Complexity

Complexity / 2020 / Article
Special Issue

Reinforcement Learning and Adaptive Optimisation of Complex Dynamic Systems and Industrial Applications

View this Special Issue

Research Article | Open Access

Volume 2020 |Article ID 2903635 | https://doi.org/10.1155/2020/2903635

Xiaojing Zhong, Baihao Peng, Feiqi Deng, Guiyun Liu, "Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise", Complexity, vol. 2020, Article ID 2903635, 13 pages, 2020. https://doi.org/10.1155/2020/2903635

Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise

Academic Editor: Shuping He
Received22 May 2020
Accepted10 Jul 2020
Published13 Aug 2020

Abstract

In this paper, we propose a novel heterogeneous model to describe the propagation dynamics of malware (viruses, worms, Trojan horses, etc.) in wireless sensor networks. Our model takes into consideration different battery-level sensor nodes contrary to existing models. In order to control the spread of malware, we design an aperiodically intermittent controller driven by white noise, which has striking advantages of lower cost and more flexible control strategy. We give a distinct condition on stability in probability one using graph-theoretical Lyapunov function and stochastic analysis method. Our results show that the nonlinear malware propagation system can be stabilized by intermittent stochastic perturbation under the intermittent time related to stochastic perturbation intensity. Our theoretical results can be applied to understand the observed mechanisms of malware and design interventions to control the spread of malware. Numerical simulations illustrate our analytical results clearly.

1. Introduction

With the improvement of wireless sensor technology, wireless sensor networks (WSNs) are used in many new scenarios: intelligent transportation network, water quality monitoring, military target detection, etc. Due to wireless feature and special structure of wireless sensor network, it is vulnerable to malware attack which can eavesdrop and paralyze the network [13]. Consequently, mathematical modeling and control strategies of malware propagation are of vital importance in order to predict its effects and defend it. In recent years, many scientific literatures have appeared, specifically, global model and the related global behaviour of WSNs by the concept of epidemiology. In the epidemic system, all people separate into different compartments such as S (Susceptible), E (Exposed), I (Infectious), R (Recovered), and so on. Toutonji et al. [4] proposed a VEIS-V worm attack propagation model which considers security countermeasures during worm attack. Bimal and Keshri [5] established a SEIRSV model by introducing a maintenance mechanism to sleep nodes. Zhu and Zhao [6] considered a SIR model which has logistic growth. Wang et al. [7] proposed a SCI model to describe the propagation dynamics of mobile sensor worm.

However, the above global models cannot cover individual feature and capability. In this sense, individual-based model will be more accurate to model malware propagation since it values individual diversity and derives both malware relationship and individual feature from malware propagation. Under the framework of heterogeneous complex network theory, the connection topology of nodes can be defined by node degree and the related degree distribution. Several complex network models have been studied for the epidemic model [811], alcoholism model [12], information spreading model [1317], etc. But for wireless sensor network, there are few achievements: del Rey et al. [18] established heterogeneous SIS and SIR models for malware propagation in WSNs; all nodes are separated into three compartments based on the classic SIR epidemic model. Li et al. [19] considered a SIR network malware propagation model; Li’s SIR model is different from del Rey’s heterogeneous model which considers tree-based networks. Inspired by stifler state in the rumor spreading model, Hosseini and Azgomi [20] proposed a SEIRS model. They assumed that nodes could be vaccinated and immunized to the malware infection. All of the above models did not consider sensor’s energy consumption, which affects seriously the information transmission quality. Nodes may not have enough energy to propagate malware by sending information to their neighbors. Proceeding from this angle, infected state should be separated into infected state with high capacity level and infected state with low capacity level. It is worth to mention that most of the results concentrate on dynamic analysis of the deterministic model (global or individual-based model) by the basic reproduction number , which is calculated by the next generation matrix method. But there are rare results on malware control strategies if malware becomes endemic ().

As is well known, stochastic noises can stabilize an unstable system [2127]. Its application extends to many practical areas, such as sleep improvement, tone discrimination [28], and financial stability [21, 23]. From the consideration of reducing control cost and control time, discontinuous controllers have been designed to stabilize a given system such as feedback control [2932], pinning control [33], impulsive control [34], adaptive control [3540], and intermittent control [4144]. As for intermittent control, control time is divided into periodic and aperiodic type. Periodically intermittent control has been studied by many authors especially in synchronization problems. Zhang et al. [41] designed a periodically intermittent linear controller driven by white noises to stabilize an unstable memristor-based system. As Liu and Chen [45, 46] have mentioned before, the requirement of periodicity is unusual in real world application, while aperiodically intermittent control strategy needs a complex management to study the dynamic behaviour of the controlled system. We highlight Liu and Chen [45, 46] who investigated aperiodically intermittent deterministic controller for complex coupled deterministic system, and sufficient conditions have been given to guarantee global synchronization.

Stochastic control has been proved to be sufficiently useful in many fields. But for the best of our knowledge, there is no work on aperiodically intermittent stochastic stabilization for malware propagation; the application on malware propagation needs to be explored. This motivates us to investigate this kind of scheme oriented to the security issue for WSNs. In this paper, we will design an aperiodically intermittent control strategy. In this strategy, we will focus on quantitative conditions for network to stabilize. The main contributions can be summarized as follows:(i)Compared with the previous works on malware spreading models on WSNs, our model is a new model which considers both individual behaviours and sensor capacitance. It can be used to solar heterogeneous network system.(ii)Compared with the previous works on spreading control, the control itself is random perturbation and the control time is aperiodically intermittent rather than continuous, and starting time and control length are arbitrary. We can control steady rate autonomously by adjusting the work width. In this angle, our control strategy is more flexible.

The paper is organized as follows. In Section 2, we establish a new malware propagation model on WSNs at first, which considers different battery-level sensor nodes. Then, we analyze the dynamic behaviour of the model. In Section 3, we design an aperiodically intermittent stochastic noise controller to control malware spreading. The control intensity expression reflects the relationship between system parameters and network topological structure. In Section 4, numerical simulations of the proposed model are given to show the power of aperiodically intermittent noise controller. Finally, we conclude the paper in Section 5.

2. Model Formulation

According to topological structures of WSNs, all nodes partition into groups based on different nodal degrees. Each group is further compartmentalized into four states:(1)Susceptible (): the nodes in this state are prone to being infected by the implantation of malware and will become an infected one if it connects to an infected node.(2)Infectious with high energy level (): the nodes in this state have already been infected by malware successfully and have stored up enough energy to continue propagating the malware.(3)Infectious with low energy level (): the nodes in this state have already been infected by malware successfully but do not have sufficient energy to propagate malware by sending information to their neighbors.(4)Antimalware program activated (): when nodes in state and state are detected to be infected, the nodes will activate antimalware program to clear up the infection. The node activated by the antimalicious program will no longer be invaded by the same malware.

Based on the sensor features and transition characters, the malware propagation process is described as follows: when a susceptible node connects to an infected node, the susceptible node with high energy level becomes an infected node with probability and the susceptible with low energy level node becomes an infected node with probability . Both the contact rates and are positive constants. The malware itself will not cause additional cost to infected node. The infected node with low energy level can become infected node with high level if it is recharged, and the charge rate is a positive constant . The influence of the malware on the natural mortality rate of infected nodes should be ignored and nodes in four states are assigned equal natural mortality rate which satisfies . Figure 1 shows state transition diagram of the model.

Thus, our model can be formulated by the following ordinary differential equations:with initial valueswhere , represents the nodal degree. represents the probability that an edge connects to an infectious sensor node at time . Its expression iswhere represents the average nodal degree. represents the probability that a randomly chosen sensor node has degree , . Obviously, for all and ,

Then, we can deduce system (1) into

About the dynamic behaviour of the above deterministic model (5), we give the following corollary.

Corollary 1. Define(1)If , the malware-free equilibrium is globally asymptotically stable.(2)If , there is an endemic equilibrium, and it is persistent.

Remark 1. The threshold is obtained by , which depends on the fluctuations of the degree distribution and system parameters. Since malware will die out when , malware prevention measures can be designed to decrease , such as decreasing node connectivity to decrease the contact rates and increasing monitoring efforts on infective nodes to increase the detective rate .

3. Control Strategy

In this section, we mainly concentrate on the control strategy of malware propagation. In the context of aperiodically intermittent stochastic noise stabilization of the complex heterogeneous network system, we propose a design procedure for the noise control input to stabilize system (5). At first, we consider a stochastic noise driven by Brownian motions and a g-type structure of the controller. The controller’s mathematical expression is , where is a 3n-dimensional Brownian motion corresponding to system variables and is the related white noise. To be flexible and to save cost, we design the control time as aperiodically intermittent type, which admits uncertain rest times. We give a sketch of aperiodically intermittent control strategy in Figure 2, under the perturbation of -type; the time span contains the work time and the rest time , and denotes the -th noise width. Naturally, the noise widths satisfy . The stochastic control input system iswherewith , . For the aperiodically intermittent perturbation strategy, the start time and the noise width might be different, but the total perturbation time ratio should be fixed in the long term. Mathematically, there exists a positive scalar , such that the above time nodes satisfy the following assumption:

We call as the control time ratio. Moreover, we assume for stochastic stability analysis, which guarantees the existence of a trivial solution .

Theorem 1. If the aperiodically perturbed intensity satisfies , then the infected nodes will die out with probability one.

Proof. Define a matrix M:We can calculate that . Let be the eigenvector of corresponding to ; then, we havewhere . Define a Lyapunov function:whereand is a constant. Using Itô formula, we obtainwhereNote that can be regarded as a linear growth function of ; as for , we can derive thatwhere represents an elementary matrix or an identity matrix. By condition (11), the above inequation becomesThen, we discuss the time in different time intervals. Obviously, there exists one positive integer such that .(1)If , thenwhich means(2)If , thenwhich meansComparing Case (1) and Case (2), we can conclude for thatTaking the expectation on both sides of the above inequation giveswhere . Since , there exists a positive integer such that when ,which implieswhere . By Chebyshev inequality, for any , we haveIf , from the definition of , we can obtain when . Consequently, we haveThen, we deduce thatSince is arbitrary, we obtainThen, sending , we obtain the minimum control intensity expression:Therefore, system (7) is almost surely stable if is bigger than the minimum control intensity. The proof is complete.
In Theorem 1, we give the global stability of the malware-free equilibrium. It is worth to mention that we separate interaction terms in the stochastic model (7) by using the group-theoretic approaching method, and then the infected groups and can be considered separately. Calculating the Lyapunov exponents, we obtain the global stability of the malware-free equilibrium.

Proof of Corollary 1. Set ; then, stochastic model (7) becomes deterministic model (5). The control intensity mathematical expression becomesIt implieswhich means . Applying Theorem 1, the malware-free equilibrium is globally asymptotically stable.
To get the endemic equilibrium solution , the right side of system (1) should equal to zero. The solution definitely satisfies the restrictive condition on the total quality of nodes:Combining and solving all the above equations, we can obtain an equation containing and . To guarantee a nontrivial solution of it, need to be bigger than one, and thus we obtain that there is an endemic equilibrium when .
Then, we prove the malware will be persistent when . If , the derivative of function V becomes positive for sufficiently close to except when . Otherwise, system (1) reduces to , which implies as . This establishes the malware-free equilibrium’s unstable property. Since the necessary and sufficient condition for uniform persistence is equivalent to the malware-free equilibrium being unstable, system (1) is persistent.

Remark 2.   If and for all , system (7) becomes a periodic intermittent system. The minimum control intensity becomesThis agrees with Theorem 1 in Zhang et al. [41]. Our results can be regarded as a generalization of Zhang et al. [41].

Remark 3. According to the expression of , the control intensity depends on the network topological structure and system parameters. Apparently, if the degree distribution of WSNs follows a power law (like a scale-free network) and the number of nodes is huge enough, then , so the absence of control intensity, i.e., , is observed. Moreover, the disappearance of malware is related to perturbation time ratios . Thus, we can enhance or weaken noise intensity to decrease or increase the corresponding control time ratios. Control strategy would be designed based on our theoretical results.

4. Numerical Simulation

The aperiodically intermittent noise controller can stabilize system (1) under the intensity . From the expression, control intensity is directly proportional to the contact rates and inversely proportional to the control time ratio. Using Milstein’s higher order method [47], the discretized equations for the system (7) arewhere are independent random variables N (0, 1), . Generally, we assume WSN is a scale-free network with the power law distribution , where satisfies . We set the initial values to and .

Choosing parameter values in Table 1, the reproduction number is



10.010.0090.010.00150.00160.01

According to Corollary 1, the malware is persistent. The top two pictures in Figure 3 show that the solution of system (1) converges to the endemic equilibrium. The last two pictures in Figure 3 show clearly that the number of infected nodes and converge to a positive constant.

To stabilize the above deterministic model, we choose different control intensities by adjusting control time to compare the stabilization effects.(i)Let control time ratio and initial value (900, 50, 50, 0, …, 900, 50, 50, 0). Generating the aperiodically intermittent time intervals randomly, we give two examples in the middle two pictures of Figure 4. We can calculate that ; according to Theorem 1, and all tend to zero; Figure 4 shows clearly that the malware disappears.(ii)Increase the control time ratio to ; specific aperiodically intermittent time intervals are shown in the middle two pictures of Figure 5. We can obtain that , the condition in Theorem 1 is satisfied, and and all tend to zero. The top two and the last two pictures of Figure 5 show clearly that all the infected nodes go to zero.(iii)Adding control time to full time. Figure 6 shows the solution of system (7) converges to the malware-free equilibrium, and all tend to zero, and the malware nodes will disappear. Comparing Figures 46, we can conclude that the bigger the perturbation intensity is, the faster the steady speed is.

5. Conclusion

Based on network topology and malware propagation property, we established a heterogeneous wireless sensor network model which considers the influence of energy consumption to node communication. The basic reproduction number has been given which determines the extinction or persistence of malware: if , the malware will die out; if , the malware will be persistent. To control malware spreading, we design a kind of aperiodically intermittent stochastic noise controller, starting time and control length of which are arbitrary. We can control steady rate autonomously by adjusting the work width. Using the straightening operator and Markov inequality, we calculate the specific stochastic noise intensity , which is inversely proportional to intermittent time. When stochastic noise controller’s intensity is greater than , malware propagation will be controlled with probability 1. Otherwise, the malware program will destroy the wireless sensor networks. This stochastic stabilization method presents a new theoretical strategy for wireless sensor network security: stochastic noise controller. Numerical simulations are given to illustrate the stabilization effect of stochastic noise.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This study was supported by the Guangzhou Education Bureau science foundation project (1201630502) and Research Fund for Guangzhou University (YG2020010).

References

  1. E. Fadel, V. C. Gungor, L. Nassef et al., “A survey on wireless sensor networks for smart grid,” Computer Communications, vol. 71, pp. 22–33, 2015. View at: Publisher Site | Google Scholar
  2. A. M. del Rey and A. Peinado, “Mathematical models for malware propagation in wireless sensor networks: an analysis,” in Computer and Network Security Essentials, K. Daimi, Ed., pp. 299–313, Springer, Cham, Switzerland, 2018. View at: Publisher Site | Google Scholar
  3. V. Karyotis and M. H. R. Khouzani, Malware Diffusion Models for Modern Complex Networks: Theory and Applications, Morgan Kaufmann, Burlington, MA, USA, 2016.
  4. O. A. Toutonji, S.-M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Applied Mathematical Modelling, vol. 36, no. 6, pp. 2751–2761, 2012. View at: Publisher Site | Google Scholar
  5. K. M. Bimal and N. Keshri, “Mathematical model on the transmission of worms in wireless sensor network,” Applied Mathematical Modelling, vol. 37, no. 6, pp. 4103–4111, 2013. View at: Publisher Site | Google Scholar
  6. L. Zhu and H. Zhao, “Dynamical analysis and optimal control for a malware propagation model in an information network,” Neurocomputing, vol. 149, pp. 1370–1386, 2015. View at: Publisher Site | Google Scholar
  7. T. Wang, Q. Wu, S. Wen et al., “Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks,” Sensors, vol. 17, no. 12, pp. 139–156, 2017. View at: Publisher Site | Google Scholar
  8. P. S. Romualdo and V. Alessandro, “Epidemic spreading in scale-free networks,” Physical Review Letters, vol. 86, no. 14, pp. 3200–3203, 2001. View at: Publisher Site | Google Scholar
  9. S. Huang, F. Chen, and L. Chen, “Global dynamics of a network-based SIQRS epidemic model with demographics and vaccination,” Communications in Nonlinear Science and Numerical Simulation, vol. 43, pp. 296–310, 2017. View at: Publisher Site | Google Scholar
  10. G. Zhu, X. Fu, and G. Chen, “Spreading dynamics and global stability of a generalized epidemic model on complex heterogeneous networks,” Applied Mathematical Modelling, vol. 36, no. 12, pp. 5808–5817, 2012. View at: Publisher Site | Google Scholar
  11. G. Zhu, G. Chen, and X. Fu, “Effects of active links on epidemic transmission over social networks,” Physica A: Statistical Mechanics and Its Applications, vol. 468, pp. 614–621, 2017. View at: Publisher Site | Google Scholar
  12. H. Xiang, Y.-P. Liu, and H.-F. Huo, “Stability of an SAIRS alcoholism model on scale-free networks,” Physica A: Statistical Mechanics and Its Applications, vol. 473, pp. 276–292, 2017. View at: Publisher Site | Google Scholar
  13. T. Li, X. Liu, J. Wu, C. Wan, Z.-H. Guan, and Y. Wang, “An epidemic spreading model on adaptive scale-free networks with feedback mechanism,” Physica A: Statistical Mechanics and Its Applications, vol. 450, pp. 649–656, 2016. View at: Publisher Site | Google Scholar
  14. X. Liu, T. Li, H. Xu, and W. Liu, “Spreading dynamics of an online social information model on scale-free networks,” Physica A: Statistical Mechanics and Its Applications, vol. 514, pp. 497–510, 2019. View at: Publisher Site | Google Scholar
  15. W. Liu, T. Li, X. Liu, and H. Xu, “Spreading dynamics of a word-of-mouth model on scale-free networks,” IEEE Access, vol. 6, pp. 65563–65572, 2018. View at: Publisher Site | Google Scholar
  16. Y. Lei, T. Li, Y. Wang, G. Ye, S. Sun, and Z. Xia, “Spreading dynamics of a CPFB group booking preferential information model on scale-free networks,” IEEE Access, vol. 7, pp. 156287–156300, 2019. View at: Publisher Site | Google Scholar
  17. X. D. Liu, T. Li, X. Cheng, W. Liu, and H. Xu, “Spreading dynamics of a preferential information model with hesitation psychology on scale-free networks,” Advances in Difference Equations, vol. 2019, Article ID 279, pp. 1–13, 2019. View at: Publisher Site | Google Scholar
  18. A. M. del Rey, J. D. H. Guillén, and G. R. Sánchez, “Modeling malware propagation in wireless sensor networks with individual-based models,” in Advances in Artificial Intelligence, vol. 9868, pp. 194–203, Springer, Cham, Switzerland, 2016. View at: Publisher Site | Google Scholar
  19. Q. Li, B. Zhang, L. Cui, Z. Fan, and V. V. Athanasios, “Epidemics on small worlds of tree-based wireless sensor networks,” Journal of Systems Science and Complexity, vol. 27, no. 6, pp. 1095–1120, 2014. View at: Publisher Site | Google Scholar
  20. S. Hosseini and M. A. Azgomi, “A model for malware propagation in scale-free networks based on rumor spreading process,” Computer Networks, vol. 108, pp. 97–107, 2016. View at: Publisher Site | Google Scholar
  21. R. Khasminskii, “Stochastic stability of differential equations,” in Sijthoff & Noordhoff, Springer, Berlin, Germany, 1980. View at: Google Scholar
  22. L. Arnold, H. Crauel, and V. Wihstutz, “Stabilization of linear systems by noise,” SIAM Journal on Control and Optimization, vol. 21, no. 3, pp. 451–461, 1983. View at: Publisher Site | Google Scholar
  23. X. R. Mao, Stochastic Differential Equations and Applications, Woodhead Publishing, Cambridge, UK, 2nd edition, 2008.
  24. L. Huang, “Stochastic stabilization and destabilization of nonlinear differential equations,” Systems & Control Letters, vol. 62, no. 2, pp. 163–169, 2013. View at: Publisher Site | Google Scholar
  25. T. Caraballo, A. Settati, M. E. Fatini, A. Lahrouz, and A. Imlahi, “Global stability and positive recurrence of a stochastic SIS model with lévy noise perturbation,” Physica A: Statistical Mechanics and Its Applications, vol. 523, pp. 677–690, 2019. View at: Publisher Site | Google Scholar
  26. L. Liu and T. Caraballo, “Analysis of a stochastic 2D-navier-stokes model with infinite delay,” Journal of Dynamics and Differential Equations, vol. 31, no. 4, pp. 2249–2274, 2019. View at: Publisher Site | Google Scholar
  27. T. Caraballo, R. Colucci, J. López-de-la-Cruz, and A. Rapaport, “A way to model stochastic perturbations in population dynamics models with bounded realizations,” Communications in Nonlinear Science and Numerical Simulation, vol. 77, pp. 239–257, 2019. View at: Publisher Site | Google Scholar
  28. R. K. Christensen, H. Lindén, M. Nakamura, and T. R. Barkat, “White noise background improves tone discrimination by suppressing cortical tuning curves,” Cell Reports, vol. 29, no. 7, pp. 2041–2053, 2019. View at: Publisher Site | Google Scholar
  29. W. Chen, S. Xu, and Y. Zou, “Stabilization of hybrid neutral stochastic differential delay equations by delay feedback control,” Systems & Control Letters, vol. 88, pp. 1–13, 2016. View at: Publisher Site | Google Scholar
  30. Q. Zhu and Q. Zhang, “Pth moment exponential stabilisation of hybrid stochastic differential equations by feedback controls based on discrete-time state observations with a time delay,” IET Control Theory & Applications, vol. 11, no. 12, pp. 1992–2003, 2017. View at: Publisher Site | Google Scholar
  31. G. Song, B.-C. Zheng, Q. Luo, and X. Mao, “Stabilisation of hybrid stochastic differential equations by feedback control based on discrete-time observations of state and mode,” IET Control Theory & Applications, vol. 11, no. 3, pp. 301–307, 2017. View at: Publisher Site | Google Scholar
  32. R. Yong, W. S. Yin, and R. Sakthivel, “Stabilization of stochastic differential equations driven by G-Brownian motion with feedback control based on discrete-time state observation,” Automatica, vol. 95, pp. 146–151, 2018. View at: Publisher Site | Google Scholar
  33. H. Ren, Y. Peng, F. Deng, and C. Zhang, “Impulsive pinning control algorithm of stochastic multi-agent systems with unbounded distributed delays,” Nonlinear Dynamics, vol. 92, no. 4, pp. 1453–1467, 2018. View at: Publisher Site | Google Scholar
  34. P. Cheng, F. Deng, and F. Yao, “Almost sure exponential stability and stochastic stabilization of stochastic differential systems with impulsive effects,” Nonlinear Analysis: Hybrid Systems, vol. 30, pp. 106–117, 2018. View at: Publisher Site | Google Scholar
  35. Y.-J. Liu, S. Lu, D. Li, and S. Tong, “Adaptive controller design-based ABLF for a class of nonlinear time-varying state constraint systems,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 7, pp. 1546–1553, 2017. View at: Publisher Site | Google Scholar
  36. S. He, H. Fang, M. Zhang, F. Liu, and Z. Ding, “Adaptive optimal control for a class of nonlinear systems: the online policy iteration approach,” IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 2, pp. 549–558, 2020. View at: Publisher Site | Google Scholar
  37. S. He, H. Fang, M. Zhang, F. Liu, X. Luan, and Z. Ding, “Online policy iterative-based h optimization algorithm for a class of nonlinear systems,” Information Sciences, vol. 495, no. 1, 2019. View at: Publisher Site | Google Scholar
  38. P. Cheng, J. Wang, S. He, X. Luan, and F. Liu, “Observer-based asynchronous fault detection for conic-type nonlinear jumping systems and its application to separately excited DC motor,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67, no. 3, pp. 1–12, 2020. View at: Publisher Site | Google Scholar
  39. P. Cheng and S. He, “Observer-based finite-time asynchronous control for a class of hidden Markov jumping systems with conic-type nonlinearities,” IET Control Theory and Applications, vol. 14, no. 2, pp. 244–252, 2020. View at: Publisher Site | Google Scholar
  40. P. Cheng, S. He, J. Cheng, X. Luan, and F. Liu, “Asynchronous output feedback control for a class of conic-type nonlinear hidden markov jump systems within a finite-time interval,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1–8, 2020, In press. View at: Publisher Site | Google Scholar
  41. B. Zhang, F. Deng, S. Peng, and S. Xie, “Stabilization and destabilization of nonlinear systems via intermittent stochastic noise with application to memristor-based system,” Journal of the Franklin Institute, vol. 355, no. 9, pp. 3829–3852, 2018. View at: Publisher Site | Google Scholar
  42. S. Yang, C. Li, and T. Huang, “Exponential stabilization and synchronization for fuzzy model of memristive neural networks by periodically intermittent control,” Neural Networks, vol. 75, pp. 162–172, 2016. View at: Publisher Site | Google Scholar
  43. G. Zhang and Y. Shen, “Exponential stabilization of memristor-based chaotic neural networks with time-varying delays via intermittent control,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1431–1441, 2015. View at: Publisher Site | Google Scholar
  44. L. Liu, M. Perc, and J. Cao, “Aperiodically intermittent stochastic stabilization via discrete time or delay feedback control,” Science China Information Sciences, vol. 62, no. 7, pp. 1–13, 2019. View at: Publisher Site | Google Scholar
  45. X. Liu and T. Chen, “Synchronization of nonlinear coupled networks via aperiodically intermittent pinning control,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 10, pp. 113–126, 2015. View at: Publisher Site | Google Scholar
  46. X. Liu and T. Chen, “Synchronization of complex networks via aperiodically intermittent pinning control,” IEEE Transactions on Automatic Control, vol. 60, no. 2, pp. 3316–3321, 2015. View at: Publisher Site | Google Scholar
  47. D. J. Higham, “An algorithmic introduction to numerical simulation of stochastic differential equations,” SIAM Review, vol. 43, no. 3, pp. 525–546, 2001. View at: Publisher Site | Google Scholar
  48. P. van den Driessche and J. Watmough, “Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Mathematical Biosciences, vol. 180, no. 1-2, pp. 29–48, 2002. View at: Publisher Site | Google Scholar
  49. M. Y. Li and Z. Shuai, “Global-stability problem for coupled systems of differential equations on networks,” Journal of Differential Equations, vol. 248, no. 1, pp. 1–20, 2010. View at: Publisher Site | Google Scholar

Copyright © 2020 Xiaojing Zhong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views132
Downloads192
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.