Skip to main navigation Skip to search Skip to main content

Secure adaptive event-triggered anti-synchronization for BAM neural networks with energy-limited DoS attacks

  • Hekai Feng
  • , Zhenyu Wu
  • , Xuexi Zhang
  • , Zehui Xiao
  • , Meng Zhang
  • , Jie Tao
  • Guangdong University of Technology
  • Southwest University
  • The Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

This article focuses on the problem of adaptive event-triggered anti-synchronization control for bidirectional associative memory neural networks subject to energy-limited denial of service attacks. First, a novel adaptive event-triggered scheme is developed by resorting to the acknowledgment character technique, which can help conserve valuable communication resources and has better performance in resisting malicious cyber attacks compared to traditional schemes. Second, a more general attack strategy for denial of service attacks is proposed with the consideration of energy constraints, and an anti-synchronization error system is established to analyze the anti-synchronization behavior. Then, sufficient conditions are provided to guarantee the anti-synchronization of drive and response bidirectional associative memory neural networks in H sense. Next, a design approach is obtained based on the above conditions for the controller gains. Finally, a numerical example is employed to demonstrate the effectiveness of the proposed method and its superiority over the traditional event-triggered scheme.

Original languageEnglish
Article number120594
JournalInformation Sciences
Volume670
DOIs
StatePublished - Jun 2024

Keywords

  • Adaptive event-triggered scheme
  • Anti-synchronization
  • Bidirectional associative memory neural networks
  • Denial of service attacks

Fingerprint

Dive into the research topics of 'Secure adaptive event-triggered anti-synchronization for BAM neural networks with energy-limited DoS attacks'. Together they form a unique fingerprint.

Cite this