{"title":"基于事件触发脉冲协议的欺骗攻击下多路网络的准同步","authors":"Xin Jin , Xiaojie Chen , Zhengxin Wang","doi":"10.1016/j.amc.2025.129635","DOIUrl":null,"url":null,"abstract":"<div><div>In our work, we provide a novel mathematical model for heterogeneous multiplex networks under deception attacks to analyze synchronization behaviors of the nodes. We introduce a leader and design a static event-triggered impulsive protocol. In addition, to further save control costs, we then design a dynamic event-triggered impulsive protocol. By utilizing the Lyapunov stability method and average impulsive interval method, for both static and dynamic event-triggered impulsive protocols, the sufficient synchronization conditions guaranteeing that all follower nodal states finally converge to a bounded region are derived, and the value of upper bound of the convergence region is also determined. Finally, two numerical examples are provided to verify the effectiveness of the theoretical results.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"508 ","pages":"Article 129635"},"PeriodicalIF":3.4000,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Quasi-synchronization of multiplex networks under deception attacks via event-triggered impulsive protocol\",\"authors\":\"Xin Jin , Xiaojie Chen , Zhengxin Wang\",\"doi\":\"10.1016/j.amc.2025.129635\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In our work, we provide a novel mathematical model for heterogeneous multiplex networks under deception attacks to analyze synchronization behaviors of the nodes. We introduce a leader and design a static event-triggered impulsive protocol. In addition, to further save control costs, we then design a dynamic event-triggered impulsive protocol. By utilizing the Lyapunov stability method and average impulsive interval method, for both static and dynamic event-triggered impulsive protocols, the sufficient synchronization conditions guaranteeing that all follower nodal states finally converge to a bounded region are derived, and the value of upper bound of the convergence region is also determined. Finally, two numerical examples are provided to verify the effectiveness of the theoretical results.</div></div>\",\"PeriodicalId\":55496,\"journal\":{\"name\":\"Applied Mathematics and Computation\",\"volume\":\"508 \",\"pages\":\"Article 129635\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2025-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Applied Mathematics and Computation\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0096300325003613\",\"RegionNum\":2,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Mathematics and Computation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0096300325003613","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Quasi-synchronization of multiplex networks under deception attacks via event-triggered impulsive protocol
In our work, we provide a novel mathematical model for heterogeneous multiplex networks under deception attacks to analyze synchronization behaviors of the nodes. We introduce a leader and design a static event-triggered impulsive protocol. In addition, to further save control costs, we then design a dynamic event-triggered impulsive protocol. By utilizing the Lyapunov stability method and average impulsive interval method, for both static and dynamic event-triggered impulsive protocols, the sufficient synchronization conditions guaranteeing that all follower nodal states finally converge to a bounded region are derived, and the value of upper bound of the convergence region is also determined. Finally, two numerical examples are provided to verify the effectiveness of the theoretical results.
期刊介绍:
Applied Mathematics and Computation addresses work at the interface between applied mathematics, numerical computation, and applications of systems – oriented ideas to the physical, biological, social, and behavioral sciences, and emphasizes papers of a computational nature focusing on new algorithms, their analysis and numerical results.
In addition to presenting research papers, Applied Mathematics and Computation publishes review articles and single–topics issues.