Event-Based Dissipative Filtering of Markovian Jump Neural Networks Subject to Incomplete Measurements and Stochastic Cyber-Attacks

In this article, the dissipativity-based filtering of the Markovian jump neural networks subject to incomplete measurements and deception attacks is investigated by adopting an event-triggered communication strategy, where the attackers are supposed to occur in a random fashion but obey the Bernoull...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cybernetics Vol. 51; no. 3; pp. 1370 - 1379
Main Authors Xu, Yong, Wu, Zheng-Guang, Pan, Ya-Jun
Format Journal Article
LanguageEnglish
Published United States IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this article, the dissipativity-based filtering of the Markovian jump neural networks subject to incomplete measurements and deception attacks is investigated by adopting an event-triggered communication strategy, where the attackers are supposed to occur in a random fashion but obey the Bernoulli distribution. Consider that the information of the system mode is transmitted to the filter over the communication network that is vulnerable to external attacks, which may lead to the undesired performance of the resulting system by injecting malicious information from the attackers. As a result, the filter has difficulty completing information from the original system. Besides, an event-triggered communication mechanism is introduced to reduce the communication frequency between data transmission due to the limited network resources, and different triggering conditions corresponding to different jump modes are developed. Then, based on the above considerations, the sufficient condition is derived to ensure the stochastic stability and dissipativity of the resulting augmented system although the deception attacks and incomplete information exist. A numerical simulated example is provided to verify the theoretical analysis.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2168-2267
2168-2275
2168-2275
DOI:10.1109/TCYB.2019.2946838