Abstract
In recent years, cyber security has become a increasingly prominent, with the core issue being the design of secure communication. In this paper, a secure communication framework based on secure interlayer exponential synchronous of duplex artificial neural networks (DANNs) under cyber attacks is developed. To resist random uncertainties and cyber attacks which is conceled in transmission of the signals, based on the Lyapunov’s second method, an intelligent adaptive controller is designed. Based upon Lyapunov stable theory, the criteria for the interlayer synchronous are got. Finally, a secure communication framework based on the secure synchronous policy is derived.Through simulation experiments, exponential synchronous for DANNs and signal security communication have been achieved. Thus, the effectiveness of the theoretical framework is validated. The researches provide references in the design of secure communication schemes in engineering.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Synchronous behavior of networked nonlinear dynamic systems attracted a lot of research effort owing to a wide range of applications, such as swarm robotics [1], secure communication [2,3,4] in recent years. The study of synchronous behavior in complex neural networks has attracted the attention of many scholars [5,6,7,8,9]. For instances, in literature [10], reaction–diffusion neural networks were controlled to achieve synchronization which applies to secure communication. In these works, several neural networks were interconnected by single type neurotransmitter. However, in duplex neural networks, neurons transmit signals by more than one neurotransmitter, such as electrical or chemical types. There are many types of neurotransmitters, and different types of neurotransmitters have different effects. So there are different connection modes between nodes in neural networks, which are multi-layer neural networks. On another hand, asymptotic synchronization is a method which is often adopted by scholars [11]. However, due to better convergence rate of exponentially stable, exponentially stable-based synchronization in networks is concerned.
Interlayer synchronization is a special dynamic behavior of multi-layer networks, which is described as synchronization between each node in a given layer and its corresponding node in another layer. Some achievements have been reported on asymptotic stability-based interlayer synchronization [12, 13]. Research on exponentially stability-based synchronization of networks has also been reported, such as exponentially stability-based synchronization in complex-valued neural networks and delay neural networks [14, 15]. However, so far, few scholars have paid attention to exponentially stable-based interlayer synchronization in DANNs, which has attracted our interest.
Time delays are very common in nature [16, 17]. In networks, there are delays in communication between nodes, which is usually represented by internal communication delays, such as internal communication delays for inertial neural networks [17], internal communication delays in two-layer multiplex networks [18], and internal communication delays for neural networks [19], so it is necessary to consider internal communication delays in the study of DANNs.
In recently, more and more cyber attacks occur in networks, which directly affect people’s work and live [20, 21]. Cyber attacks in communication engineering networks have become hot topics [22, 23]. Due to the application value of artificial neural networks in secure communication, artificial neural networks under cyber attacks have been concerned, such as multiplex-neural networks under cyber attacks [22], deception attacks in master–slave neural networks [23]. Stochastic cyber attacks may lead to communication lag or network congestion in networks. So stochastic internal delays in DANNs are considered when study stochastic cyber attacks.
Due to stochastic cyber attacks and stochastic communication delays in networks, numerous uncertain factors will emerge, which have a significant impact on the stability of networks [24]. At this point, because intelligent adaptive controllers can automatically adjust its own parameters based on the uncertain characteristics of neural networks [25, 26], an intelligent adaptive control method is needed to improve the robustness of the networks [27,28,29,30,31]. Quantitative control is an approach which can be applied to characterize communication constraints in DANNs [32, 33]. On another hand, secure communication about signal encryption is concerned by some scholars [34, 35]. However, secure communication based on exponentially interlayer synchronization in DANNs under random cyber attacks is still an open problem. To resist random uncertainties and cyber attacks which is conceled in transmission of the signals, based on the Lyapunov’s second method, a class of intelligent adaptive quantitative controller can be designed to achieve the exponentially interlayer synchronization and secure communication.
Based on the above analysis, we construct DANNs with stochastic internal communication delays under random cyber attacks. To resist random cyber attacks and uncertain factors, an intelligent adaptive quantization controller is designed to realize the exponential interlayer synchronization in DANNs. At the same time, we obtain some sufficient conditions to guarantee the exponential stable-based synchronization. The design method of the controller is derived. Finally, a secure communication framework based on the synchronous policy is derived. The effectiveness of this secure communication scheme has been validated via an example.
Notation. R characterizes the real number set. Matrix \(H^{T}\) is the transpose matrix of matrix H. \(\left| \cdot \right| \) characterizes absolute value. \(\left\| \cdot \right\| \) is Euclidean norm. \(I_n\) is n-dimensional unit matrix. \({\mathscr {P}r}[ \bullet ]\) is probability. e is the natural index. \({E}[ \bullet ]\) is the expectation. \(\left\{ {\begin{array}{*{20}{c}} {sign\left( w \right) = 1,w > 0^{}}\\ {sign\left( w \right) = 0,w = 0}\\ {sign\left( w \right) = - 1,w < 0} \end{array}} \right. .\)
2 Preliminaries
Consider delay networks composed of N artificial neural networks. The first layer (driving) networks in duplex networks are as follows:
where \({x_i}\left( t \right) {=}{\left( {{x_{i1}}\left( t \right) ,{x_{i2}}\left( t \right) , \ldots ,{x_{in}}\left( t \right) } \right) ^T}\), A is the weight matrix for coupling between neurons; \(- C{x_i}(t) + Af({x_i}(t))\) are neural sub-networks; \(f\left( {{x_i}\left( t \right) } \right) \) is the neuron activation function of the artificial neural networks as a network node; \({{p > 0}}\) and \({{q > 0}}\) stand for coupling strength; \(\Gamma \) stands for inner coupling; \(B = {\left( {{b_{ij}}} \right) _{N \times N}}\), \(D = {\left( {{d_{ij}}} \right) _{N \times N}}\). \({{{b}}_{ij}} > 0\) represents that there exists a interconnection between neural networks j and i, else \(b_{ij}=0\). Similarly, \({d_{ij}} > 0\) characterizes that there is a stochastic occuring signal transmission delay \(\tau \left( t \right) \) between nodes j and i, else \(d_{ij}=0\). \({b_{ii}} = - \sum _{j = 1,j \ne i}^N {{b_{ij}}}\), \({d_{ii}} = - \sum _{j = 1,j \ne i}^N {{d_{ij}}}\), \(0 \le \tau \left( t \right) \le \tau \) and \(0< \dot{\tau }(t) \le {\tau _M} < 1\). Bernoulli random variable is \(\alpha (t)\). \(\alpha (t)\) satisfies \(\alpha \left( t \right) = \left\{ \begin{array}{l} 1\\ 0 \end{array} \right. \), \(\mathscr {P}r(\alpha (t) = 1)=\alpha ,\mathscr {P}r(\alpha (t) = 0)= 1 - {\alpha }\), \(E(\alpha (t) - \alpha )=0,E(\alpha (t) -\alpha )^2= \alpha (1 -\alpha )\).
The second(response) layer networks in duplex networks are as follows:
where \({y_i}(t)\) is similar to \({x_i}(t)\); \({u_i}\left( t \right) \) is the designed adaptive quantitative controller. The other parameters are the same as these in (1).
The second layer networks under random cyber attacks are
\({U_i}(t)\) is the designed adaptive quantitative controller under stochastic cyber attacks.
In Fig. 1, different colors are used to represent the states of nodes, and the states of nodes within the same layer of networks is generally different. From Fig. 1, when \(\alpha (t)\) changes from 0 to 1, cyber attacks occur and signal transmission delays occur in the networks. When the delays are large enough, it may cause communication interruption between some nodes in duplex networks.
Definition 1
([33]) The quantizer \(Q( \cdot ):R \rightarrow \Delta \) is as follows: quantized set is \(\Delta =\left\{ { \pm {{H}_i}:{{H}_i} = {\rho ^i}{{H}_0},i} \right. \left. {= \pm 1, \pm 2, \ldots } \right\} \cup \left\{ { \pm {{H}_0}} \right\} \cup \left\{ 0 \right\} \), where \(0< \rho < 1\); the constant \({{H}_0} > 0\). Sector bound and quantized density are \(\sigma \) and \(\rho \) respectively, where \(\sigma = \frac{{1 - \rho }}{{1 + \rho }}.\)
is a quantization function, where \(\mathcal {u}(t) \in R\). According to [33], a Filippov solution \(\vartheta \in [ - \sigma ,\sigma )\) satisfies \(Q(\mathcal {u}(t)) = (1 + \vartheta )\mathcal {u}(t)\).
Definition 2
([36]) Let \({\omega _i}\left( t \right) \mathrm{{ = }}{y_i}\left( t \right) - {x_i}\left( t \right) \). If
then networks (1) and (2) or (1) and (3) are exponentially asymptotical interlayer synchronization.
Assumption 1
([37]) Nonlinear function \(h\left( \cdot \right) \) satisfies
where \({M_i} > 0\).
Assumption 2
([38]) Function \(-C\lambda _i(t)+f(\lambda _i(t))\) and \(-C\theta _i(t)+f(\theta _i(t))\) satisfies
where \({L_i} > 0\).
3 Main results
3.1 Interlayer synchronization under attacks
The first layer (driving) network is (1). The second layer (response) network is (3). The systems on errors are as follows [37]:
The controller under random deception cyber attacks is
where \(C_i\left( {{{\varepsilon }_i}\left( t \right) } \right) \) characterizes the signal of the cyber attacks, and
where \(h\left( \cdot \right) \) is a norm bounded nonlinear function, and \({k_1} \ge 0,{k_2} \ge 0,{k_3} \ge 0\).
where \({m_i} > 0\),
and
where \(\eta > 0\).
Theorem 1
There are \({L}> 0\), \(k_1> 0\), \(\eta > 0\), \(k_2> 0\), \({{\hat{\gamma }}_{\min }} > 0\), \(m_{min} >0\) and \(\xi >0\) satisfing
where \({L} = \max \left\{ L_i\right\} \), \({\hat{\gamma } _{\min }}{= }\min \left\{ {\hat{\gamma } }_i \right\} \), \({M_{\max }} = \max \left\{ M_i\right\} \),
\({m_{\min }} =\min \left\{ m_i\right\} \), \(\left| {{b_M}} \right| = \max \{ \left| {{b_{ij}}} \right| \}\), \(0 < \tau (t)\le {\tau }\), \(0< \dot{\tau }(t) \le {\tau _M} < 1\), \(\left| {{d_M}} \right| = \max \{ \left| {{d_{ij}}} \right| \}\), then the error systems (4) is exponential stable, i.e. exponentially asymptotical interlayer synchronization between DANNs (1) and (3) is achieved by adaptive controller (5) under random cyber attacks.
Proof
Lyapunov–Krasovskii functional (LKF) is
After deriving the LKF, one gets
with
Based on Assumption 1 and the controller (5), we obtain
Because of
and
After uniting (6)–(8), (11), one obtains
After adjustment, one obtains
After uniting (12), (13) and (15), one has
According to [33] and \(\sigma \in \left( {0,1} \right) \), one gets
and
Uniting (16)–(18), we can get
According to Assumption 1, because of \(\left\| {h\left( {{k_3}{{\tilde{u}}_i}\left( t \right) } \right) } \right\| \le {M_i}\), we can get
If
then \(\dot{V}\left( t \right) \le 0\), namely, \(V\left( t \right) \le V\left( 0 \right) ,\forall t \ge 0.\)
Because of \(\frac{1}{2}{e^{2\eta t}}{{{\left( {{\omega _i}\left( t \right) } \right) }^T}{\omega _i}\left( t \right) } \le V\left( t \right) \le V\left( 0 \right) \), we have \(\left\| {{\omega _i}\left( t \right) } \right\| \le \textrm{K}{e^{ - \eta t}}\), where \(\textrm{K} = \sqrt{2V\left( 0 \right) } > 0\), so that \(\mathop {\lim }\limits _{t \rightarrow \infty } \left\| {{\omega _i}\left( t \right) } \right\| = 0\). That is to say, under stochastic cyber attacks, systems (4) is exponential stable, i.e. exponentially asymptotical interlayer synchronization for networks (1) and (3) with random occuring delays is achieved. \(\square \)
3.2 Exponential interlayer synchronization
Error systems for networks (1) and (2) are as follows:
The adaptive quantitative controller \({u_i}\left( t \right) \) as
with \({\gamma _i}\left( t \right) > 0\).
Design adaptive law is
where \(\eta > 0\).
Theorem 2
There exist L, \(\eta > 0\), \({{\hat{\gamma }}_{\min }} > 0\) and \(\xi >0\) satisfy
then error systems are exponential stable, i.e. exponentially asymptotical interlayer synchronization under DANNs (1) and (2) is achieved by quantized adaptive controller (22).
Proof
The proof process is similar to Theorem 1 and is ignored here. \(\square \)
Remark 1
The DANNs in this paper can be directed or undirected, that is, the derived theorem strategies are for both exponentially interlayer synchronization of undirected DANNs and directed DANNs.
4 Secure communication
4.1 Secure synchronous
Simulations are given to illustrate the effective of the theoretical framework. Each system is 3-D cellular artificial neural networks in duplex networks [39,40,41,42].
with \(C = {I_3}\). \(A = \left( {\begin{array}{*{20}{c}} {1.25}&{}\quad { - 3.2}&{}\quad { - 3.2}\\ { - 3.2}&{}\quad {1.1}&{}\quad { - 4.4}\\ { - 3.2}&{}\quad {4.4}&{}\quad 1 \end{array}} \right) \), \(f(\omega (t)) = \left( {\left| {\omega (t) + 1} \right| - \left| {\omega (t) - 1} \right| } \right) /2\).
Driving DANNs with 4 3-D cellular neural networks can be
and response DANNs can be
where \(\alpha \mathrm{{ = }}0.5\), \(p=0.1\), \(q=0.2\), \(\tau \left( t \right) = \frac{{{e^t}}}{{2 + 2{e^t}}}\), \(\Gamma \mathrm{{ = }}{I_3}\), \({\delta _i} = 60\), \(\eta = 0.9\), \({m_i} = 0.005\), \({k_1} = 0.2\), \({k_2} = 0.2\), \({k_3} = 1\). Quantized density is \(\sigma = 0.5\). \(B{ = }\left[ {\begin{array}{*{20}{c}} { - 1}&{}\quad 1&{}\quad 0&{}\quad 0\\ 0&{}\quad { - 1}&{}\quad 1&{}\quad 0\\ 0&{}\quad 0&{}\quad { - 1}&{}\quad 1\\ 1&{}\quad 0&{}\quad 0&{}\quad { - 1} \end{array}} \right] \), \(\mathrm{{D = }}\left[ {\begin{array}{*{20}{c}} { - 3}&{}\quad 1&{}\quad 1&{}\quad 1\\ 0&{}\quad { - 2}&{}\quad 1&{}\quad 1\\ 1&{}\quad 0&{}\quad { - 1}&{}\quad 0\\ 0&{}\quad 1&{}\quad 0&{}\quad { - 1} \end{array}} \right] \).
Errors \({\omega _{ij}}(t)\) between DANNs (25) and (26) under random cyber attacks can be shown in Fig. 2a–c. From Fig. 2a–c, errors for synchronous tend to zero. That means exponentially asymptotical interlayer synchronization under DANNs (25) and (26) is achieved which can support Theorem 1, and the established theoretical framework for synchronous is effective. In Fig. 3, the trajectory of the adaptive law tends towards some stable values. The feedback coefficient of the controller has been adapted.
\({\gamma _i}(t)\) in (7) can be seen in Fig. 4. Signal \(C_{i}\) of random attacks can be shown in Fig. 5. Comparing Figs. 3 and 5, it is shown that signal \(C_{i}\) of random attacks is similar to the control signal \(U_i(t)\), thus achieving the goal of hiding and conducting deception attacks. The signal \(\alpha (t)\) of random attacks randomly switches between 0 and 1 in Fig. 6.
4.2 Signal secure communication
The framework of signal secure communication based on secure synchronous for DANNs under cyber attacks can be shown in Fig. 7.
The transmitted plaintext signals are \({{P}_i}(t)\). Steps are as follows:
Step 1: After mixing the random signal \({\mathcal {R}_i}(t)\) with the plaintext signals \({{P}_i}(t)\), it can be obtained that
Step 2: Generate encrypted signals \(\vartheta _i(t) = M_i(t) + {y_i}(t)\).
Step 3: The sender transmits the signals encrypted ciphertext signals \(\vartheta _i(t)\) from the second layer to the receiver in the first layer through a communication channel.
Step 4: When the secure exponential interlayer synchronous of DANNs under cyber attacks is achieved, the receiver can decrypt the ciphertext signals \(\vartheta _i(t)\) and obtain the correct plaintext signals \(Z_i(t)=P_i(t)=M_i(t)\).
In Fig. 8, the trajectories of \(\vartheta _i(t)\) and \(M_i(t)\) are overlap, which means correct plaintext signals are obtained, and satisfy \(Z_i(t)=P_i(t)=M_i(t)=\vartheta _i(t)\).
Remark 2
Compared with many existing reports, especially literatures [14, 15] and [21], this paper focuses on secure exponentially stable based synchronization of DANNs under cyber attacks; an adaptive control strategy is designed to resist cyber attacks in DANNs; the conditions of interlayer exponential synchronous are given in DANNs; the design method of the intelligent adaptive quantization controller are obtained in DANNs; a secure communication framework based on the synchronous policy is derived. However, in references [14, 15], cyber attacks, DANNs and secure communication frameworks based on the synchronous policy were not been considered. Compared with literature [21], the authors explored fractional order cyber physical systems under random cyber attacks in [21]. However, in this paper, we study coupled neural networks with random occuring time delays under random cyber deception attacks. In [21], researchers adopted feedback control strategy, however, to overcome random uncertainties, an adaptive quantization control strategy is designed in this paper.
Remark 3
In the designed security communication strategy, control signals for exponentially stable based synchronous and ciphertext signals are transmitted within the channel. If the control signals are attacked by random cyber attacks to a certain extent, cyber attacks result in severe distortion of control signals. It will lead to the inability to achieve exponential synchronization, and the ciphertext cannot be decrypted into plaintext. As a result, security communication cannot be achieved.
5 Conclusion
In this paper, a theoretical framework of secure exponential synchronous for DANNs and secure communication framework were derived under stochastic cyber attacks. The cyber attacks were considered in transmission of the intelligent adaptive controller signals. The criteria for the secure synchronous were got based on the Lyapunov’s second method. The design method for structure and parameters of the intelligent controller which can resist random cyber attacks was obtained via Lyapunov stable theory. Finally, a secure communication framework based on the synchronous policy was derived. Through a simulation example, secure synchronous and secure communication were achieved, which verified the effectiveness of the proposed theoretical framework and the application framework of secure communication.
Data availability
The data used to support the findings of this study are included within the article.
References
Tanner, H.G., Jadbabaie, A., Pappas, G.J.: Flocking in fixed and switching networks. IEEE Trans. Autom. Control 52(5), 863–868 (2007)
Shoreh, A.A.H., Kuznetsov, N.V., Mokaev, T.N.: New adaptive synchronization algorithm for a general class of complex hyperchaotic systems with unknown parameters and its application to secure communication. Physica A 586, 126466 (2022)
Yamakou, M.E., Inack, E.M.: Coherence resonance and stochastic synchronization in a small-world neural network: an interplay in the presence of spike-timing-dependent plasticity. Nonlinear Dyn. 111(8), 7789–7805 (2023)
Li, C.L., Wang, X., Du, J.R., Li, Z.J.: Electrical activity and synchronization of HR-tabu neuron network coupled by Chua corsage memristor. Nonlinear Dyn. 111(22), 21333–21350 (2023)
Zhou, L., Tan, F., Yu, F.: A robust synchronization-based chaotic secure communication scheme with double-layered and multiple hybrid networks. IEEE Syst. J. 14(2), 2508–2519 (2020)
Yu, F., et al.: Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos Solitons Fractals 179, 114440 (2024)
Zhou, L., Zhang, H., Tan, F., Liu, K.: Delay-independent control for synchronization of memristor-based BAM neural networks with parameter perturbation and strong mismatch via finite-time technology. Trans. Inst. Meas. Control (2024). https://doi.org/10.1177/014233122312005
Ma, M., Lu, Y.: Synchronization in scale-free neural networks under electromagnetic radiation. Chaos 34(3), 033116 (2024)
Zhou, L., et al.: Fixed/predefined-time synchronization of coupled memristor-based neural networks with stochastic disturbance. Chaos Solitons Fractals 173, 113643 (2023)
Shanmugam, L., Mani, P., Rajan, R., et al.: Adaptive synchronization of reaction–diffusion neural networks and its application to secure communication. IEEE Trans. Cybern. 50(3), 911–922 (2018)
Mahmoodi, K., Kerick, S.E., Grigolini, P., Franaszczuk, P.J., West, B.J.: Complexity synchronization: a measure of interaction between the brain, heart and lungs. Sci. Rep. 13(1), 11433 (2023)
Leyva, I., Sevilla-Escoboza, R., et al.: Inter-layer synchronization in non-identical multi-layer networks. Sci. Rep. 7(1), 1–9 (2017)
Rakshit, S., Majhi, S., Bera, B.K., et al.: Time-varying multiplex network: intralayer and interlayer synchronization. Phys. Rev. E 96(6), 062308 (2017)
Baluni, S., Das, S., et al.: Lagrange \(\alpha \)-exponential synchronization of non-identical fractional-order complex-valued neural networks. Circuits Syst. Signal Process. 41(10), 5632–5652 (2022)
Zhang, X., Wang, D., et al.: Exponentially synchronous results for delayed neural networks with leakage delay via switched delay idea and AED-ADT method. IEEE Trans. Neural Netw. Learn. Syst. 35(3), 3713–3724 (2024)
Tan, F., et al.: Adaptive quantitative control for finite time synchronization among multiplex switched nonlinear coupling complex networks. Eur. J. Control. 70, 100764 (2023)
Shanmugasundaram, S., Kashkynbayev, A., Udhayakumar, K., et al.: Centralized and decentralized controller design for synchronization of coupled delayed inertial neural networks via reduced and non-reduced orders. Neurocomputing 469, 91–104 (2022)
Zhou, L., Tan, F., Yu, F., Liu, W.: Cluster synchronization of two-layer nonlinearly coupled multiplex networks with multi-links and time-delays. Neurocomputing 359, 264–275 (2019)
Selvaraj, P., Sakthivel, R., Kwon, O.M.: Finite-time synchronization of stochastic coupled neural networks subject to Markovian switching and input saturation. Neural Netw. 105, 154–165 (2018)
Zhou, L., Huang, M., Tan, F., et al.: Mean-square bounded synchronization of complex networks under deception attacks via pinning impulsive control. Nonlinear Dyn. 111, 11243–11259 (2023)
Xiong, M., Tan, Y., Du, D., Zhang, B.Y., Fei, S.: Observer-based event-triggered output feedback control for fractional-order cyber-physical system subject to stochastic network attacks. ISA Trans. 104, 15–25 (2019)
Tan, F., Xu, S.Y., Li, Y.M., et al.: Adaptive quantitative control for robust \(H_\infty \) synchronization between multiplex neural networks under stochastic cyber attacks. Neurocomputing 493, 129–142 (2022)
Tan, F., Zhou, L., et al.: Adaptive quantitative exponential synchronization in multiplex Cohen–Grossberg neural networks under deception attacks. J. Franklin Inst. 359(18), 10558–10577 (2022)
Liu, W., Zhao, J., Zhao, H., Ma, Q., Xu, S., Park, J.H.: Neural preassigned performance control for state-constrained nonlinear systems subject to disturbances. IEEE Trans. Neural Netw. Learn. Syst. (2024). https://doi.org/10.1109/TNNLS.2024.3377462
Meng, Q., Ma, Q., Shi, Y.: Adaptive fixed-time stabilization for a class of uncertain nonlinear systems. IEEE Trans. Autom. Control 68(11), 6929–6936 (2023)
Min, H.F., Xu, S.Y., Gu, J., Zhang, B.Y., Zhang, Z.: Further results on adaptive stabilization of high-order stochastic nonlinear systems subject to uncertainties. IEEE Trans. Neural Netw. Learn. Syst. 31(1), 225–234 (2020)
Jia, F., Lu, J., Li, Y., Li, F.: Global state feedback stabilization of nonlinear systems with unknown functions. Nonlinear Dyn. 104, 3633–3641 (2021)
Xia, J.W., et al.: Finite-time command filtered event-triggered adaptive fuzzy tracking control for stochastic nonlinear systems. IEEE Trans. Fuzzy Syst. 29(7), 1815–1825 (2021)
Tan, F., Zhou, L., Lu, J., Zhang, H.: Fixed-time synchronization in multilayer networks with delay Cohen–Grossberg neural subnets via adaptive quantitative control. Asian J. Control 26, 446–455 (2024)
Zhou, L., et al.: Unified quantified adaptive control for multiple-time stochastic synchronization of coupled memristive neural networks. Neurocomputing (2024). https://doi.org/10.1016/j.neucom.2024.127384
Liu, G.B., Park, J.H., Xu, S.Y., et al.: Robust non-fragile \(H_\infty \) fault detection filter design for delayed singular Markovian jump systems with linear fractional parametric uncertainties. Nonlinear Anal. Hybrid Syst 32, 65–78 (2019)
Liu, W., Lim, C.C., Shi, P., Xu, S.: Backstepping fuzzy adaptive control for a class of quantized nonlinear systems. IEEE Trans. Fuzzy Syst. 25(5), 1090–1101 (2017)
Yang, X.S., Song, Q., Cao, J.D., Lu, J.Q.: Synchronization of coupled Markovian reaction–diffusion neural networks with proportional delays via quantized control. IEEE Trans. Neural Netw. Learn. Syst. 30(3), 951–958 (2019)
Li, C.L., Zhang, Y., Li, H.D., Zhou, Y.: Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion. Vis. Comput. (2023). https://doi.org/10.1007/s00371-023-02812-2
Kong, X., Yu, F., et al.: Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: image encryption and FPGA implementation. Neural Netw. 171, 85–103 (2024)
Sheng, Y., Xing, Y., Huang, T., et al.: Global exponential synchronization of delayed fuzzy neural networks with reaction diffusions. IEEE Trans. Fuzzy Syst. 31(8), 2809–2820 (2023)
Xu, Y., Meng, D., Xie, C., You, G., Zhou, W.: A class of fast fixed-time synchronization control for the delayed neural network. J. Franklin Inst. 355, 164–176 (2017)
Zhou, L., Wang, C., et al.: Cluster synchronization on multiple nonlinearly coupled dynamical subnetworks of complex networks with nonidentical nodes. IEEE Trans. Neural Netw. Learn. Syst. 28(3), 570–583 (2016)
Hindmarsh, J.L., Rose, R.M.: A model of the nerve impulse using two first-order differential equations. Nature 296, 5853 (1982)
Zhou, L., Tan, F.: A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks. Nonlinear Dyn. 96, 869–883 (2019)
Tan, F., et al.: Fixed-time stochastic outer synchronization in double-layered multi-weighted coupling networks with adaptive chattering-free control. Neurocomputing 399, 8–17 (2020)
Zhou, L., et al.: Robustness analysis of edge-coupled interdependent networks under different attack strategies. Physica A 632, 129338 (2023)
Acknowledgements
We gratefully acknowledge the financial support received from National Natural Science Foundation of China, Hunan Provincial Department of Science and Technology, Hunan Provincial Department of Education, Xiangtan University.
Funding
This work was supported in part by the National Natural Science Foundation of China under Grants 61803322, in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ3512, 2022JJ30573, in part by research Fund for the Doctoral Program of Higher Education of China 22QDZ18 and in part by the Scientific Research Fund of Hunan Provincial Education Department under Grant 21B0178, 22C0067.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tan, F., Zhou, L., Jia, F. et al. Secure communication based on intelligent adaptive interlayer exponential synchronous for DANNs under cyber attacks. Nonlinear Dyn 112, 18581–18592 (2024). https://doi.org/10.1007/s11071-024-09988-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-024-09988-9