首页 > 最新文献

Ieee-Caa Journal of Automatica Sinica最新文献

英文 中文
Hierarchical Secure Steering Control of In-Wheel Motor Driven Electric Vehicle Under Cyber-Physical Constraints 网络物理约束下轮毂电机驱动电动汽车分层安全转向控制
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2023.124092
Zifan Gao;Dawei Zhang;Shuqian Zhu
Dear Editor, This letter presents a new secure hierarchical control strategy for steering tracking of in-wheel motor driven (IWMD) electric vehicle (EV) subject to limited network resources, hybrid cyber-attacks, model nonlinearities, actuator redundancy and airflow disturbance. A hierarchical control architecture is proposed specifically for solving the problems of nonlinear system modeling and actuator redundancy. By utilizing the advantages of fully actuated system (FAS) approach, a nonlinear virtual controller against airflow disturbance is constructed in upper layer system and an event-triggered nonlinear distributed controller is proposed in lower layer system under stochastic hybrid cyber-attacks. A case study of overtaking task is carried out to validate the FAS-based hierarchical control strategy.
这封信提出了一种新的安全层次控制策略,用于轮毂电机驱动(IWMD)电动汽车(EV)的转向跟踪,该控制策略受网络资源有限、混合网络攻击、模型非线性、执行器冗余和气流干扰的影响。针对非线性系统建模和执行器冗余问题,提出了一种分层控制体系结构。利用全驱动系统(FAS)方法的优点,在上层系统中构造了针对气流扰动的非线性虚拟控制器,在下层系统中提出了针对随机混合网络攻击的事件触发非线性分布式控制器。以超车任务为例,验证了基于fass的分级控制策略。
{"title":"Hierarchical Secure Steering Control of In-Wheel Motor Driven Electric Vehicle Under Cyber-Physical Constraints","authors":"Zifan Gao;Dawei Zhang;Shuqian Zhu","doi":"10.1109/JAS.2023.124092","DOIUrl":"https://doi.org/10.1109/JAS.2023.124092","url":null,"abstract":"Dear Editor, This letter presents a new secure hierarchical control strategy for steering tracking of in-wheel motor driven (IWMD) electric vehicle (EV) subject to limited network resources, hybrid cyber-attacks, model nonlinearities, actuator redundancy and airflow disturbance. A hierarchical control architecture is proposed specifically for solving the problems of nonlinear system modeling and actuator redundancy. By utilizing the advantages of fully actuated system (FAS) approach, a nonlinear virtual controller against airflow disturbance is constructed in upper layer system and an event-triggered nonlinear distributed controller is proposed in lower layer system under stochastic hybrid cyber-attacks. A case study of overtaking task is carried out to validate the FAS-based hierarchical control strategy.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1504-1506"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11062715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prescribed Performance Control of Nonlinear Systems With Unknown Sign-Switching Virtual Control Coefficients 未知符号切换虚拟控制系数非线性系统的规定性能控制
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2025.125135
Jin-Zi Yang;Jin-Xi Zhang;Tianyou Chai
The problem of high-performance tracking control for the lower-triangular systems with unknown sign-switching virtual control coefficients as well as unmatched disturbances is investigated in this paper. Instead of the online estimation algorithm, the sliding mode method and the Nussbaum gain technique, a group of orientation functions are employed to handle the unknown sign-switching virtual control coefficients. The control law is combined with the orientation functions and the barrier functions lumped in a recursive manner. It achieves output tracking with the preassigned rate, overshoot, and accuracy. In contrast with the existing solutions, it is effective for the nearly model-free case, with the requirement for information of neither the system nonlinearities nor their bounding functions of the plant, nor the bounds of the disturbances. In addition, our controller exhibits significant simplicity, without parameter identification, disturbance estimation, function approximation, derivative calculation, dynamic surfaces, or command filtering. Two simulation examples are conducted to substantiate the efficacy and advantages of our approach.
研究了具有未知符号交换虚拟控制系数和不匹配干扰的下三角形系统的高性能跟踪控制问题。采用一组方向函数来处理未知的切换信号虚拟控制系数,而不是采用在线估计算法、滑模方法和努斯鲍姆增益技术。将控制律与方向函数和障碍函数以递归方式组合起来。它实现输出跟踪与预分配的速率,超调,和精度。与已有的解相比,该方法对几乎无模型的情况是有效的,既不需要系统非线性信息,也不需要对象的边界函数信息,也不需要扰动的边界信息。此外,我们的控制器具有显著的简单性,无需参数识别,干扰估计,函数逼近,导数计算,动态曲面或命令滤波。通过两个仿真实例验证了该方法的有效性和优越性。
{"title":"Prescribed Performance Control of Nonlinear Systems With Unknown Sign-Switching Virtual Control Coefficients","authors":"Jin-Zi Yang;Jin-Xi Zhang;Tianyou Chai","doi":"10.1109/JAS.2025.125135","DOIUrl":"https://doi.org/10.1109/JAS.2025.125135","url":null,"abstract":"The problem of high-performance tracking control for the lower-triangular systems with unknown sign-switching virtual control coefficients as well as unmatched disturbances is investigated in this paper. Instead of the online estimation algorithm, the sliding mode method and the Nussbaum gain technique, a group of orientation functions are employed to handle the unknown sign-switching virtual control coefficients. The control law is combined with the orientation functions and the barrier functions lumped in a recursive manner. It achieves output tracking with the preassigned rate, overshoot, and accuracy. In contrast with the existing solutions, it is effective for the nearly model-free case, with the requirement for information of neither the system nonlinearities nor their bounding functions of the plant, nor the bounds of the disturbances. In addition, our controller exhibits significant simplicity, without parameter identification, disturbance estimation, function approximation, derivative calculation, dynamic surfaces, or command filtering. Two simulation examples are conducted to substantiate the efficacy and advantages of our approach.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1381-1390"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Experiments: Generative Causal Inference Powered by LLM-Based Agents Simulation and RAG-Based Domain Docking 联邦实验:基于llm的agent仿真和基于rag的领域对接驱动的生成因果推理
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.124671
De-Yu Zhou;Xiao Xue;Qun Ma;Chao Guo;Li-Zhen Cui;Yong-Lin Tian;Jing Yang;Fei-Yue Wang
Computational experiments method is an essential tool for analyzing, designing, managing, and integrating complex systems. However, a significant challenge arises in constructing agents with human-like characteristics to form an AI society. Agent modeling typically encompasses four levels: 1) The autonomy features of agents, e.g., perception, behavior, and decision-making; 2) The evolutionary features of agents, e.g., bounded rationality, heterogeneity, and learning evolution; 3) The social features of agents, e.g., interaction, cooperation, and competition; 4) The emergent features of agents, e.g., gaming with environments or regulatory strategies. Traditional modeling techniques primarily derive from ABMs (Agent-based Models) and incorporate various emerging technologies (e.g., machine learning, big data, and social networks), which can enhance modeling capabilities, while amplifying the complexity [1].
计算实验方法是分析、设计、管理和集成复杂系统的重要工具。然而,在构建具有人类特征的智能体以形成人工智能社会方面,出现了一个重大挑战。智能体建模通常包括四个层次:1)智能体的自主性特征,如感知、行为和决策;2)智能体的进化特征,如有限理性、异质性和学习进化;3)主体的社会特征,如互动、合作、竞争等;4)代理的突现特征,例如,与环境或监管策略的博弈。传统的建模技术主要来源于ABMs(基于代理的模型),并结合了各种新兴技术(如机器学习、大数据和社交网络),这些技术可以增强建模能力,同时放大复杂性[1]。
{"title":"Federated Experiments: Generative Causal Inference Powered by LLM-Based Agents Simulation and RAG-Based Domain Docking","authors":"De-Yu Zhou;Xiao Xue;Qun Ma;Chao Guo;Li-Zhen Cui;Yong-Lin Tian;Jing Yang;Fei-Yue Wang","doi":"10.1109/JAS.2024.124671","DOIUrl":"https://doi.org/10.1109/JAS.2024.124671","url":null,"abstract":"Computational experiments method is an essential tool for analyzing, designing, managing, and integrating complex systems. However, a significant challenge arises in constructing agents with human-like characteristics to form an AI society. Agent modeling typically encompasses four levels: 1) The autonomy features of agents, e.g., perception, behavior, and decision-making; 2) The evolutionary features of agents, e.g., bounded rationality, heterogeneity, and learning evolution; 3) The social features of agents, e.g., interaction, cooperation, and competition; 4) The emergent features of agents, e.g., gaming with environments or regulatory strategies. Traditional modeling techniques primarily derive from ABMs (Agent-based Models) and incorporate various emerging technologies (e.g., machine learning, big data, and social networks), which can enhance modeling capabilities, while amplifying the complexity [1].","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1301-1304"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11062603","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learning-Based Passive Resilient Controller for Cyber-Physical Systems: Countering Stealthy Deception Attacks and Complete Loss of Actuators Control Authority 一种基于学习的网络物理系统被动弹性控制器:对抗隐形欺骗攻击和执行器控制权限完全丧失
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.124683
Liang Xin;Zhi-Qiang Long
Cyber-physical systems (CPSs) are increasingly vulnerable to cyber-attacks due to their integral connection between cyberspace and the physical world, which is augmented by Internet connectivity. This vulnerability necessitates a heightened focus on developing resilient control mechanisms for CPSs. However, current observer-based active compensation resilient controllers exhibit poor performance against stealthy deception attacks (SDAs) due to the difficulty in accurately reconstructing system states because of the stealthy nature of these attacks. Moreover, some non-active compensation approaches are insufficient when there is a complete loss of actuator control authority. To address these issues, we introduce a novel learning-based passive resilient controller (LPRC). Our approach, unlike observer-based state reconstruction, shows enhanced effectiveness in countering SDAs. We developed a safety state set, represented by an ellipsoid, to ensure CPS stability under SDA conditions, maintaining system trajectories within this set. Additionally, by employing deep reinforcement learning (DRL), the LPRC acquires the capacity to adapt and diverse evolving attack strategies. To empirically substantiate our methodology, various attack methods were compared with current passive and active compensation resilient control methods to evaluate their performance.
网络物理系统(cps)越来越容易受到网络攻击,因为它们将网络空间与物理世界联系在一起,而互联网的连接又增强了这种联系。这一脆弱性需要高度重视为cps开发有弹性的控制机制。然而,目前基于观测器的主动补偿弹性控制器在面对隐身欺骗攻击(SDAs)时表现出较差的性能,这是由于这些攻击的隐蔽性导致难以准确重建系统状态。此外,当执行器控制权限完全丧失时,一些非主动补偿方法是不够的。为了解决这些问题,我们引入了一种新的基于学习的被动弹性控制器(LPRC)。与基于观测器的状态重建不同,我们的方法在对抗sda方面显示出更高的有效性。我们开发了一个由椭球表示的安全状态集,以确保CPS在SDA条件下的稳定性,并在该集合内保持系统轨迹。此外,通过采用深度强化学习(DRL), LPRC获得了适应和多样化不断发展的攻击策略的能力。为了实证验证我们的方法,我们将各种攻击方法与现有的被动和主动补偿弹性控制方法进行了比较,以评估其性能。
{"title":"A Learning-Based Passive Resilient Controller for Cyber-Physical Systems: Countering Stealthy Deception Attacks and Complete Loss of Actuators Control Authority","authors":"Liang Xin;Zhi-Qiang Long","doi":"10.1109/JAS.2024.124683","DOIUrl":"https://doi.org/10.1109/JAS.2024.124683","url":null,"abstract":"Cyber-physical systems (CPSs) are increasingly vulnerable to cyber-attacks due to their integral connection between cyberspace and the physical world, which is augmented by Internet connectivity. This vulnerability necessitates a heightened focus on developing resilient control mechanisms for CPSs. However, current observer-based active compensation resilient controllers exhibit poor performance against stealthy deception attacks (SDAs) due to the difficulty in accurately reconstructing system states because of the stealthy nature of these attacks. Moreover, some non-active compensation approaches are insufficient when there is a complete loss of actuator control authority. To address these issues, we introduce a novel learning-based passive resilient controller (LPRC). Our approach, unlike observer-based state reconstruction, shows enhanced effectiveness in countering SDAs. We developed a safety state set, represented by an ellipsoid, to ensure CPS stability under SDA conditions, maintaining system trajectories within this set. Additionally, by employing deep reinforcement learning (DRL), the LPRC acquires the capacity to adapt and diverse evolving attack strategies. To empirically substantiate our methodology, various attack methods were compared with current passive and active compensation resilient control methods to evaluate their performance.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1368-1380"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DoS Attack Schedules for Remote State Estimation in CPSs with Two-Hop Relay Networks Under Round-Robin Protocol 轮循协议下两跳中继网络cps远程状态估计的DoS攻击调度
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.124755
Shuo Zhang;Lei Miao;Xudong Zhao
Dear Editor, This letter investigates the optimal denial-of-service (DoS) attack scheduling targeting state estimation in cyber-Physical systems (CPSs) with the two-hop multi-channel network. CPSs are designed to achieve efficient, secure and adaptive operation by embedding intelligent and autonomous decision-making capabilities in the physical world. As a key component of the CPSs, the wireless network is vulnerable to various malicious attacks due to its openness [1]. DoS attack is one of the most common attacks, characterized of simple execution and significant destructiveness [2]. To mitigate the economic losses and environmental damage caused by DoS attacks, it is crucial to model and investigate data transmissions in CPSs.
这封信研究了两跳多通道网络中网络物理系统(cps)中针对状态估计的最优拒绝服务(DoS)攻击调度。cps旨在通过在物理世界中嵌入智能和自主决策能力来实现高效、安全和自适应的操作。无线网络作为cps的关键组成部分,由于其开放性b[1],极易受到各种恶意攻击。DoS攻击是最常见的攻击之一,具有执行简单、破坏性大等特点。为了减轻DoS攻击造成的经济损失和环境破坏,对cps中的数据传输进行建模和研究至关重要。
{"title":"DoS Attack Schedules for Remote State Estimation in CPSs with Two-Hop Relay Networks Under Round-Robin Protocol","authors":"Shuo Zhang;Lei Miao;Xudong Zhao","doi":"10.1109/JAS.2024.124755","DOIUrl":"https://doi.org/10.1109/JAS.2024.124755","url":null,"abstract":"Dear Editor, This letter investigates the optimal denial-of-service (DoS) attack scheduling targeting state estimation in cyber-Physical systems (CPSs) with the two-hop multi-channel network. CPSs are designed to achieve efficient, secure and adaptive operation by embedding intelligent and autonomous decision-making capabilities in the physical world. As a key component of the CPSs, the wireless network is vulnerable to various malicious attacks due to its openness [1]. DoS attack is one of the most common attacks, characterized of simple execution and significant destructiveness [2]. To mitigate the economic losses and environmental damage caused by DoS attacks, it is crucial to model and investigate data transmissions in CPSs.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1513-1515"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11062713","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Large-Scale Multiagent Deep Reinforcement Learning Method for Coordinated Automatic Generation Control of Integrated Energy Systems in a Performance-Based Frequency Regulation Market 基于性能的频率调节市场中集成能源系统协调自动发电控制的鲁棒大规模多智能体深度强化学习方法
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.124482
Jiawen Li;Tao Zhou
To enhance the frequency stability and lower the regulation mileage payment of a multiarea integrated energy system (IES) that supports the power Internet of Things (IoT), this paper proposes a data-driven cooperative method for automatic generation control (AGC). The method consists of adaptive fractional-order proportional-integral (FOPI) controllers and a novel efficient integration exploration multiagent twin delayed deep deterministic policy gradient (EIE-MATD3) algorithm. The FOPI controllers are designed for each area based on the performance-based frequency regulation market mechanism. The EIE-MATD3 algorithm is used to tune the coefficients of the FOPI controllers in real time using centralized training and decentralized execution. The algorithm incorporates imitation learning and efficient integration exploration to obtain a more robust coordinated control strategy. An experiment on the four-area China Southern Grid (CSG) real-time digital system shows that the proposed method can improve the control performance and reduce the regulation mileage payment of each area in the IES.
为了提高支持电力物联网的多区域集成能源系统(IES)的频率稳定性和降低调节里程支付,提出了一种数据驱动的自动发电控制(AGC)协同方法。该方法由自适应分数阶比例积分(FOPI)控制器和一种新的高效集成探索多智能体双延迟深度确定性策略梯度(EIE-MATD3)算法组成。基于基于性能的频率调节市场机制,为每个区域设计了FOPI控制器。采用EIE-MATD3算法集中训练、分散执行,实时调整FOPI控制器的系数。该算法结合了模仿学习和高效的集成探索,获得了更鲁棒的协调控制策略。在南方电网四区实时数字系统上进行的实验表明,该方法可以提高控制性能,降低电网各区域的调节里程支付。
{"title":"A Robust Large-Scale Multiagent Deep Reinforcement Learning Method for Coordinated Automatic Generation Control of Integrated Energy Systems in a Performance-Based Frequency Regulation Market","authors":"Jiawen Li;Tao Zhou","doi":"10.1109/JAS.2024.124482","DOIUrl":"https://doi.org/10.1109/JAS.2024.124482","url":null,"abstract":"To enhance the frequency stability and lower the regulation mileage payment of a multiarea integrated energy system (IES) that supports the power Internet of Things (IoT), this paper proposes a data-driven cooperative method for automatic generation control (AGC). The method consists of adaptive fractional-order proportional-integral (FOPI) controllers and a novel efficient integration exploration multiagent twin delayed deep deterministic policy gradient (EIE-MATD3) algorithm. The FOPI controllers are designed for each area based on the performance-based frequency regulation market mechanism. The EIE-MATD3 algorithm is used to tune the coefficients of the FOPI controllers in real time using centralized training and decentralized execution. The algorithm incorporates imitation learning and efficient integration exploration to obtain a more robust coordinated control strategy. An experiment on the four-area China Southern Grid (CSG) real-time digital system shows that the proposed method can improve the control performance and reduce the regulation mileage payment of each area in the IES.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1475-1488"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Identification in the Network Era: A Survey of Data Issues and Innovative Approaches 网络时代的系统识别:数据问题与创新方法综述
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.125109
Qing-Guo Wang;Liang Zhang
System identification is a data-driven modeling technique that originates from the control field. It constructs models from data to mimic the behavior of dynamic systems. However, in the network era, scenarios such as sensor malfunctions, packet loss, cyber-attacks, and big data affect the quality, integrity, and security of the data. These data issues pose significant challenges to traditional system identification methods. This paper presents a comprehensive survey of the emergent challenges and advances in system identification in the network era. It explores cutting-edge methodologies to address data issues such as data loss, outliers, noise and nonlinear system identification for complex systems. To tackle the data loss, the methods based on imputation and likelihood-based inference (e.g., expectation maximization) have been employed. For outliers and noise, methods like robust regression (e.g., least median of squares, least trimmed squares) and low-rank matrix decomposition show progress in maintaining data integrity. Nonlinear system identification has advanced through kernel-based methods and neural networks, which can model complex data patterns. Finally, this paper provides valuable insights into potential directions for future research.
系统识别是一种起源于控制领域的数据驱动建模技术。它从数据中构建模型来模拟动态系统的行为。但在网络时代,传感器故障、丢包、网络攻击、大数据等场景会影响数据的质量、完整性和安全性。这些数据问题对传统的系统识别方法提出了重大挑战。本文全面介绍了网络时代系统识别的新挑战和新进展。它探讨了前沿的方法来解决数据问题,如数据丢失,异常值,噪声和复杂系统的非线性系统识别。为了解决数据丢失问题,采用了基于imputation和基于似然推理(如期望最大化)的方法。对于异常值和噪声,鲁棒回归(例如,最小平方中位数,最小裁剪平方)和低秩矩阵分解等方法在保持数据完整性方面取得了进展。非线性系统辨识主要通过基于核的方法和神经网络进行,这些方法可以对复杂的数据模式进行建模。最后,本文对未来的研究方向提出了有价值的见解。
{"title":"System Identification in the Network Era: A Survey of Data Issues and Innovative Approaches","authors":"Qing-Guo Wang;Liang Zhang","doi":"10.1109/JAS.2024.125109","DOIUrl":"https://doi.org/10.1109/JAS.2024.125109","url":null,"abstract":"System identification is a data-driven modeling technique that originates from the control field. It constructs models from data to mimic the behavior of dynamic systems. However, in the network era, scenarios such as sensor malfunctions, packet loss, cyber-attacks, and big data affect the quality, integrity, and security of the data. These data issues pose significant challenges to traditional system identification methods. This paper presents a comprehensive survey of the emergent challenges and advances in system identification in the network era. It explores cutting-edge methodologies to address data issues such as data loss, outliers, noise and nonlinear system identification for complex systems. To tackle the data loss, the methods based on imputation and likelihood-based inference (e.g., expectation maximization) have been employed. For outliers and noise, methods like robust regression (e.g., least median of squares, least trimmed squares) and low-rank matrix decomposition show progress in maintaining data integrity. Nonlinear system identification has advanced through kernel-based methods and neural networks, which can model complex data patterns. Finally, this paper provides valuable insights into potential directions for future research.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1305-1319"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Knowledge-Guided Self-Evolving Intelligent Behavioral Control for Autonomous Vehicles 基于知识引导的自动驾驶汽车高效自进化智能行为控制
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2024.124746
Qiao Peng;Kailong Liu;Jingda Wu;Amir Khajepour
Dear Editor, This letter addresses the enhancement of autonomous vehicles' (AVs) behavior control systems through the application of reinforcement learning (RL) techniques. It presents a novel approach to efficient knowledge-guided self-evolutionary intelligent decision-making by integrating human intervention as prior knowledge into the RL's exploratory learning process. Specifically, we propose an innovative intervention-based reward shaping mechanism and develop a novel experience replay mechanism to augment the efficiency of leveraging guided knowledge within the framework of off-policy RL. The proposed methodology significantly enhances the performance of RL-based behavior control strategies in complex scenarios for AVs. Illustrative results indicate that, relative to existing state-of-the-art methods, our approach yields superior learning efficiency and improved autonomous driving performance.
亲爱的编辑:这封信旨在通过应用强化学习(RL)技术来增强自动驾驶汽车(av)的行为控制系统。通过将人为干预作为先验知识整合到RL的探索性学习过程中,提出了一种有效的知识引导自进化智能决策的新方法。具体而言,我们提出了一种创新的基于干预的奖励形成机制,并开发了一种新的经验重放机制,以提高在非政策强化学习框架内利用指导性知识的效率。该方法显著提高了基于强化学习的自动驾驶汽车复杂场景行为控制策略的性能。说明性结果表明,相对于现有的最先进的方法,我们的方法产生了卓越的学习效率和改进的自动驾驶性能。
{"title":"Efficient Knowledge-Guided Self-Evolving Intelligent Behavioral Control for Autonomous Vehicles","authors":"Qiao Peng;Kailong Liu;Jingda Wu;Amir Khajepour","doi":"10.1109/JAS.2024.124746","DOIUrl":"https://doi.org/10.1109/JAS.2024.124746","url":null,"abstract":"Dear Editor, This letter addresses the enhancement of autonomous vehicles' (AVs) behavior control systems through the application of reinforcement learning (RL) techniques. It presents a novel approach to efficient knowledge-guided self-evolutionary intelligent decision-making by integrating human intervention as prior knowledge into the RL's exploratory learning process. Specifically, we propose an innovative intervention-based reward shaping mechanism and develop a novel experience replay mechanism to augment the efficiency of leveraging guided knowledge within the framework of off-policy RL. The proposed methodology significantly enhances the performance of RL-based behavior control strategies in complex scenarios for AVs. Illustrative results indicate that, relative to existing state-of-the-art methods, our approach yields superior learning efficiency and improved autonomous driving performance.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1522-1524"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11062710","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Consensus Control on Multi-Agent Systems Based on Improved PBFT and Raft Blockchain Consensus Algorithms 基于改进PBFT和Raft区块链共识算法的多智能体系统安全共识控制
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-07-01 DOI: 10.1109/JAS.2025.125300
Jing Zhu;Chengfang Lu;Juanjuan Li;Fei-Yue Wang
There has been significant recent research on secure control problems that arise from the open and complex real-world industrial environments. This paper focuses on addressing the issue of secure consensus control in multi-agent systems (MASs) under malicious attacks, utilizing the practical Byzantine fault tolerance (PBFT) and Raft consensus algorithm in blockchain. Unlike existing secure consensus control algorithms that have strict requirements for topology and high communication costs, our approach introduces a node grouping methodology based on system topology. Additionally, we utilize the PBFT consensus algorithm for intergroup leader identity verification, effectively reducing the communication complexity of PBFT in large-scale networks. Furthermore, we enhance the Raft algorithm through cryptographic validation during followers' log replication, which enhances the security of the system. Our proposed consensus process not only identifies the identities of malicious agents but also ensures consensus among normal agents. Through extensive simulations, we demonstrate robust convergence, particularly in scenarios with the relaxed topological requirements. Comparative experiments also validate the algorithm's lower consensus latency and improved efficiency compared to direct PBFT utilization for identity verification and classical secure consensus control method mean subsequence reduced (MSR) algorithm.
在开放和复杂的现实工业环境中出现的安全控制问题最近得到了大量的研究。本文利用区块链中的实用拜占庭容错(PBFT)和Raft共识算法,重点研究了恶意攻击下多智能体系统(MASs)的安全共识控制问题。现有的安全共识控制算法对拓扑有严格的要求,通信成本高,与此不同,我们的方法引入了一种基于系统拓扑的节点分组方法。此外,我们利用PBFT共识算法进行群间领导身份验证,有效降低了大规模网络中PBFT的通信复杂度。此外,我们在关注者日志复制过程中通过加密验证对Raft算法进行了改进,提高了系统的安全性。我们提出的共识过程不仅可以识别恶意代理的身份,还可以确保正常代理之间的共识。通过大量的仿真,我们证明了鲁棒收敛性,特别是在拓扑要求宽松的情况下。与直接利用PBFT进行身份验证和经典的安全共识控制方法mean子序列减少(MSR)算法相比,对比实验也验证了该算法具有更低的共识延迟和更高的效率。
{"title":"Secure Consensus Control on Multi-Agent Systems Based on Improved PBFT and Raft Blockchain Consensus Algorithms","authors":"Jing Zhu;Chengfang Lu;Juanjuan Li;Fei-Yue Wang","doi":"10.1109/JAS.2025.125300","DOIUrl":"https://doi.org/10.1109/JAS.2025.125300","url":null,"abstract":"There has been significant recent research on secure control problems that arise from the open and complex real-world industrial environments. This paper focuses on addressing the issue of secure consensus control in multi-agent systems (MASs) under malicious attacks, utilizing the practical Byzantine fault tolerance (PBFT) and Raft consensus algorithm in blockchain. Unlike existing secure consensus control algorithms that have strict requirements for topology and high communication costs, our approach introduces a node grouping methodology based on system topology. Additionally, we utilize the PBFT consensus algorithm for intergroup leader identity verification, effectively reducing the communication complexity of PBFT in large-scale networks. Furthermore, we enhance the Raft algorithm through cryptographic validation during followers' log replication, which enhances the security of the system. Our proposed consensus process not only identifies the identities of malicious agents but also ensures consensus among normal agents. Through extensive simulations, we demonstrate robust convergence, particularly in scenarios with the relaxed topological requirements. Comparative experiments also validate the algorithm's lower consensus latency and improved efficiency compared to direct PBFT utilization for identity verification and classical secure consensus control method mean subsequence reduced (MSR) algorithm.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1407-1417"},"PeriodicalIF":15.3,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Optimization Control for Cyber-Physical Systems Subject to Jamming Attack: A Nested Game Approach 受干扰攻击的网络物理系统鲁棒优化控制:一种嵌套博弈方法
IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-06-16 DOI: 10.1109/JAS.2023.123873
Min Shi;Yuan Yuan
Dear Editor, With the advances in computing and communication technologies, the cyber-physical system (CPS), has been used in lots of industrial fields, such as the urban water cycle, internet of things, and human-cyber systems [1], [2], which has to face up to malicious cyber-attacks towards cyber communication of control commands. Specifically, jamming attack is regarded as one of the most common attacks of decreasing network performance. Game theory is widely regarded as a method of accurately describing the interaction between jamming attacker and legitimate user [3]. In the cyber layer, the signal game model has been utilized to describe the transmission between the attacker and defender [4]. However, most previous game theoretical researches are not feasible to meet the demands of industrial CPSs mainly due to the shared communication network nature. Specifically, it leads to incomplete information for players of game owing to various network-induced phenomena and employed communication protocols. In the physical layer, the secure control [5] and estimation [6] under attack detection have been studied for CPSs. However, these methods not only rely heavily on signals injection detection, but also have no access to smart attackers who launch covert attacks so that data receivers cannot observe the attack behaviour [7]. Accordingly, the motivation arising here is to tackle the nested game problem for CPSs subject to jamming attack.
随着计算和通信技术的进步,网络物理系统(CPS)已经应用于许多工业领域,如城市水循环,物联网,人机系统[1],b[2],它不得不面对恶意网络攻击的控制命令的网络通信。其中,干扰攻击被认为是最常见的降低网络性能的攻击之一。博弈论被广泛认为是一种准确描述干扰攻击者与合法用户[3]之间相互作用的方法。在网络层,利用信号博弈模型来描述攻击者和防御者[4]之间的传输。然而,由于共享通信网络的特性,以往的博弈论研究大多无法满足工业cps的需求。具体而言,由于各种网络诱导现象和所采用的通信协议,导致游戏玩家的信息不完全。在物理层,研究了cps在攻击检测下的安全控制[5]和估计[6]。然而,这些方法不仅严重依赖于信号注入检测,而且无法接触到发起隐蔽攻击的智能攻击者,使得数据接收者无法观察到攻击行为[7]。因此,这里产生的动机是解决受干扰攻击的cps的嵌套游戏问题。
{"title":"Robust Optimization Control for Cyber-Physical Systems Subject to Jamming Attack: A Nested Game Approach","authors":"Min Shi;Yuan Yuan","doi":"10.1109/JAS.2023.123873","DOIUrl":"https://doi.org/10.1109/JAS.2023.123873","url":null,"abstract":"Dear Editor, With the advances in computing and communication technologies, the cyber-physical system (CPS), has been used in lots of industrial fields, such as the urban water cycle, internet of things, and human-cyber systems [1], [2], which has to face up to malicious cyber-attacks towards cyber communication of control commands. Specifically, jamming attack is regarded as one of the most common attacks of decreasing network performance. Game theory is widely regarded as a method of accurately describing the interaction between jamming attacker and legitimate user [3]. In the cyber layer, the signal game model has been utilized to describe the transmission between the attacker and defender [4]. However, most previous game theoretical researches are not feasible to meet the demands of industrial CPSs mainly due to the shared communication network nature. Specifically, it leads to incomplete information for players of game owing to various network-induced phenomena and employed communication protocols. In the physical layer, the secure control [5] and estimation [6] under attack detection have been studied for CPSs. However, these methods not only rely heavily on signals injection detection, but also have no access to smart attackers who launch covert attacks so that data receivers cannot observe the attack behaviour [7]. Accordingly, the motivation arising here is to tackle the nested game problem for CPSs subject to jamming attack.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 6","pages":"1286-1288"},"PeriodicalIF":15.3,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11036661","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144299410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ieee-Caa Journal of Automatica Sinica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1