Shuai Xiao , Zhen Wang , Hongjue Wang , Yueying Liu , Xia Huang
{"title":"混合攻击下复值延迟记忆神经网络均方指数同步的切换事件触发控制","authors":"Shuai Xiao , Zhen Wang , Hongjue Wang , Yueying Liu , Xia Huang","doi":"10.1016/j.amc.2025.129715","DOIUrl":null,"url":null,"abstract":"<div><div>This paper investigates the mean-square exponential synchronization (MSES) of complex-valued delayed memristive neural networks (CVDMNNs) under complex-valued hybrid attacks. Considering the discontinuous right-hand sides of CVDMNNs, the systems are analyzed based on Filippov differential inclusion theory, and the interval matrix method is used to handle the memristive connection weights, thereby constructing error systems that are amenable to analysis. To utilize limited communication resources, a complex-valued switching event-triggered mechanism is introduced. Furthermore, to mitigate the effects of complex-valued hybrid attacks, consisting of complex-valued replay attacks and deception attacks following the Bernoulli distribution, a secure controller is designed that can simultaneously counteract the interference caused by residual terms in the error systems. On this basis, a piecewise Lyapunov functional is constructed, and the sufficient condition for achieving MSES under complex-valued hybrid attacks is derived using Lyapunov stability theory and inequality techniques. Based on the derived synchronization criterion, algorithms are proposed to determine the maximum allowable replay and deception attack rates of the system. Finally, a numerical example is provided to validate the effectiveness and superiority of the proposed scheme.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"510 ","pages":"Article 129715"},"PeriodicalIF":3.4000,"publicationDate":"2025-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Switching event-triggered control for mean-square exponential synchronization of complex-valued delayed memristive neural networks under hybrid attacks\",\"authors\":\"Shuai Xiao , Zhen Wang , Hongjue Wang , Yueying Liu , Xia Huang\",\"doi\":\"10.1016/j.amc.2025.129715\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This paper investigates the mean-square exponential synchronization (MSES) of complex-valued delayed memristive neural networks (CVDMNNs) under complex-valued hybrid attacks. Considering the discontinuous right-hand sides of CVDMNNs, the systems are analyzed based on Filippov differential inclusion theory, and the interval matrix method is used to handle the memristive connection weights, thereby constructing error systems that are amenable to analysis. To utilize limited communication resources, a complex-valued switching event-triggered mechanism is introduced. Furthermore, to mitigate the effects of complex-valued hybrid attacks, consisting of complex-valued replay attacks and deception attacks following the Bernoulli distribution, a secure controller is designed that can simultaneously counteract the interference caused by residual terms in the error systems. On this basis, a piecewise Lyapunov functional is constructed, and the sufficient condition for achieving MSES under complex-valued hybrid attacks is derived using Lyapunov stability theory and inequality techniques. Based on the derived synchronization criterion, algorithms are proposed to determine the maximum allowable replay and deception attack rates of the system. Finally, a numerical example is provided to validate the effectiveness and superiority of the proposed scheme.</div></div>\",\"PeriodicalId\":55496,\"journal\":{\"name\":\"Applied Mathematics and Computation\",\"volume\":\"510 \",\"pages\":\"Article 129715\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2025-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Applied Mathematics and Computation\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0096300325004412\",\"RegionNum\":2,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Mathematics and Computation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0096300325004412","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Switching event-triggered control for mean-square exponential synchronization of complex-valued delayed memristive neural networks under hybrid attacks
This paper investigates the mean-square exponential synchronization (MSES) of complex-valued delayed memristive neural networks (CVDMNNs) under complex-valued hybrid attacks. Considering the discontinuous right-hand sides of CVDMNNs, the systems are analyzed based on Filippov differential inclusion theory, and the interval matrix method is used to handle the memristive connection weights, thereby constructing error systems that are amenable to analysis. To utilize limited communication resources, a complex-valued switching event-triggered mechanism is introduced. Furthermore, to mitigate the effects of complex-valued hybrid attacks, consisting of complex-valued replay attacks and deception attacks following the Bernoulli distribution, a secure controller is designed that can simultaneously counteract the interference caused by residual terms in the error systems. On this basis, a piecewise Lyapunov functional is constructed, and the sufficient condition for achieving MSES under complex-valued hybrid attacks is derived using Lyapunov stability theory and inequality techniques. Based on the derived synchronization criterion, algorithms are proposed to determine the maximum allowable replay and deception attack rates of the system. Finally, a numerical example is provided to validate the effectiveness and superiority of the proposed scheme.
期刊介绍:
Applied Mathematics and Computation addresses work at the interface between applied mathematics, numerical computation, and applications of systems – oriented ideas to the physical, biological, social, and behavioral sciences, and emphasizes papers of a computational nature focusing on new algorithms, their analysis and numerical results.
In addition to presenting research papers, Applied Mathematics and Computation publishes review articles and single–topics issues.