首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
In this paper, the problem about the false data injection attacks on sensors to degrade the state estimation performance in cyber-physical systems(CPSs) is investigated. The attack strategies for unstable systems and stable ones are both designed. For unstable systems, based on the idea of zero dynamics, an unbounded attack strategy is proposed which can drive the state estimation error variations to infinity. The proposed method is more general than existing unbounded attack strategies since it relaxes the requirement for the initial value of the estimation error. For stable systems, it is difficult to bring unbounded impacts on the estimation error variations. Therefore, in this case, an attack strategy with adjustable attack performance which makes the estimation error variations track predesigned target values is proposed. Furthermore, a uniform attack strategy which aims to deteriorate state estimation for both stable systems and unstable ones is derived. Finally, simulations are provided to illustrate the effectiveness of the proposed attack strategies.  相似文献   

3.
This paper is concerned with a security problem about malicious integrity attacks in state estimation system, in which multiple smart sensors locally measure information and transmit it to a remote fusion estimator though wireless channels. A joint constraint is considered for the attacker behaviour in each channel to keep stealthiness under a residual-based detector on the remote side. In order to degrade the estimator performance, the attacker will maximize the trace of the remote state estimation error covariance which is derived based on Kalman filter theory. It is proved that the optimal linear attack strategy design problem is convex and finally turned into a semi-definite programming problem. In addition, the tendency of attack behaviour on recursive and fixed Kalman filter system is analyzed. Several examples are given to illustrate the theoretical results.  相似文献   

4.
In this paper, we consider a malicious attack issue against remote state estimation in cyber-physical systems. Due to the limited energy, the sensor adopts an acknowledgment-based (ACK-based) online power schedule to improve the remote state estimation. However, the feedback channel will also increase the risk of being attacked. The malicious attacker has the ability to intercept the ACK information and modify the ACK signals (ACKs) from the remote estimator. It could induce the sensor to make poor decisions while maintaining the observed data packet acceptance rate to keep the attacker undetected. To maximize the estimation error, the attacker will select appropriate attack times so that the sensor makes bad decisions. The optimal attack strategy based on the true ACKs and the corrosion ACKs is analytically proposed. The optimal attack time to modify the ACKs is the time when the sensor’s tolerance, i.e., the number of consecutive data packet losses allowed, is about to reach the maximum. In addition, such an optimal attack strategy is independent of the system parameters. Numerical simulations are provided to demonstrate the analytical results.  相似文献   

5.
在考虑随机因素干扰的情形下,通过建立一个随机微分博弈模型研究了产学研协同创新主体间的知识共享问题。运用动态规划方法分别求得了Stackelberg主从博弈和协同合作博弈两种下均衡的知识共享策略和创新补贴比例,并对两种博弈模式下的均衡结果进行了比较。比较结果显示:(1)在Stackelberg主从博弈和协同合作博弈两种模式下,知识共享的成本及其创新能力、知识共享的边际收益及其折旧率对创新主体共享的知识量产生重要影响,当知识共享的成本及其折旧率提高时,共享的知识量将减少;当知识创新能力及其共享的边际收益提升时,共享的知识量将提高。(2)在协同合作博弈下,创新主体共享的知识量、知识创新系统的总收益、知识创新量的期望值和方差均高于Stackelberg主从博弈下的值。  相似文献   

6.
基于提前支付强度过程考察了固定利率抵押贷款合同的定价和市场均衡问题.将均衡问题描述成代表性抵押人与市场之间的博弈.均衡由市场决定的内生抵押贷款利率和抵押人的最优再融资策略描述.在时齐Markov链利率及正线性比例再融资成本假设下,抵押人的规划问题可以简化成一个仅包含三个离散状态变量的Markov决策链,且一定存在唯一解.从而,均衡可由一个抵押利率决定函数和抵押人的最优再融资策略组成.一个简单的数值例子说明了计算均衡的迭代算法.结果表明,抵押人选择再融资往往是不明智的短视行为.  相似文献   

7.
This paper develops a cooperative federated reinforcement learning (RL) strategy that enables two unmanned aerial vehicles (UAVs) to cooperate in learning and predicting the movements of an intelligent deceptive target in a given search area. The proposed strategy allows the UAVs to autonomously cooperate, through information exchange of the gained experience to maximize the target detection performance and accelerate the learning speed while maintaining privacy. Specifically, we consider a monitoring model that includes a search area, a charging station, two cooperative UAVs, an intelligent deceptive uncertain moving target, and a fake (false) target. Each UAV is equipped with a limited-capacity rechargeable battery and a communication unit for exchanging the gained experience. The problem of maximizing the detection probability of the uncertain deceptive target using cooperative UAVs is mathematically modeled as a search-benefit maximization problem, which is then reformulated as a Markov decision process (MDP) due to the uncertainty nature of the problem. Because there is no prior information on the targets’ movement, a cooperative RL, is utilized to tackle the problem. The proposed cooperative RL-based algorithm is a distributed collaborative mechanism that enables the two UAVs, i.e., agents, to individually interact with the operating environment and maximize their cumulative rewards by converging to a shared policy while achieving privacy. Simulation results indicate that a cooperative RL-based dual UAV system can noticeably improve the target detection probability, reduce the detection performance, and accelerate the learning speed.  相似文献   

8.
为了解各影响因素对于科技型小微企业合作倾向的影响机制,在分析平台型企业的组织结构和运作过程基础上,运用最优控制理论建立科技型小微企业间合作博弈的最优控制模型,通过Pontryagin极大值原理求出模型的纳什(Nash)均衡解,并通过调整科技型小微企业的数量观察共同平台总绩效变化,运用MATLAB仿真验证所建立模型的合理性与有效性。研究表明,在由大企业建立的共同平台内,科技型小微企业的绩效水平自增长系数、由于合作带来的绩效水平增长系数正向作用于合作绩效因子,绩效水平衰减系数、绩效成本系数、企业绩效系数反向作用于合作绩效因子,各种因素的共同作用对科技型小微企业的合作倾向产生影响;共同平台的总绩效随着平台内科技型小微企业数量的增加而增大。  相似文献   

9.
区域创新系统动态演化的博弈机制研究   总被引:1,自引:0,他引:1  
区域创新系统是企业与科研机构之间合作创新、学习决策和动态博弈的系统。为揭示区域创新系统演化的复杂性及其动态演化路径,把学习竞争模型和演化博弈模型引入区域创新系统动态演化研究来分析区域创新系统动态演化的初始条件、内在决定因素、动态环境下企业与科研机构合作创新过程以及合作创新模式的演变。分析表明:区域创新系统的演化方向与博弈双方的支付矩阵、学习行为和能力、系统演化的初始状态等相关,而科研机构与企业合作创新的协同收益、引致风险损失、初始成本以及双方的贴现因子则是影响区域创新系统动态演化的关键因素。  相似文献   

10.
This paper proposes an optimal three-dimensional (3-D) spatial-temporal cooperative guidance (STCG) law for intercepting a maneuvering target with impact angle and time constraints. The guidance problem is studied to achieve spatial cooperation for multi-directional attack in the normal channel and temporal cooperation for simultaneous interception in the tangential channel, respectively. Firstly, the 3-D optimal impact-angle-control guidance (OIACG) is introduced to formulate spatial interception geometry. Based on this law, the relative trajectory length is analytically derived and an accurate time-to-go predictor is formulated against maneuvering targets. In the tangential channel, an optimal temporal cooperative guidance is proposed by leveraging high-dimensional Schwarz inequality method. The proposed algorithm is believed to outperform the existing nonlinear cooperative guidance laws due to its optimality with specific performance index for minimizing the control expenditure. The convergence properties of the proposed STCG law are provided to facilitate its practical implementation. Comparison simulations and application under the realistic pursuer model and target estimation are performed to demonstrate the effectiveness and robustness of the proposed cooperative method.  相似文献   

11.
滕婕  胡广伟  王婷 《情报科学》2022,40(6):177-184
【目的/意义】新媒体环境下,多主体联合辟谣开创了辟谣的新模式。研究信息共享下不同主体的策略选择 依赖性,为联合辟谣主体做出科学决策提供理论依据。【方法/过程】考虑外界随机因素的影响和不同信息主体间策 略选择的依赖性,建立Stackelberg主从博弈和合作博弈随机微分模型,通过数值仿真,对两种协同模式进行最优均 衡分析。【结果/结论】辟谣信息的产生与信息共享的成本、信息共享的边际收益、辟谣信息影响和信息的衰减率有 关;合作博弈下信息共享量、系统收益以及辟谣信息产生量的期望和方差都高于 Stackelberg 主从博弈下的合作模 式。【创新/局限】研究为辟谣主体及时采取相应的网络谣言应对措施提供理论支撑,相关结论可为网络谣言的治理 和舆情预警提供方法支持。  相似文献   

12.
一个资源分配的主从对策模型   总被引:1,自引:0,他引:1  
本文就一类资源分配问题提出一个主从对策模型。在这个模型中上级决策者根据各个下级决策者汇报的信息进行资源的最优分配。为了获得准确的信息,上级决策者采用本文提出的“混合策略”激励方式来引导下级决策者如实汇报情况。在较弱的假设下,我们证明上级决策者所作出的分配方案是近似最优的。此外,本文的这个资源分配模型比较适合中国的国情,其方法具有很好的操作性。  相似文献   

13.
具有几何分布统计特征的在线租赁竞争分析   总被引:10,自引:3,他引:10  
徐维军  徐寅峰  卢致杰 《预测》2005,24(2):46-51
近年来,在线算法的兴起为金融领域的研究提供了新的视角,但传统的竞争分析方法有意规避概率分布假设。在金融领域中,似乎有时忽略这些极有价值的信息而只运用标准的竞争比方法分析显然是一个极大浪费。在本文中,我们首次结合输入结构的分布信息研究了离散型在线租赁问题,建立了最优的离散型在线租赁决策模型,并给出了最优的竞争策略及其竞争比。相比较Karp和El Yaniv的研究结果,由于本文引进了输入的分布信息使得竞争比改善;而相对于Fujiwara的研究结果,由于本文研究了离散型情形,给出了实际问题的精确解。  相似文献   

14.
This paper addresses a finite-time rendezvous problem for a group of unmanned aerial vehicles (UAVs), in the absence of a leader or a reference trajectory. When the UAVs do not cooperate, they are assumed to use Nash equilibrium strategies (NES). However, when the UAVs can communicate among themselves, they can implement cooperative game theoretic strategies for mutual benefit. In a convex linear quadratic differential game (LQDG), a Pareto-optimal solution (POS) is obtained when the UAVs jointly minimize a team cost functional, which is constructed through a convex combination of individual cost functionals. This paper proposes an algorithm to determine the convex combination of weights corresponding to the Pareto-optimal Nash Bargaining Solution (NBS), which offers each UAV a lower cost than that incurred from the NES. Conditions on the cost functions that make the proposed algorithm converge to the NBS are presented. A UAV, programmed to choose its strategies at a given time based upon cost-to-go estimates for the rest of the game duration, may switch to NES finding it to be more beneficial than continuing with a cooperative strategy it previously agreed upon with the other UAVs. For such scenarios, a renegotiation method, that makes use of the proposed algorithm to obtain the NBS corresponding to the state of the game at an intermediate time, is proposed. This renegotiation method helps to establish cooperation between UAVs and prevents non-cooperative behaviour. In this context, the conditions of time consistency of a cooperative solution have been derived in connection to LQDG. The efficacy of the guidance law derived from the proposed algorithm is illustrated through simulations.  相似文献   

15.
We consider a remote state estimation process under an active eavesdropper for cyber-physical system. A smart sensor transmits its local state estimates to a remote estimator over an unreliable network, which is eavesdropped by an adversary. The intelligent adversary can work in passive eavesdropping mode and active jamming mode. An active jamming mode enables the adversary to interfere the data transmission from sensor to estimator, and meanwhile improve the data reception of itself. To protect the transmission data from being wiretapped, the sensor with two antennas injects noise to the eavesdropping link with different power levels. Aiming at minimizing the estimation error covariance and power cost of themselves while maximizing the estimation error covariance of their opponents, a two-player nonzero-sum game is constructed for sensor and active eavesdropper. For an open-loop case, the mixed Nash equilibrium is obtained by solving an one-stage nonzero-sum game. For a long term consideration, a Markov stochastic game is introduced and a Nash Q-learning method is given to find the Nash equilibrium strategies for two players. Numerical results are provided to show the effectiveness of our theoretical conclusions.  相似文献   

16.
基于创新联合体结构特征,构建多寡头三阶段研发博弈模型分析纵向技术溢出无协同决策、横纵技术溢出无协同决策、横纵技术溢出有协同决策三种合作研发策略.结果 表明,提高纵向技术溢出程度,是创新联合体改善中小企业研发绩效,以及领军企业均衡利润的基础手段.增加横纵双向技术溢出,能够进一步提高中小企业研发绩效和领军企业利润水平.对于需求价格弹性较大行业,横纵技术溢出有协同决策研发策略则可以提高创新联合体的整体利润.  相似文献   

17.
对社会资本进行界定,通过静态博弈模型分析,表明农民在公共产品供给决策过程中,会根据对方的选择确定自己的供给决策,从而可以得到小于帕累托最优解的纳什均衡解。  相似文献   

18.
董坤祥  谢宗晓  甄杰 《科研管理》2006,40(11):164-174
网络空间安全是国家安全和经济安全的基础。本文基于恶意软件的两种攻击方式和三种用户防治策略,构建网络空间安全视阈下恶意软件攻防的系统动力学模型,对攻防组合策略进行了交叉分析,并用调研数据验证了模型的有效性。研究发现:在恶意软件的预防、应对阶段,安全教育和安全工具投资可抑制恶意软件传播,减少系统安全脆弱性;恢复阶段的成本投入可减少用户损失;针对不同的防治目标,用户应采取不同的组合防治策略。最后提出的对策建议为用户实施有效的恶意软件防治提供理论与实践指导。  相似文献   

19.
董坤祥  谢宗晓  甄杰 《科研管理》2019,40(11):164-174
网络空间安全是国家安全和经济安全的基础。本文基于恶意软件的两种攻击方式和三种用户防治策略,构建网络空间安全视阈下恶意软件攻防的系统动力学模型,对攻防组合策略进行了交叉分析,并用调研数据验证了模型的有效性。研究发现:在恶意软件的预防、应对阶段,安全教育和安全工具投资可抑制恶意软件传播,减少系统安全脆弱性;恢复阶段的成本投入可减少用户损失;针对不同的防治目标,用户应采取不同的组合防治策略。最后提出的对策建议为用户实施有效的恶意软件防治提供理论与实践指导。  相似文献   

20.
Under the influence of additive communication noises and system noises, we investigate the event-triggered control problem for second-order multi-agent systems composed of double integrators or LC oscillators under random denial-of-service (DoS) attacks. Different from the previous cases where the attackers completely interrupt communication networks, we consider that attackers interrupt the communication network with a specific probability and can attack part or all communication links randomly. Based on this, the conditions on the attack duration and attack success probability are given when the system can still achieve consensus under random DoS attacks. In addition, the consensus bounds are expressed. Finally, two types of LC oscillator systems are used to illustrate the effectiveness of results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号