{"title":"Privacy Distributed Constrained Optimization Over Time-Varying Unbalanced Networks and Its Application in Federated Learning","authors":"Mengli Wei;Wenwu Yu;Duxin Chen;Mingyu Kang;Guang Cheng","doi":"10.1109/JAS.2024.124869","DOIUrl":"https://doi.org/10.1109/JAS.2024.124869","url":null,"abstract":"This paper investigates a class of constrained distributed zeroth-order optimization (ZOO) problems over time-varying unbalanced graphs while ensuring privacy preservation among individual agents. Not taking into account recent progress and addressing these concerns separately, there remains a lack of solutions offering theoretical guarantees for both privacy protection and constrained ZOO over time-varying unbalanced graphs. We hereby propose a novel algorithm, termed the differential privacy (DP) distributed push-sum based zeroth-order constrained optimization algorithm (DP-ZOCOA). Operating over time-varying unbalanced graphs, DP-ZOCOA obviates the need for supplemental suboptimization problem computations, thereby reducing overhead in comparison to distributed primary-dual methods. DP-ZOCOA is specifically tailored to tackle constrained ZOO problems over time-varying unbalanced graphs, offering a guarantee of convergence to the optimal solution while robustly preserving privacy. Moreover, we provide rigorous proofs of convergence and privacy for DP-ZOCOA, underscoring its efficacy in attaining optimal convergence without constraints. To enhance its applicability, we incorporate DP-ZOCOA into the federated learning framework and formulate a decentralized zeroth-order constrained federated learning algorithm (ZOCOA-FL) to address challenges stemming from the time-varying imbalance of communication topology. Finally, the performance and effectiveness of the proposed algorithms are thoroughly evaluated through simulations on distributed least squares (DLS) and decentralized federated learning (DFL) tasks.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"335-346"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Correntropy-Based Echo State Network with Application to Time Series Prediction","authors":"Xiufang Chen;Zhenming Su;Long Jin;Shuai Li","doi":"10.1109/JAS.2024.124932","DOIUrl":"https://doi.org/10.1109/JAS.2024.124932","url":null,"abstract":"As a category of recurrent neural networks, echo state networks (ESNs) have been the topic of in-depth investigations and extensive applications in a diverse array of fields, with spectacular triumphs achieved. Nevertheless, the traditional ESN and the majority of its variants are devised in the light of the second-order statistical information of data (e.g., variance and covariance), while more information is neglected. In the context of information theoretic learning, correntropy demonstrates the capacity to grab more information from data. Therefore, under the guidelines of the maximum correntropy criterion, this paper proposes a correntropy-based echo state network (CESN) in which the first-order and higher-order information of data is captured, promoting robustness to noise. Furthermore, an incremental learning algorithm for the CESN is presented, which has the expertise to update the CESN when new data arrives, eliminating the need to retrain the network from scratch. Finally, experiments on benchmark problems and comparisons with existing works are provided to verify the effectiveness and superiority of the proposed CESN.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"425-435"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Condition Sequential Network Ensemble for Industrial Energy Storage Prediction Considering the Condition Switching Characteristics","authors":"Tianyu Wang;Fan Zhou;Yangjie Wu;Jun Zhao;Wei Wang","doi":"10.1109/JAS.2024.124962","DOIUrl":"https://doi.org/10.1109/JAS.2024.124962","url":null,"abstract":"As a crucial storage and buffering apparatus for balancing the production and consumption of byproduct gases in industrial processes, accurate prediction of gas tank levels is essential for optimizing energy system scheduling. Considering that the continuous switching of the pressure and valve status (mechanism knowledge) would bring about multiple working conditions of the equipment, a multi-condition time sequential network ensembled method is proposed. In order to especially consider the time dependence of different conditions, a central-wise condition sequential network is developed, where the network branches are specially designed based on the condition switching sequences. A branch combination transfer learning strategy is developed to tackle the sample imbalance problem of different condition data. Since the condition or status data are real-time information that cannot be recognized during the prediction process, a pre-trained and ensemble learning approach is further proposed to fuse the outputs of the multi-condition networks and realize a transient-state involved prediction. The performance of the proposed method is validated on practical energy data coming from a domestic steel plant, comparing with the state-of-the-art algorithms. The results show that the proposed method can maintain a high prediction accuracy under different condition switching cases, which would provide effective guidance for the optimal scheduling of the industrial energy systems.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"369-380"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained Networked Predictive Control for Nonlinear Systems Using a High-Order Fully Actuated System Approach","authors":"Yi Huang;Guo-Ping Liu;Yi Yu;Wenshan Hu","doi":"10.1109/JAS.2024.124764","DOIUrl":"https://doi.org/10.1109/JAS.2024.124764","url":null,"abstract":"In this letter, a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear high-order fully actuated (HOFA) systems with noises. The method can effectively deal with nonlinearities, constraints, and noises in the system, optimize the performance metric, and present an upper bound on the stable output of the system. Compared with existing control methods for nonlinear systems, the proposed strategy not only improves the stability and robustness of the system, but also has greater applicability in practical applications. The effectiveness and superiority of the strategy are demonstrated through case studies, which provide a new solution for the networked predictive control of constrained nonlinear high-order systems.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"478-480"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10846936","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponential Stability of Impulsive System via Saturated Sliding Mode Control","authors":"Miaomiao Yu;Xiaodi Li","doi":"10.1109/JAS.2024.124734","DOIUrl":"https://doi.org/10.1109/JAS.2024.124734","url":null,"abstract":"This letter presents a class of saturated sliding mode control (SMC) strategy for linear systems subject to impulsive disturbance and input saturation. To ensure the feasibility of proposed SMC under saturation, a relationship is established among attraction domain, saturation structure and control gain. Some necessary constraints on impul-sive disturbance are proposed to ensure the finite-time reachability of the designed sliding surface, where the reaching time is upper estimated. Then, the exponential stabilization of the resulted reduced-order sliding mode is analyzed. Finally, a numerical example is presented to validate the proposed results.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"469-471"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10846930","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Event-Triggered Active Disturbance Rejection Formation Control for Constrained Underactuated AUVs","authors":"Zhiguang Feng;Sibo Yao","doi":"10.1109/JAS.2024.124617","DOIUrl":"https://doi.org/10.1109/JAS.2024.124617","url":null,"abstract":"This letter addresses the formation control problem for constrained underactuated autonomous underwater vehicles (AUVs). The feasibility condition of the virtual control law is eliminated by introducing a nonlinear state dependence function (NSDF) that transforms the state of each AUV in the formation. Then, the control scheme is constructed based on the new variables after the state transformation combined with the active disturbance rejection control (ADRC) technique to achieve asymmetric time-varying state-constrained control for each AUV. Moreover, a dynamic event-triggered mechanism (DETM) is applied to alleviate the mechanical wear of actuators, and an auxiliary dynamic system (ADS) is employed to address the input saturation. Finally, the advantages and effectiveness of the proposed method are verified by simulations.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"460-462"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10846929","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Software Security Meets Large Language Models: A Survey","authors":"Xiaogang Zhu;Wei Zhou;Qing-Long Han;Wanlun Ma;Sheng Wen;Yang Xiang","doi":"10.1109/JAS.2024.124971","DOIUrl":"https://doi.org/10.1109/JAS.2024.124971","url":null,"abstract":"Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently, researchers have explored the potential of using large language models (LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"317-334"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Zero-Dynamics Attack Scheduling With State Estimation","authors":"Zhe Wang;Heng Zhang;Chaoqun Yang;Xianghui Cao","doi":"10.1109/JAS.2024.124737","DOIUrl":"https://doi.org/10.1109/JAS.2024.124737","url":null,"abstract":"This letter focuses on how an attacker can design suitable improved zero-dynamics (ZD) attack signal based on state estimates of target system. Improved ZD attack is to change zero dynamic gain matrix of attack signal to a matrix with determinant greater than 1. This attack method ensures that attack signal can complete the destruction of target system but to a certain extent, the original stealth of ZD attack is lost. To address this situation we introduce Kalman filter state estimation, before attacker designs attack signal, they can design a suitable improved ZD attack signal based on proposed attack stealth time and estimated system states and their thresholds formulated. We verified theoretical results with a linear discrete-time system.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"472-474"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10846954","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finite-Time Stability of Impulsive and Switched Hybrid Systems With Delay-Dependent Impulses","authors":"Taixiang Zhang;Jinde Cao;Mahmoud Abdel-Aty;Ardak Kashkynbayev","doi":"10.1109/JAS.2024.124758","DOIUrl":"https://doi.org/10.1109/JAS.2024.124758","url":null,"abstract":"This letter studies finite-time stability (FTS) of impulsive and switched hybrid systems with delay-dependent impulses. Some conditions, based on Lyapunov method, are proposed for ensuring FTS and estimating settling-time function (STF) of the hybrid systems. When switching dynamics are FTS and impulsive dynamics involve destabilizing delay-dependent impulses, the FTS is retained if the impulses occur infrequently. When switching dynamics may not be FTS and impulsive dynamics involve stabilizing delay-dependent impulses, the uninterrupted impulses can achieve the FTS of hybrid system. Moreover, the STF presents a class of uniformity about the impulsive and switching hybrid signals. The analysis is illustrated by a practical example.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"466-468"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10846934","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongxing Xiong;Guangdeng Chen;Hongru Ren;Hongyi Li
{"title":"Broad-Learning-System-Based Model-Free Adaptive Predictive Control for Nonlinear MASs Under DoS Attacks","authors":"Hongxing Xiong;Guangdeng Chen;Hongru Ren;Hongyi Li","doi":"10.1109/JAS.2024.124929","DOIUrl":"https://doi.org/10.1109/JAS.2024.124929","url":null,"abstract":"In this paper, the containment control problem in nonlinear multi-agent systems (NMASs) under denial-of-service (DoS) attacks is addressed. Firstly, a prediction model is obtained using the broad learning technique to train historical data generated by the system offline without DoS attacks. Secondly, the dynamic linearization method is used to obtain the equivalent lin-earization model of NMASs. Then, a novel model-free adaptive predictive control (MFAPC) framework based on historical and online data generated by the system is proposed, which combines the trained prediction model with the model-free adaptive control method. The development of the MFAPC method motivates a much simpler robust predictive control solution that is convenient to use in the case of DoS attacks. Meanwhile, the MFAPC algorithm provides a unified predictive framework for solving consensus tracking and containment control problems. The boundedness of the containment error can be proven by using the contraction mapping principle and the mathematical induction method. Finally, the proposed MFAPC is assessed through comparative experiments.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"381-393"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}