scispace - formally typeset
Search or ask a question
Author

Yuan Yuan

Bio: Yuan Yuan is an academic researcher from Northwestern Polytechnical University. The author has contributed to research in topics: Control theory & Control system. The author has an hindex of 24, co-authored 61 publications receiving 1692 citations. Previous affiliations of Yuan Yuan include Brunel University London & Tsinghua University.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: Considering the attack-induced packet dropout, optimal control strategies with multitasking and central-tasking structures are developed using game theory in the delta domain, respectively, and a optimality criteria and algorithms for both cyber defenders and DoS attackers are proposed.
Abstract: We consider the problem of resilient control of networked control system (NCS) under denial-of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra constraints in the NCS, where the packets may be jammed by a malicious adversary. Considering the attack-induced packet dropout, optimal control strategies with multitasking and central-tasking structures are developed using game theory in the delta domain, respectively. Based on the optimal control structures, we propose optimality criteria and algorithms for both cyber defenders and DoS attackers. Both simulation and experimental results are provided to illustrate the effectiveness of the proposed design procedure.

271 citations

Journal ArticleDOI
TL;DR: A novel particle swarm optimization (PSO) algorithm is put forward where a sigmoid-function-based weighting strategy is developed to adaptively adjust the acceleration coefficients, inspired by the activation function of neural networks.
Abstract: In this paper, a novel particle swarm optimization (PSO) algorithm is put forward where a sigmoid-function-based weighting strategy is developed to adaptively adjust the acceleration coefficients. The newly proposed adaptive weighting strategy takes into account both the distances from the particle to the global best position and from the particle to its personal best position, thereby having the distinguishing feature of enhancing the convergence rate. Inspired by the activation function of neural networks, the new strategy is employed to update the acceleration coefficients by using the sigmoid function. The search capability of the developed adaptive weighting PSO (AWPSO) algorithm is comprehensively evaluated via eight well-known benchmark functions including both the unimodal and multimodal cases. The experimental results demonstrate that the designed AWPSO algorithm substantially improves the convergence rate of the particle swarm optimizer and also outperforms some currently popular PSO algorithms.

160 citations

Journal ArticleDOI
TL;DR: In this brief, attitude control is investigated for a quadrotor under gust wind via a dual closed-loop control framework through active disturbance rejection control and proportional–derivative control in the inner and outer loops.
Abstract: In this brief, attitude control is investigated for a quadrotor under gust wind via a dual closed-loop control framework. In the dual closed-loop framework, active disturbance rejection control and proportional–derivative control are used in the inner and outer loops, respectively. The perturbations of gust wind are considered as dynamic disturbances, which are estimated by an extended state observer in the inner loop. Both convergence and stabilization are given for the extended state observer and the closed-loop system, respectively. Experimental results are given to show the effectiveness of the proposed method for quadrotors.

159 citations

Journal ArticleDOI
Yuan Yuan, Huanhuan Yuan, Zidong Wang, Lei Guo1, Hongjiu Yang 
TL;DR: This study deals with the optimal control problem for a class of delta-domain networked control systems subjected to both matched and unmatched disturbances, and an upper bound for the ϵ -optimum is provided explicitly, and convex optimisation algorithms are given to compute such upper bound.
Abstract: This study deals with the optimal control problem for a class of delta-domain networked control systems (NCSs) subjected to both matched and unmatched disturbances. In the presence of the disturbances, the so-called ϵ -optimum is proposed to quantify the control performance. The purpose of the addressed problem is to design the optimal control strategy such that the cost function is minimised over the finite-/infinite-horizon under the network-induced constraints. In virtue of the dynamic programming method, sufficient conditions are established to guarantee the existence of the desired control strategies, and the controller parameters are designed. For the obtained optimal control strategy, an upper bound for the ϵ -optimum is provided explicitly, and convex optimisation algorithms are given to compute such upper bound. Both simulation and experimental results are provided to illustrate the usefulness and applicability of the proposed methods.

127 citations

Proceedings ArticleDOI
10 Oct 2013
TL;DR: This paper establishes a coupled design framework which incorporates the cyber configuration policy of Intrusion Detection Systems (IDSs) and the robust control of dynamical system and proposes design algorithms based on value iteration methods and linear matrix inequalities for computing the optimal cyber security policy and control laws.
Abstract: The integration of control systems with modern information technologies has posed potential security threats for critical infrastructures. The communication channels of the control system are vulnerable to malicious jamming and Denial-of-Service (DoS) attacks, which lead to severe time-delays and degradation of control performances. In this paper, we design resilient controllers for cyber-physical control systems under DoS attacks. We establish a coupled design framework which incorporates the cyber configuration policy of Intrusion Detection Systems (IDSs) and the robust control of dynamical system. We propose design algorithms based on value iteration methods and linear matrix inequalities for computing the optimal cyber security policy and control laws. We illustrate the design principle with an example from power systems. The results are corroborated by numerical examples and simulations.

104 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This work was supported in part by the Royal Society of the UK, the National Natural Science Foundation of China, and the Alexander von Humboldt Foundation of Germany.

2,404 citations

Journal ArticleDOI
TL;DR: An overview of the state-of-the-art attention models proposed in recent years is given and a unified model that is suitable for most attention structures is defined.

620 citations

Journal ArticleDOI
TL;DR: The optimal jamming attack that maximizes the Linear Quadratic Gaussian control cost function under energy constraint is considered and the corresponding cost function is derived and system stability under this optimal attack schedule is considered.
Abstract: Recently, many literature works have considered the security issues of wireless networked control system (WNCS). However, few works studied how the attacker should optimize its attack schedule in order to maximize the effect on the system performance due to the insufficiency of energy at the attacker side. This paper fills this gap from the aspect of control system performance. We consider the optimal jamming attack that maximizes the Linear Quadratic Gaussian (LQG) control cost function under energy constraint. After analyzing the properties of the cost function under an arbitrary attack schedule, we derive the optimal jamming attack schedule and the corresponding cost function. System stability under this optimal attack schedule is also considered. We further investigate the optimal attack schedule in a WNCS with multiple subsystems. Different examples are provided to demonstrate the effectiveness of the proposed optimal denial-of-service attack schedule.

477 citations

Journal ArticleDOI
TL;DR: A survey of trends and techniques in networked control systems from the perspective of ‘ control over networks ’ is presented, providing a snapshot of five control issues: sampled-data control, quantization control, networking control, event-triggered control, and security control.
Abstract: Networked control systems are spatially distributed systems in which the communication between sensors, actuators, and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices, increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems, process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘ control over networks ’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘ control over networks ’ , providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research.

423 citations

Journal ArticleDOI
TL;DR: This work states that a computer worm, Stuxnet, was spread to target Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.
Abstract: Critical infrastructures, such as power grids and transportation systems, are increasingly using open networks for operation. The use of open networks poses many challenges for control systems. The classical design of control systems takes into account modeling uncertainties as well as physical disturbances, providing a multitude of control design methods such as robust control, adaptive control, and stochastic control. With the growing level of integration of control systems with new information technologies, modern control systems face uncertainties not only from the physical world but also from the cybercomponents of the system. The vulnerabilities of the software deployed in the new control system infrastructure will expose the control system to many potential risks and threats from attackers. Exploitation of these vulnerabilities can lead to severe damage as has been reported in various news outlets [1], [2]. More recently, it has been reported in [3] and [4] that a computer worm, Stuxnet, was spread to target Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.

377 citations