Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the ef...Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the effect of DoS attacks,the effective intervals of the attack are redivided based on the sampling period.展开更多
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett...Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is launched.Specifically, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them.展开更多
With the increasing intelligence and integration,a great number of two-valued variables(generally stored in the form of 0 or 1)often exist in large-scale industrial processes.However,these variables cannot be effectiv...With the increasing intelligence and integration,a great number of two-valued variables(generally stored in the form of 0 or 1)often exist in large-scale industrial processes.However,these variables cannot be effectively handled by traditional monitoring methods such as linear discriminant analysis(LDA),principal component analysis(PCA)and partial least square(PLS)analysis.Recently,a mixed hidden naive Bayesian model(MHNBM)is developed for the first time to utilize both two-valued and continuous variables for abnormality monitoring.Although the MHNBM is effective,it still has some shortcomings that need to be improved.For the MHNBM,the variables with greater correlation to other variables have greater weights,which can not guarantee greater weights are assigned to the more discriminating variables.In addition,the conditional P(x j|x j′,y=k)probability must be computed based on historical data.When the training data is scarce,the conditional probability between continuous variables tends to be uniformly distributed,which affects the performance of MHNBM.Here a novel feature weighted mixed naive Bayes model(FWMNBM)is developed to overcome the above shortcomings.For the FWMNBM,the variables that are more correlated to the class have greater weights,which makes the more discriminating variables contribute more to the model.At the same time,FWMNBM does not have to calculate the conditional probability between variables,thus it is less restricted by the number of training data samples.Compared with the MHNBM,the FWMNBM has better performance,and its effectiveness is validated through numerical cases of a simulation example and a practical case of the Zhoushan thermal power plant(ZTPP),China.展开更多
Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is...Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is proposed and analyzed in this study.In this scheme,the interactions between selfish users and an operator are characterized as a Stackelberg game.Operator holds a large-scale ESS that is shared among users in the form of energy transactions.It sells energy to users and sets the selling price first.It maximizes its profit through optimal pricing and ESS dispatching.Users purchase some energy from operator for the reduction of their demand charges after operator's selling price is announced.This game-theoretic ESS sharing scheme is characterized and analyzed by formulating and solving a bi-level optimization model.The upper-level optimization maximizes operator's profit and the lower-level optimization minimizes users'costs.The bi-level model is transformed and linearized into a mixed-integer linear programming(MILP)model using the mathematical programming with equilibrium constraints(MPEC)method and model linearizing techniques.Case studies with actual data are carried out to explore the economic performances of the proposed ESS sharing scheme.展开更多
Mobile robots are often subject to multiplicative noise in the target tracking tasks,where the multiplicative measurement noise is correlated with additive measurement noise.In this paper,first,a correlation multiplic...Mobile robots are often subject to multiplicative noise in the target tracking tasks,where the multiplicative measurement noise is correlated with additive measurement noise.In this paper,first,a correlation multiplicative measurement noise model is established.It is able to more accurately represent the measurement error caused by the distance sensor dependence state.Then,the estimated performance mismatch problem of Cubature Kalman Filter(CKF)under multiplicative noise is analyzed.An improved Gaussian filter algorithm is introduced to help obtain the CKF algorithm with correlated multiplicative noise.In practice,the model parameters are unknown or inaccurate,especially the correlation of noise is difficult to obtain,which can lead to a decrease in filtering accuracy or even divergence.To address this,an adaptive CKF algorithm is further provided to achieve reliable state estimation for the unknown noise correlation coefficient and thus the application of the CKF algorithm is extended.Finally,the estimated performance is analyzed theoretically,and the simulation study is conducted to validate the effectiveness of the proposed algorithm.展开更多
基金supported in part by the National Natural Science Foundation of China(62203064,62203065,62303069)the Open Fund of Institute of Ocean Research of Bohai University(BDHYYJY2023017)。
文摘Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the effect of DoS attacks,the effective intervals of the attack are redivided based on the sampling period.
基金supported in part by the Guizhou Provincial Science and Technology Projects(ZK[2022]149)the Guizhou Provincial Research Project for Universities([2022]104)+2 种基金the Special Foundation of Guizhou University([2021]47)the GZU cultivation project of National Natural Science Foundation of China([2020]80)Shanghai Engineering Research Center of Big Data Management,and the National Natural Science Foundation of China(62073285,62061130220)。
文摘Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is launched.Specifically, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them.
基金supported by the National Natural Science Foundation of China(62033008,61873143)。
文摘With the increasing intelligence and integration,a great number of two-valued variables(generally stored in the form of 0 or 1)often exist in large-scale industrial processes.However,these variables cannot be effectively handled by traditional monitoring methods such as linear discriminant analysis(LDA),principal component analysis(PCA)and partial least square(PLS)analysis.Recently,a mixed hidden naive Bayesian model(MHNBM)is developed for the first time to utilize both two-valued and continuous variables for abnormality monitoring.Although the MHNBM is effective,it still has some shortcomings that need to be improved.For the MHNBM,the variables with greater correlation to other variables have greater weights,which can not guarantee greater weights are assigned to the more discriminating variables.In addition,the conditional P(x j|x j′,y=k)probability must be computed based on historical data.When the training data is scarce,the conditional probability between continuous variables tends to be uniformly distributed,which affects the performance of MHNBM.Here a novel feature weighted mixed naive Bayes model(FWMNBM)is developed to overcome the above shortcomings.For the FWMNBM,the variables that are more correlated to the class have greater weights,which makes the more discriminating variables contribute more to the model.At the same time,FWMNBM does not have to calculate the conditional probability between variables,thus it is less restricted by the number of training data samples.Compared with the MHNBM,the FWMNBM has better performance,and its effectiveness is validated through numerical cases of a simulation example and a practical case of the Zhoushan thermal power plant(ZTPP),China.
基金supported by the National Natural Science Foundation of China(U21A20478)Zhejiang Provincial Nature Science Foundation of China(LZ21F030004)Key-Area Research and Development Program of Guangdong Province(2018B010107002)。
文摘Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is proposed and analyzed in this study.In this scheme,the interactions between selfish users and an operator are characterized as a Stackelberg game.Operator holds a large-scale ESS that is shared among users in the form of energy transactions.It sells energy to users and sets the selling price first.It maximizes its profit through optimal pricing and ESS dispatching.Users purchase some energy from operator for the reduction of their demand charges after operator's selling price is announced.This game-theoretic ESS sharing scheme is characterized and analyzed by formulating and solving a bi-level optimization model.The upper-level optimization maximizes operator's profit and the lower-level optimization minimizes users'costs.The bi-level model is transformed and linearized into a mixed-integer linear programming(MILP)model using the mathematical programming with equilibrium constraints(MPEC)method and model linearizing techniques.Case studies with actual data are carried out to explore the economic performances of the proposed ESS sharing scheme.
基金supported by the National Natural Science Foundation of China(Nos.61773147 and 62033010)Zhejiang Provincial Nature Science Foundation of China(Nos.LR17F030005 and LZ21F030004)Key-Area Research and Development Program of Guangdong Province,china(No.2018B010107002)。
文摘Mobile robots are often subject to multiplicative noise in the target tracking tasks,where the multiplicative measurement noise is correlated with additive measurement noise.In this paper,first,a correlation multiplicative measurement noise model is established.It is able to more accurately represent the measurement error caused by the distance sensor dependence state.Then,the estimated performance mismatch problem of Cubature Kalman Filter(CKF)under multiplicative noise is analyzed.An improved Gaussian filter algorithm is introduced to help obtain the CKF algorithm with correlated multiplicative noise.In practice,the model parameters are unknown or inaccurate,especially the correlation of noise is difficult to obtain,which can lead to a decrease in filtering accuracy or even divergence.To address this,an adaptive CKF algorithm is further provided to achieve reliable state estimation for the unknown noise correlation coefficient and thus the application of the CKF algorithm is extended.Finally,the estimated performance is analyzed theoretically,and the simulation study is conducted to validate the effectiveness of the proposed algorithm.