Quasisynchronization of Reaction–Diffusion Neural Networks Under Deception Attacks

نویسندگان

چکیده

This study focuses on the quasisynchronization problem for reaction–diffusion neural networks (RDNNs) in presence of deception attacks. Under attacks, a time–space sampled-data (TSSD) control mechanism is proposed RDNNs. Compared with traditional strategies, can not only save network bandwidth but also improve cybersecurity communications. Inspired by Halanay’s inequality, new inequality proposed, which be effectively applied to dynamical systems. Then, using this and Lyapunov functional approach, criteria are set The desired gain gained from solving group linear matrix inequalities. Moreover, absence exponential synchronization studied In end, simulation results given demonstrate usefulness theoretical analysis.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Node Survival in Networks under Correlated Attacks

We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenari...

متن کامل

rodbar dam slope stability analysis using neural networks

در این تحقیق شبکه عصبی مصنوعی برای پیش بینی مقادیر ضریب اطمینان و فاکتور ایمنی بحرانی سدهای خاکی ناهمگن ضمن در نظر گرفتن تاثیر نیروی اینرسی زلزله ارائه شده است. ورودی های مدل شامل ارتفاع سد و زاویه شیب بالا دست، ضریب زلزله، ارتفاع آب، پارامترهای مقاومتی هسته و پوسته و خروجی های آن شامل ضریب اطمینان می شود. مهمترین پارامتر مورد نظر در تحلیل پایداری شیب، بدست آوردن فاکتور ایمنی است. در این تحقیق ...

Android UI Deception Revisited: Attacks and Defenses

App-based deception attacks are increasingly a problem on mobile devices and they are used to steal passwords, credit card numbers, text messages, etc. Current versions of Android are susceptible to these attacks. Recently, Bianchi et al. proposed a novel solution “What the App is That” that included a host-based system to identify apps to users via a security indicator and help assure them tha...

متن کامل

Detecting Targeted Attacks by Multilayer Deception

Over the past few years, enterprises are facing a growing number of highly customized and targeted attacks that use sophisticated techniques and seek after important company assets, such as customer data and intellectual property. Unlike conventional attacks, targeted attacks are operated by experts who use multiple steps to gain access to sensitive assets, and most of time, leave very few netw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE transactions on systems, man, and cybernetics

سال: 2022

ISSN: ['1083-4427', '1558-2426']

DOI: https://doi.org/10.1109/tsmc.2022.3166554