Cyber-Physical Systems最新文献

筛选
英文 中文
State estimation and stabilisation of nonlinear networked control systems with mixed time-delay 混合时滞非线性网络控制系统的状态估计与镇定
Cyber-Physical Systems Pub Date : 2020-09-13 DOI: 10.1080/23335777.2020.1811382
Bo Zhang, Xiaoyu Su
{"title":"State estimation and stabilisation of nonlinear networked control systems with mixed time-delay","authors":"Bo Zhang, Xiaoyu Su","doi":"10.1080/23335777.2020.1811382","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811382","url":null,"abstract":"ABSTRACT In this paper, the problems of time-delay, packet loss and quantisation for network control with global Lipschitz nonlinearity are investigated. The packet losses between the forward and backward channels are considered, and two independent Bernoulli distributions are modelled respectively. An appropriate compensation strategy is proposed to reduce the buffeting and response time of the system. A controller based on differential proportional observer is proposed. The information of estimation errors is used to optimise state estimations. Finally, a simulation example illustrates the feasibility of the method, and the comparisons with existing discrete time-delay system and distributed time-delay system prove the superiority of the method.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"60 1","pages":"114 - 132"},"PeriodicalIF":0.0,"publicationDate":"2020-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91166112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging the power of quantum computing for breaking RSA encryption 利用量子计算的力量来破解RSA加密
Cyber-Physical Systems Pub Date : 2020-09-03 DOI: 10.1080/23335777.2020.1811384
Moolchand Sharma, Vikas Choudhary, R. Bhatia, Sahil Malik, Anshuman Raina, Harshit Khandelwal
{"title":"Leveraging the power of quantum computing for breaking RSA encryption","authors":"Moolchand Sharma, Vikas Choudhary, R. Bhatia, Sahil Malik, Anshuman Raina, Harshit Khandelwal","doi":"10.1080/23335777.2020.1811384","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811384","url":null,"abstract":"ABSTRACT Encryption is the process of securing confidential data that bars a third party’s access to the information.RSA encryption utilises the property of complexity classes wherein the problem of prime integer factorization lies inside the Non-Polynomial time (NP-Hard) class, which makes it impervious to classical computers. Since it is so hard to break even for a computer, it becomes important to do encryption for all the secure transactions. Although it lies outside the capabilities of traditional computing, the recent developments in the field of quantum computing can be utilised to break RSA Encryption. The approach involves mapping of qubits used in a quantum machine to a constraint satisfaction problem (CSP) and then using them to check for factors. This consists of the use of a Multiplicative Boolean circuit in which the qubits utilised by the machine replaces the variables. These Qubits are then mapped as per the gates involved, and the factorization problem is thus transformed into a CSP problem, through which, the factors can be easily found. Once known, these factors can be used to calculate the public and private keys effectively breaking the encryption security. We provide a novel approach to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"61 1","pages":"73 - 92"},"PeriodicalIF":0.0,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89573360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Optimal Intrusion Detection System using GWO-CSA-DSAE Model 基于GWO-CSA-DSAE模型的最优入侵检测系统
Cyber-Physical Systems Pub Date : 2020-08-31 DOI: 10.1080/23335777.2020.1811383
P. Keserwani, M. C. Govil, Emmanuel S. Pilli
{"title":"An Optimal Intrusion Detection System using GWO-CSA-DSAE Model","authors":"P. Keserwani, M. C. Govil, Emmanuel S. Pilli","doi":"10.1080/23335777.2020.1811383","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811383","url":null,"abstract":"ABSTRACT In the high demand of the cloud computing environment, intrusion detection in a cloud network playing a big role in maintaining the faith of the client(s). Due to the increasing complexity of the cloud environment, the existing approaches which use the conventional neural networks are not able to utilise the relevant information from the network traffic, which leads to a low detection rate. This reduces the stability of the existing approaches in this changing environment. In this paper, an anomaly-based cloud intrusion detection system (IDS) is proposed for finding the intrusions in a cloud network. The proposed system uses a hybrid metaheuristic algorithm for feature selection and a deep learning approach for classification. For feature selection, grey wolf optimisation (GWO) is hybrid with a crow search algorithm (CSA), which extracts relevant features from the cloud network connection to be processed more effectively in the deep learning classifier section. A deep sparse auto-encoder (DSAE) is employed for the classification purpose. For the performance comparison, the considered metrics are accuracy, precision, recall or detection rate (DR), and F1 Score. Three publically well-known available datasets namely NSL-KDD, UNSW-NB15, and CICIDS 2017 have been considered for analysing the performance of the proposed GWO-CSA-DSAE model for intrusion detection in a cloud network. The experimental results of the proposed model have been compared with the results of existing recent approaches in the case of binary classification and multi-class classification. It is found that GWO-CSA-DSAE model is better for intrusion detection, which is the proposed model for intrusion detection in a cloud network.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"9 1","pages":"197 - 220"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73392793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Result attack: a privacy breaching attack for personal data through K-means algorithm 结果攻击:通过K-means算法对个人数据进行隐私泄露攻击
Cyber-Physical Systems Pub Date : 2020-08-31 DOI: 10.1080/23335777.2020.1811380
Sharath Yaji, Neelima Bayyapu
{"title":"Result attack: a privacy breaching attack for personal data through K-means algorithm","authors":"Sharath Yaji, Neelima Bayyapu","doi":"10.1080/23335777.2020.1811380","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811380","url":null,"abstract":"ABSTRACT Protecting data privacy concerns the most significant challenge of the present era. This paper is an attempt to demonstrate how machine learning can be used by an attacker to compromise data privacy. To demonstrate, we have chosen an attack on handwritten signatures. The attacker utilizes available signatures for training and appends malicious signatures to be used in the testing process until he gets the desired result. The attacker manipulates the achieved result to perform the malicious attack. We propose, result attack to highlight the need for ensuring the secrecy of the genuine signature. An illustration is performed by applying the K-means algorithm to the MNIST dataset. Differential Privacy (DP) is adopted for defense discussion. The illustration of DP is produced by aggregating red or white noise to the MNIST dataset. Observation shows, the aggregation of noise to personal data successfully delivers defense against the result attack. We get the area under the receiver operating characteristic curve for the original dataset as 0.878719, original dataset vs aggregated red noise as 0.4999901, and original dataset vs white noise as 0.4448475. This concludes for the defense model, aggregating white noise is better than red noise, i.e. white noise aggregation is 11% better than red noise.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"11 - 40"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79819247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems 基于移动最小二乘逼近的Duffing-Holmes混沌优化在线控制
Cyber-Physical Systems Pub Date : 2020-08-27 DOI: 10.1080/23335777.2020.1811385
M. Mahmoodabadi
{"title":"Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems","authors":"M. Mahmoodabadi","doi":"10.1080/23335777.2020.1811385","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811385","url":null,"abstract":"ABSTRACT In this paper, an online optimal adaptive robust fuzzy controller based on the Moving Least Squares (MLS) and Team Game Algorithm (TGA) is introduced to control uncertain chaotic nonlinear systems. At first, a robust supervisory stabiliser and a fuzzy adaptive PID controller are designed and combined to handle a Duffing-Holmes chaotic oscillator. Next, the TGA is utilised to optimise the parameters of the designed fuzzy adaptive robust controller for different values of system disturbances. Then, to adapt the optimum design parameters of the controller with the uncertain values of the external disturbances, the MLS approximation is implemented. In order to evaluate the performance of the proposed technique, it is applied on a Duffing-Holmes chaotic nonlinear oscillator with different initial conditions. The results and the analysis prove the efficiency of the proposed controller with regard to uncertain systems’ challenging external disturbances that impair the stability, accuracy and optimality of the system.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"42 1","pages":"93 - 113"},"PeriodicalIF":0.0,"publicationDate":"2020-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85094791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and verification of improved CMERE against power analysis attacks 针对功率分析攻击的改进CMERE的设计和验证
Cyber-Physical Systems Pub Date : 2020-06-01 DOI: 10.1080/23335777.2020.1769735
H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan
{"title":"Design and verification of improved CMERE against power analysis attacks","authors":"H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan","doi":"10.1080/23335777.2020.1769735","DOIUrl":"https://doi.org/10.1080/23335777.2020.1769735","url":null,"abstract":"ABSTRACT The CMERE algorithm was designed to resist DPA attacks on modular exponentiation. It was implemented and tested at the algorithmic level for different key sizes of the RSA cryptosystems. The strength of CMERE lied on the facts that it could be implemented both on left-to-right and right-to-left binary methods for modular exponentiation without any changes in the original algorithm. Also, the execution of modular exponentiation was completely bit independent making it a very strong countermeasure against simple and differential power analysis attacks. In this paper, we have verified the CMERE algorithm at hardware level using VHDL. During formal verification with VHDL on FPGA, the algorithm was modified for practical implementation. However, the overall strength of the improved CMERE algorithm remains the same as the original algorithm.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"16 1","pages":"165 - 179"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85153255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public goods game with the moral dual process theory 公共产品博弈的道德二元过程理论
Cyber-Physical Systems Pub Date : 2020-05-27 DOI: 10.1080/23335777.2020.1769736
Yanbo Zhang, Zidong Chai, Xiaobo Liu, Ruonan Xing, Mengjin Zhao, Danhua Li, Xinyu Zhang, Yu Hao, Aliaksei Vasilyeu
{"title":"Public goods game with the moral dual process theory","authors":"Yanbo Zhang, Zidong Chai, Xiaobo Liu, Ruonan Xing, Mengjin Zhao, Danhua Li, Xinyu Zhang, Yu Hao, Aliaksei Vasilyeu","doi":"10.1080/23335777.2020.1769736","DOIUrl":"https://doi.org/10.1080/23335777.2020.1769736","url":null,"abstract":"ABSTRACT It is the objective law of development of nature that natural selection and survival of the fittest are incorporated. As the reason that cooperation is not a predeterminate process or results, it is interesting to study the emergent phenomena of cooperation. Although providing a punishment option to community members of the public goods game (PGG) has been shown to effectively promote cooperation . In real life, people will sometimes help others even at the expense of their own costs. Reward behaviour is an important phenomenon of social, which emerges as a result of the interactions among individuals. In this article, we carry out the representative expansion for both positive and negative reciprocit ies to the PGG, which is based on the dual-process theory of morality. We research the evolution of group cooperation about PGG under the condition that punishment and reward exist. This result indicates that punishment and reward are significant in the emergence and stabilisation of cooperation. Our experimental results also provide valuable information about strategies for theories of evolutionary games and social dynamics.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"127 1","pages":"1 - 10"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76225986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control 基于视觉的多无人机编队控制与事件触发积分滑模控制
Cyber-Physical Systems Pub Date : 2020-04-17 DOI: 10.1080/23335777.2020.1750054
Siqing Chen, Xin Jin, Wenle Zhang, Yang Tang
{"title":"Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control","authors":"Siqing Chen, Xin Jin, Wenle Zhang, Yang Tang","doi":"10.1080/23335777.2020.1750054","DOIUrl":"https://doi.org/10.1080/23335777.2020.1750054","url":null,"abstract":"ABSTRACT Vision-based formation control offers an alternate solution for unmanned aerial vehicles (UAVs) to work together in the external position system denied environment. In this paper, we present a vision-based formation control strategy with the advantages of high tracking performance and low consumption of communication resources. A vision-based multi-robot localisation methods is applied to get precise position information, and the extended Kalman filter (EKF) is used to fuse measurement data from different sensors. The integral sliding mode controller (ISMC) is utilised to ensure the fast convergence and robustness to the desired formation, and the event-triggered communication scheme is employed to reduce redundant transmission of state information used in the formation controller. The simulation results in Gazebo with a team of three UAVs are given to illustrate the effectness of the proposed control strategy.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"95 1","pages":"231 - 251"},"PeriodicalIF":0.0,"publicationDate":"2020-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86018828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of a social media process model for fashion and apparel supply chain decisions 开发时尚和服装供应链决策的社会媒体流程模型
Cyber-Physical Systems Pub Date : 2020-04-02 DOI: 10.1080/23335777.2019.1680577
Samaneh Beheshti-Kashi
{"title":"Development of a social media process model for fashion and apparel supply chain decisions","authors":"Samaneh Beheshti-Kashi","doi":"10.1080/23335777.2019.1680577","DOIUrl":"https://doi.org/10.1080/23335777.2019.1680577","url":null,"abstract":"ABSTRACT Fashion and apparel supply chains are complex and volatile. Thiscauses uncertainties for supply chain decisions. For reducing the uncertainty, decision-maker use different information sources. Typically, historical sales data is consulted for enhancing the decision base. Customer preferences are mostly publicly accessible via different social media channels. Motivated by the increased availability of customer preferences, this paper proposesa process model for exploiting social media data for fashion andapparel supply chain decisions. Characteristics of fashion andapparel supply chains and social media data are illustrated. Basedon these characteristics, functional requirements for a processmodel are elaborated. In particular, the veracity feature is takeninto consideration. Following these requirements, a process modelconsisting of the three main layers: process, social media and textmining is developed. A case study is framed around conducted following the proposed process model. Two years of fashion blogdata is extracted, and dictionary-based keyword extraction, rulebased classification, as well as automatic frequency analyses, areconducted. The proposed process model enables structural andtargeted exploitation of social media data for fashion and apparel supply chain decisions.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"6 1","pages":"76 - 95"},"PeriodicalIF":0.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87311001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Nonlinear optimal control for the inertia wheel inverted pendulum 惯性轮倒立摆的非线性最优控制
Cyber-Physical Systems Pub Date : 2020-04-02 DOI: 10.1080/23335777.2019.1678199
G. Rigatos, M. Abbaszadeh, M. Hamida
{"title":"Nonlinear optimal control for the inertia wheel inverted pendulum","authors":"G. Rigatos, M. Abbaszadeh, M. Hamida","doi":"10.1080/23335777.2019.1678199","DOIUrl":"https://doi.org/10.1080/23335777.2019.1678199","url":null,"abstract":"ABSTRACT Due to underactuation and nonlinearities, the control of the inertia wheel inverted pendulum is a non-trivial problem. The article proposes a nonlinear optimal control approach for the inertia wheel inverted pendulum. First, the dynamic model of the pendulum undergoes approximate linearisation around a temporary operating point which is recomputed at each time-step of the control method. The linearisation procedure makes use of first-order Taylor series expansion and requires the computation of the system’s Jacobian matrices. For the approximately linearised model of the pendulum, a stabilising H-infinity feedback controller is designed. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control scheme are proven through Lyapunov analysis. It is demonstrated that the control method satisfies the H-infinity tracking performance criterion, which signifies robustness against model uncertainty and external perturbations. Next, it is proven that the control loop is globally asymptotically stable. The nonlinear optimal control method retains the advantages of typical optimal control, that is fast and accurate tracking of the reference setpoints under moderate variations of the control input.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"55 - 75"},"PeriodicalIF":0.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79767519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信