Membership-Function-Dependent Reachable Set Synthesis of Takagi-Sugeno Fuzzy Singular Multi-Agent Systems Subject to Deception Attacks
This paper focuses on the membership-functions-dependent reachable set (RS) synthesis of a class of Takagi-Sugeno (T-S) fuzzy singular multi-agent systems subject to deception attacks. To do this, with the help of the T-S fuzzy model, the nonlinear system model is transformed into a quasi-linear sys...
Saved in:
Published in | IEEE transactions on automation science and engineering Vol. 22; pp. 7506 - 7515 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.01.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper focuses on the membership-functions-dependent reachable set (RS) synthesis of a class of Takagi-Sugeno (T-S) fuzzy singular multi-agent systems subject to deception attacks. To do this, with the help of the T-S fuzzy model, the nonlinear system model is transformed into a quasi-linear system. Then, the control method in the linear system is used to solve this kind of nonlinear problem. Firstly, two suitable non-singular value matrices M and N are obtained by singular value decomposition, and then the singular system is decomposed into algebraic subsystem and differential subsystem by matrices M and N. Secondly, a consensus topology with communication delay under deception attack is designed. In this cases, the sufficient conditions of RS for the simultaneous existence of external disturbances and deception attacks are given, and the specific value of the RS is obtained by solving the linear matrix inequality using the matrix decoupling method. Finally, the effectiveness of the proposed method is verified by taking the actual DC motor built on the physical platform and a class of nonlinear single-species bio-economic system as examples.Note to Practitioners-In the context of contemporary huge industry and engineering, while rapid development, security is also one of the issues that must be considered. However, the modern engineering system has the characteristics of complexity and variability, and a single module cannot operate it completely, so multiple separate modules need to work together through a unique connection. For this reason, security issues will become much more difficult. In addition, in modern network engineering, there are often some criminals who destroy the system, resulting in its normal operation, economic losses, serious situations, or endanger personal safety. Such behavior is usually called network attacks. Deception attacks are part of network attacks, which can harm the system by spreading false information. Therefore, in researching security issues, deception attacks need to be paid attention. Based on the above analysis, the membership-functions-dependent reachable set synthesis of a class of Takagi-Sugeno fuzzy singular multi-agent systems subject to deception attacks is studied in this paper. |
---|---|
AbstractList | This paper focuses on the membership-functions-dependent reachable set (RS) synthesis of a class of Takagi-Sugeno (T-S) fuzzy singular multi-agent systems subject to deception attacks. To do this, with the help of the T-S fuzzy model, the nonlinear system model is transformed into a quasi-linear system. Then, the control method in the linear system is used to solve this kind of nonlinear problem. Firstly, two suitable non-singular value matrices M and N are obtained by singular value decomposition, and then the singular system is decomposed into algebraic subsystem and differential subsystem by matrices M and N. Secondly, a consensus topology with communication delay under deception attack is designed. In this cases, the sufficient conditions of RS for the simultaneous existence of external disturbances and deception attacks are given, and the specific value of the RS is obtained by solving the linear matrix inequality using the matrix decoupling method. Finally, the effectiveness of the proposed method is verified by taking the actual DC motor built on the physical platform and a class of nonlinear single-species bio-economic system as examples.Note to Practitioners-In the context of contemporary huge industry and engineering, while rapid development, security is also one of the issues that must be considered. However, the modern engineering system has the characteristics of complexity and variability, and a single module cannot operate it completely, so multiple separate modules need to work together through a unique connection. For this reason, security issues will become much more difficult. In addition, in modern network engineering, there are often some criminals who destroy the system, resulting in its normal operation, economic losses, serious situations, or endanger personal safety. Such behavior is usually called network attacks. Deception attacks are part of network attacks, which can harm the system by spreading false information. Therefore, in researching security issues, deception attacks need to be paid attention. Based on the above analysis, the membership-functions-dependent reachable set synthesis of a class of Takagi-Sugeno fuzzy singular multi-agent systems subject to deception attacks is studied in this paper. |
Author | Zhang, Liang Zhao, Xudong Zhao, Ning Zhang, Xudong |
Author_xml | – sequence: 1 givenname: Liang orcidid: 0000-0002-1907-016X surname: Zhang fullname: Zhang, Liang organization: College of Control Science and Engineering, Bohai University, Jinzhou, Liaoning, China – sequence: 2 givenname: Xudong orcidid: 0000-0002-1930-5563 surname: Zhang fullname: Zhang, Xudong email: hnslyszxd1998@163.com organization: College of Control Science and Engineering, Bohai University, Jinzhou, Liaoning, China – sequence: 3 givenname: Xudong orcidid: 0000-0002-1864-4686 surname: Zhao fullname: Zhao, Xudong organization: Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, Liaoning, China – sequence: 4 givenname: Ning orcidid: 0000-0002-9877-6872 surname: Zhao fullname: Zhao, Ning organization: College of Control Science and Engineering, Bohai University, Jinzhou, Liaoning, China |
BookMark | eNp9kEtuwjAQhq2KSqW0B6jUhS9gajuJTZaIR1sJVKmh68g4YzAEB8XOAg7QczcRLKouuppZ_N88vnvUc5UDhJ4YHTJG05fVOJsNOeXxMIpFnIzoDeqzJBmRSI6iXtfHCUnSJLlD997vaJscpbSPvpdwWEPtt_ZI5o3TwVaOTOEIrgAX8CcovVXrEnAGAWcnF7bgrceVwSu1VxtLsmYDrsLz5nw-4cy6TVOqGi-bMlgy3nQzspMPcPA4a9Y70AGHCk9Bw7FbhcchKL33D-jWqNLD47UO0Nd8tpq8kcXH6_tkvCCaCxGIAcopjbQ0OjGgIgZMm0IUhjIuhSyopNyIghaKcwHty3EkVbpOOcS8DctogORlrq4r72swubZBdZeEWtkyZzTvdOadzrzTmV91tiT7Qx5re1D16V_m-cJYAPiVF6nkgkY_s5-FZw |
CODEN | ITASC7 |
CitedBy_id | crossref_primary_10_1080_03081079_2024_2443003 crossref_primary_10_1016_j_chaos_2024_115929 crossref_primary_10_1016_j_matcom_2024_11_018 crossref_primary_10_1007_s00034_024_02891_z crossref_primary_10_1177_01423312241299533 |
Cites_doi | 10.1016/j.dss.2009.05.012 10.1007/s40815-021-01121-x 10.1016/j.automatica.2011.01.053 10.1007/BFb0002475 10.1109/tfuzz.2023.3240250 10.1109/MCOM.001.2000552 10.1016/j.jfranklin.2011.11.002 10.1007/BF01600184 10.1016/j.automatica.2007.07.017 10.1016/j.jfranklin.2017.10.015 10.1016/j.ins.2021.01.023 10.1109/TASE.2022.3232496 10.1016/j.ins.2024.120390 10.1109/TCYB.2020.3041513 10.1016/j.automatica.2014.11.007 10.1109/TFUZZ.2020.3029303 10.1016/j.jfranklin.2020.04.031 10.1016/0004-3702(94)00020-2 10.1109/tfuzz.2023.3273566 10.1109/TCYB.2022.3210184 10.1109/TFUZZ.2020.2991149 10.1016/j.amc.2015.11.076 10.1109/TSMC.2020.3011041 10.1109/TAC.2023.3301957 10.1109/TFUZZ.2017.2686357 10.1016/j.automatica.2022.110750 10.1109/TCYB.2022.3225361 10.1109/tase.2023.3324649 10.1109/tase.2023.3308528 10.1109/tac.2023.3246429 10.1109/tase.2023.3319348 10.1109/TFUZZ.2023.3245634 10.1002/rnc.5311 10.1109/TVT.2020.2980137 10.1016/j.fss.2023.01.010 10.1109/TCYB.2019.2912622 10.1109/JAS.2021.1003820 10.1109/tase.2023.3293844 10.1016/j.chaos.2023.114284 10.1109/TCSII.2023.3294913 10.1109/tnnls.2023.3238819 10.1109/TAC.2023.3254368 10.1016/j.ins.2023.119948 10.1109/tfuzz.2023.3345834 10.1016/j.neucom.2019.01.098 10.1109/TSMC.2018.2834967 10.1007/s11071-021-06385-4 10.1109/tsmc.2023.3301189 10.1109/TASE.2023.3298343 10.1109/TSMCB.2005.850181 10.1016/j.neunet.2024.106586 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TASE.2024.3464580 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics Engineering |
EISSN | 1558-3783 |
EndPage | 7515 |
ExternalDocumentID | 10_1109_TASE_2024_3464580 10697260 |
Genre | orig-research |
GrantInformation_xml | – fundername: Applied Basic Research Program of Liaoning Province grantid: 2023021211-JH26/103 funderid: 10.13039/100012551 – fundername: National Natural Science Foundation of China grantid: 62203065 funderid: 10.13039/501100001809 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 IFIPE IPLJI JAVBF LAI M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c266t-fe02003c7fc5fea31e1cfd6df012767d0702f6d0da226e545437a9b92e4231e73 |
IEDL.DBID | RIE |
ISSN | 1545-5955 |
IngestDate | Thu Apr 24 23:01:43 EDT 2025 Tue Jul 01 05:16:55 EDT 2025 Wed Aug 27 01:38:59 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c266t-fe02003c7fc5fea31e1cfd6df012767d0702f6d0da226e545437a9b92e4231e73 |
ORCID | 0000-0002-9877-6872 0000-0002-1864-4686 0000-0002-1930-5563 0000-0002-1907-016X |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1109_TASE_2024_3464580 crossref_primary_10_1109_TASE_2024_3464580 ieee_primary_10697260 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-01-01 |
PublicationDateYYYYMMDD | 2025-01-01 |
PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | IEEE transactions on automation science and engineering |
PublicationTitleAbbrev | TASE |
PublicationYear | 2025 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref13 ref12 ref15 ref14 ref52 ref11 ref17 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 Xu (ref10) 2006; 332 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 |
References_xml | – ident: ref19 doi: 10.1016/j.dss.2009.05.012 – ident: ref27 doi: 10.1007/s40815-021-01121-x – ident: ref14 doi: 10.1016/j.automatica.2011.01.053 – ident: ref9 doi: 10.1007/BFb0002475 – ident: ref48 doi: 10.1109/tfuzz.2023.3240250 – ident: ref21 doi: 10.1109/MCOM.001.2000552 – ident: ref24 doi: 10.1016/j.jfranklin.2011.11.002 – ident: ref8 doi: 10.1007/BF01600184 – ident: ref11 doi: 10.1016/j.automatica.2007.07.017 – ident: ref23 doi: 10.1016/j.jfranklin.2017.10.015 – ident: ref12 doi: 10.1016/j.ins.2021.01.023 – ident: ref26 doi: 10.1109/TASE.2022.3232496 – ident: ref2 doi: 10.1016/j.ins.2024.120390 – ident: ref40 doi: 10.1109/TCYB.2020.3041513 – ident: ref49 doi: 10.1016/j.automatica.2014.11.007 – ident: ref13 doi: 10.1109/TFUZZ.2020.3029303 – ident: ref52 doi: 10.1016/j.jfranklin.2020.04.031 – ident: ref20 doi: 10.1016/0004-3702(94)00020-2 – ident: ref4 doi: 10.1109/tfuzz.2023.3273566 – ident: ref34 doi: 10.1109/TCYB.2022.3210184 – ident: ref41 doi: 10.1109/TFUZZ.2020.2991149 – ident: ref50 doi: 10.1016/j.amc.2015.11.076 – ident: ref44 doi: 10.1109/TSMC.2020.3011041 – ident: ref16 doi: 10.1109/TAC.2023.3301957 – ident: ref6 doi: 10.1109/TFUZZ.2017.2686357 – ident: ref15 doi: 10.1016/j.automatica.2022.110750 – ident: ref25 doi: 10.1109/TCYB.2022.3225361 – ident: ref37 doi: 10.1109/tase.2023.3324649 – ident: ref35 doi: 10.1109/tase.2023.3308528 – ident: ref30 doi: 10.1109/tac.2023.3246429 – ident: ref5 doi: 10.1109/tase.2023.3319348 – ident: ref47 doi: 10.1109/TFUZZ.2023.3245634 – ident: ref46 doi: 10.1002/rnc.5311 – ident: ref32 doi: 10.1109/TVT.2020.2980137 – ident: ref3 doi: 10.1016/j.fss.2023.01.010 – ident: ref33 doi: 10.1109/TCYB.2019.2912622 – ident: ref18 doi: 10.1109/JAS.2021.1003820 – ident: ref28 doi: 10.1109/tase.2023.3293844 – ident: ref39 doi: 10.1016/j.chaos.2023.114284 – volume: 332 year: 2006 ident: ref10 publication-title: Robust Control and Filtering of Singular Systems – ident: ref1 doi: 10.1109/TCSII.2023.3294913 – ident: ref36 doi: 10.1109/tnnls.2023.3238819 – ident: ref22 doi: 10.1109/TAC.2023.3254368 – ident: ref42 doi: 10.1016/j.ins.2023.119948 – ident: ref29 doi: 10.1109/tfuzz.2023.3345834 – ident: ref51 doi: 10.1016/j.neucom.2019.01.098 – ident: ref7 doi: 10.1109/TSMC.2018.2834967 – ident: ref17 doi: 10.1007/s11071-021-06385-4 – ident: ref31 doi: 10.1109/tsmc.2023.3301189 – ident: ref38 doi: 10.1109/TASE.2023.3298343 – ident: ref43 doi: 10.1109/TSMCB.2005.850181 – ident: ref45 doi: 10.1016/j.neunet.2024.106586 |
SSID | ssj0024890 |
Score | 2.5026112 |
Snippet | This paper focuses on the membership-functions-dependent reachable set (RS) synthesis of a class of Takagi-Sugeno (T-S) fuzzy singular multi-agent systems... |
SourceID | crossref ieee |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 7506 |
SubjectTerms | Autonomous aerial vehicles deception attacks Delays Economics Estimation Linear systems membership-functions-dependent Multi-agent systems Nonlinear systems Reachable set synthesis Stability analysis T-S fuzzy singular multi-agent systems Takagi-Sugeno model Topology |
Title | Membership-Function-Dependent Reachable Set Synthesis of Takagi-Sugeno Fuzzy Singular Multi-Agent Systems Subject to Deception Attacks |
URI | https://ieeexplore.ieee.org/document/10697260 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA7Wi3rwUSvWFzl4ElK3m310j8W2iKAHt4Xeln1MQCpdsdlD-wP83c5kUy2C4m1ZsiHwZTOPfPMNY9dhGigZmeYukAmv5ymRQa8QpLyXZhJcabpEPD4F9xPvYepPbbG6qYUBAEM-gw49mrv8oswrSpXhHx5EITrgDdbAyK0u1voW1uuZhAq5BMKPfN9eYXad6Hbcj4cYCrpeR9JFHklAbhihja4qxqiMDtjTejk1l2TWqXTWyVc_lBr_vd5Dtm_dS96v98MR24J5k-2sq48XTba3IUB4zD4egRqCEGNLjNDCEUpiYPviav5MVEuqreIxaB4v5-gtLl4WvFR8nM5SjKvjikRe-aharZY8xjmJ1cpNVa_oU9UWt5LoHE8oSvlwXfIBWC4N72tNNf4tNhkNx3f3wnZmEDkadC0UOERqy0NFZLVUdqGbqyIoFF1kB2GB54irgsIpUvTuABHxZJhGWeQCem9dCOUJ256XczhlXIKSGOSArzKMzBAtPET8HGfKXOW5KbSZs4Yqya1sOXXPeE1M-OJECaGbELqJRbfNbr4-eas1O_4a3CLgNgbWmJ398v6c7brUAthkYS7Ytn6v4BL9Ep1dmf34CRZk35g |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB7xOACH5bkClmV94ITkbhLn0RyrharL0h5IkbhFeYwlBGpX1DnQH8DvZsZx2QqJFbcocixLn-N5-JtvAM6SItYqtc1dsJRhN9SyxG4tWXmvKBUGynaJGI7iwW14dRfduWJ1WwuDiJZ8hh1-tHf59bRqOFVGf3icJuSAr8I6Gf7Ib8u1_knrdW1KhZ0CGaVR5C4xfS_9Oe5llxQMBmFH8VUei0AumaGlvirWrPS3YbRYUMsmeeg0puxU83dajZ9e8Q58cQ6m6LU7YhdWcLIHG4v649kebC1JEO7DyxC5JQhztmSfbBzjJC9cZ1wjbphsydVVIkMjsucJ-Yuz-5mYajEuHgqKrLOGZV5Fv5nPn0VGczKvVdi6Xtnjui3hRNEFnVGc9BFmKi7QsWlEzxiu8j-A2_7l-NdAut4MsiKTbqRGj2ltVaKZrlYoH_1K13Gt-So7Tmo6SQId115dkH-HhEiokiIt0wDJf_MxUV9hbTKd4CEIhVpRmIORLik2I7ToGIkqmqkMdBgUeATeAqq8csLl3D_jMbcBjJfmjG7O6OYO3SM4f_vkb6va8b_BBwzc0sAWs-MP3v-AjcF4eJ1f_x79-QabATcEtjmZE1gzTw1-Jy_FlKd2b74C53Pi4Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Membership-Function-Dependent+Reachable+Set+Synthesis+of+Takagi-Sugeno+Fuzzy+Singular+Multi-Agent+Systems+Subject+to+Deception+Attacks&rft.jtitle=IEEE+transactions+on+automation+science+and+engineering&rft.au=Zhang%2C+Liang&rft.au=Zhang%2C+Xudong&rft.au=Zhao%2C+Xudong&rft.au=Zhao%2C+Ning&rft.date=2025-01-01&rft.issn=1545-5955&rft.eissn=1558-3783&rft.volume=22&rft.spage=7506&rft.epage=7515&rft_id=info:doi/10.1109%2FTASE.2024.3464580&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TASE_2024_3464580 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5955&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5955&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5955&client=summon |