding mode controllers and differentiators are designed to alleviate chattering in the control input. The proposed control scheme's effectiveness is validated through Lyapunov stability theory and numerical simulations on a multiple-UAV system.