Next Article in Journal
Multi-Task CNN-LSTM Modeling of Zero-Inflated Count and Time-to-Event Outcomes for Causal Inference with Functional Representation of Features
Previous Article in Journal
Analytical Solutions for Generalized Stochastic HSC-KdV Equations with Variable Coefficients Using Hermite Transform and F-Expansion Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bipartite Synchronization of Cooperation–Competition Neural Networks Using Asynchronous Sampling Scheme

College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao 266590, China
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(8), 625; https://doi.org/10.3390/axioms14080625
Submission received: 3 June 2025 / Revised: 9 July 2025 / Accepted: 31 July 2025 / Published: 11 August 2025
(This article belongs to the Section Mathematical Analysis)

Abstract

This paper investigates the bipartite synchronization problem for cooperation–competition neural networks (CCNNs) under asynchronous sampling control. First, using signed graph theory to characterize the interrelationships between cooperation and competition, a mathematical model for cooperative–competitive neural networks is established. To formulate the error systems of such networks, a Laplacian matrix with zero row sum is derived through coordinate transformation techniques. Considering network complexity and deception attack impacts, an asynchronous sampling-based secure control scheme is designed while preserving performance guarantees. By relaxing positive definiteness constraints, a class of looped functionals is introduced. State norm estimations are utilized to derive criteria for achieving bipartite synchronization. The feedback gain matrices of the asynchronous sampling controller are obtained by solving linear matrix inequalities. Finally, numerical simulations validate the effectiveness of the proposed method.

1. Introduction

Traditional artificial neural network models are predominantly governed by single mechanisms—pure cooperation (e.g., federated learning) or pure competition (e.g., generative adversarial networks) [1,2,3]. While these models excel in specific tasks, their limitations become apparent when addressing complex real-world scenarios where cooperation and competition coexist. To address this challenge, biological neural networks offer insights. The nervous system achieves diverse functions through synergistic interactions between excitation and inhibition. For instance, neurons in the visual cortex suppress redundant signals via lateral inhibition mechanisms to dominate perceptual regions while collaborating through excitatory connections for image recognition. This biological mechanism demonstrates that cooperation and competition are not mutually exclusive but form the core of complex system operations. Recent neuroscience research has shown that the competitive interactions among inhibitory neurons can enhance memory formation and synaptic changes, which are crucial for memory consolidation. Therefore, it is important to represent social networks through cooperation–competition dynamics, specifically using cooperation–competition neural networks. Inspired by this, cooperation–competition neural networks simulate the interplay of cooperation among neurons, providing a biomimetic foundation for modeling complex systems. In recent years, these networks have been widely applied in pattern recognition [4], smart grids [5], secure communication [6], and other domains.
Based on the above discussion, this paper studies the bipartite synchronization of CCNNs under asynchronous sampling control. The key contributions are listed as follows:
(1)
Different from previous works [7,8], an asynchronous sampling scheme is proposed. By integrating the sampling instants of an asynchronous sampling mechanism and coordinate transformation techniques, an error system model for cooperative–competitive neural networks is established.
(2)
Unlike existing works [9,10,11,12], we consider the asynchronous sampling scheme in the presence of deception attacks. Using the characteristics of an asynchronous sampling scheme, we constructed a class of associated loop functionals that can fully utilize the state information at each node’s sampling instants.

2. Discussion

In recent years, research on cooperation–competition neural networks (CCNNs) has made significant progress. For example, ref. [13] investigated multi-delay CCNNs in memristive neural networks using state feedback control, while [14] studied switching cooperation–competition neural networks using the same method. Ref. [15] employed adaptive control to analyze CCNNs. However, these studies relied on traditional point-to-point control, which demands substantial control resources and consumes excessive communication bandwidth for networked systems, leading to congestion. To address this issue, networked control approaches have emerged. For instance, ref. [7] explored bipartite synchronization in coupled Lur’e systems using sampling control, and ref. [8] addressed second-order multi-agent system synchronization through sampling-based methods. For CCNNs, key phenomena are synchronization [16,17] and anti-synchronization [18,19]. CCNNs require signed graphs with both positive and negative edges. Their synchronization splits nodes into two anti-phase groups (i.e., bipartite synchronization) [20,21,22,23], further classified into leader-based and leaderless synchronization. Leader–follower bipartition is practical for real-world efficiency. In contrast to traditional point-to-point control [24,25,26,27], sampling control is undoubtedly a superior approach for achieving bipartite synchronization in CCNNs. However, real-world sensors often exhibit varying sampling periods, making asynchronous sampling mechanisms more practical for studying cooperation–competition coupled neural networks. In recent years, extensive research has been conducted on asynchronous sampling control [9,10,11,12]. Asynchronous sampling control, as a flexible strategy, allows nodes to adopt varying sampling intervals, adapting to network heterogeneity and resource constraints. The advantages of asynchronous sampling control lie in its flexibility and efficiency compared to synchronous sampling. Unlike synchronous systems governed by a fixed global clock, asynchronous control allows individual sensors, actuators, or subsystems to operate and communicate based on their own local timing requirements or triggered by specific events. This eliminates the delays and resource wastage associated with waiting for the next global clock tick when data is ready earlier, enabling more responsive handling of critical events without being constrained by a rigid clock cycle.

3. Preliminaries and Problem Formulation

Consider a CCNN with N nodes as follows:
ϕ ˙ i ( t ) = C ϕ i ( t ) + B f ( ϕ i ( t ) ) τ j = 1 N a i j p ( ϕ i ( t ) sgn ( a i j ) ϕ j ( t ) ) + u i ( t ) ,
where ϕ i ( t ) = ( ϕ i 1 ( t ) , ϕ i 2 ( t ) , ϕ i 3 ( t ) , , ϕ i n ( t ) ) T is the state vector of the ith node. C and B denote the connection weight matrices. τ denotes the coupling strength. p 1 , 2 implies that N nodes can be divided into two parts. a i , j p denotes the adjacency information. f ( ϕ i ( t ) ) is the activation function, and u i ( t ) R represents the control input.
The leader node of (1) is derived as follows:
s ˙ ( t ) = C s ( t ) + B f ( s ( t ) ) ,
where s ( t ) = ( s 1 ( t ) , s 2 ( t ) , s 3 ( t ) , , s n ( t ) ) T .
In the following, some definitions and lemmas will be used.
Assumption 1
([7]). The vertex array of a directed graph can be divided into two non-adjacent subsets ν 1 and ν 2 , and it satisfies the following:
(1)
If ν i , ν j ν p ( p 1 , 2 ) , a i j p 0 .
(2)
If ν i ν q , ν j ν p ( p q , p , q 1 , 2 ) , a i j p 0 .
Definition 1
([7]). The activation f j ( · ) function that is monotonically non-decreasing is an odd function and Lipschiz continuous, such that
f i j ( ε ) = f i j ( ε )
0 f i j ( p ) f i j ( p ) p q F i j ,
for all p , q R , p q , i = 1 , 2 , , N , and j = 1 , 2 , , n .
Lemma 1
([28]). If the signed graph is balanced, Ξ = ( λ 1 , λ 2 , λ 3 λ N ) and λ i 1 , 1 , then Ξ A p Ξ = A q , where A p = ( a i j p ) N × N , a i j q = λ i a i j p λ i = | a i j p | .
Lemma 2
([29]). Consider a scalar ϖ ( 0 , 1 ) , n × n matrices R 1 > 0 and R 2 > 0 , and the following function
φ ( ϖ ) = 1 ϖ υ 1 T R 1 υ 1 + 1 1 ϖ υ 2 T R 2 υ 2 ,
where υ 1 and υ 2 are arbitrary vectors. If there exists a matrix H with R 1 H R 2 , one can obtain
min ϖ ( 0 , 1 ) φ ( ϖ ) υ 1 υ 2 T R 1 H R 2 υ 1 υ 2 .
Let ϕ ¯ ˙ i ( t ) = λ i ϕ i ( t ) , λ i { 1 , 1 } , i = 1 , , N , and then we can derive that ϕ i ( t ) = n i ϕ ¯ ˙ i ( t ) . From (1) and Definition 1, we obtain
ϕ ¯ ˙ ( t ) = C ϕ ¯ i ( t ) + B λ i f ( λ i ϕ ¯ i ( t ) ) τ λ i j = 1 N a i j p ( λ i ϕ ¯ i ( t ) sgn ( a i j p ) λ j ϕ ¯ j ( t ) ) + u i ( t ) = C ϕ ¯ i ( t ) + B f ( ϕ ¯ i ( t ) ) τ j = 1 N a i j p ( ϕ ¯ i ( t ) λ i sgn ( a i j p ) λ j ϕ ¯ j ( t ) ) + u i ( t ) .
Define L p as the Laplacian matrix of the A p , and then we can derive that
ϕ ¯ ˙ ( t ) = C ϕ ¯ i ( t ) + B f ( ϕ ¯ i ( t ) ) τ j = 1 N L i j p ϕ ¯ j ( t ) + u i ( t ) .
In setting σ ( t ) = ϕ ¯ i ( t ) s ( t ) , one has
σ ˙ i ( t ) = C σ i ( t ) + B f ( ϕ ¯ i ( t ) ) B f ( s ( t ) ) τ j = 1 N L i j p σ j ( t ) + u i ( t ) .
where σ i ( t ) = ( σ i 1 ( t ) , σ i 2 ( t ) , σ i n ( t ) ) T .
Definition 2.
Systems (1) and (3) are said to achieve bipartite synchronization if lim t + | | ϕ ¯ i ( t ) s ( t ) | | = 0 holds, for i = 1 , , N . In other words, i ν 1 , λ i = 1 , ϕ ¯ i ( t ) s ( t ) , and i ν 2 , λ i = 1 , ϕ ¯ i ( t ) s ( t ) .
Remark 1.
In traditional coupled neural networks for bipartite synchronization, the adjacency matrix is strictly positive because connection weights are non-negative. Consequently, the Laplacian matrix becomes a zero-row-sum matrix, which simplifies error system derivation. However, in CCNNs, connection weights can be positive or negative, which leads to non-zero-row-sum Laplacian matrices. This complicates error system construction using conventional methods. A key challenge in this paper is establishing an error system for CCNNs. To resolve this, we employ coordinate transformation to convert the Laplacian matrix into a zero-row-sum instruction, enabling the derivation of a stable error dynamics model.
In the following, we will design the controller under multi-rate sampled-data control under deception attack. On the one hand, we consider m sensors S i , i = 1 , 2 , , m . These sensors will be sampled in different sampling intervals. The sampling interval of the ith sensor is d k i i = t k i + 1 i t k i i , satisfying d k i i ( 0 , d ¯ i ] , where d ¯ i is the maximum sampling interval. Then, we define a function between the present time and the last sampling time p i ( t ) = t t k i i , and one can obtain
0 p i ( t ) d k i i d ¯ i d ¯ ,
where d ¯ = max d i ¯ . Then, we can define the state σ ¯ i ( t ) as follows:
σ ¯ i ( t ) = ( σ i 1 ( t p 1 ( t ) ) , σ i 2 ( t p 2 ( t ) ) , , σ i m ( t p m ( t ) ) ) .
Remark 2.
In practical engineering, sensors often have different sampling periods due to their distinct functional requirements. Additionally, in networked control systems, factors like communication delays, packet loss, or deception attacks further exacerbate mismatches in sampling intervals across sensors. Asynchronous sampling thus better reflects real-world scenarios. To address these challenges, we recombine the sampling period as shown in Figure 1.
On the other hand, the sampled package σ ¯ i ( t ) may suffer deception attack β ( t ) { 1 , 1 } ; then, the false data g ( σ ¯ i ( t ) ) will substitute the σ ¯ i ( t ) . Then, consider the multi-rate sampled-data scheme with a deception attack; the controller can be designed as follows:
u i ( t ) = ( 1 β ( t ) ) K i σ ¯ i ( t ) + β ( t ) K i g ( σ ¯ i ( t ) ) ,
where K i is the control gain that needs to be designed, and β ( t ) is the attack signal defined on ( ω , F t , F t 0 , P ) , with F satisfying the usual conditions (i.e., it is increasing and right continuous, while F 0 contains all P-null sets), and satisfying P { β ( t ) = 1 } = γ and P { β ( t ) = 0 } = 1 γ , α [ 0 , 1 ] . It should be mentioned that the deception attack β ( t ) has limited energy. Accordingly, we give the following assumption:
Assumption 2.
The deception attack satisfies the following inequality:
| | g ( ε ) | | 2 | | L ε | | 2 ,
where L is the constant matrix.
Based on the above discussion, one can obtain the following error system:
σ ˙ ( t ) = ( I N C ) σ ( t ) + ( I N B ) f ( σ ( t ) ) τ ( L p I n ) σ ( t ) + ( 1 β ( t ) ) K σ ¯ ( t ) + β ( t ) K g ( σ ¯ ( t ) )
= C ¯ σ ( t ) + B ¯ f ( σ ( t ) ) + ( 1 β ( t ) ) K σ ¯ ( t ) + β ( t ) K g ( σ ¯ ( t ) ) , t [ t k , t k + 1 ) ,
where σ ( t ) = ( σ 1 ( t ) , σ 2 ( t ) , , σ N ( t ) ) , f ( σ ( t ) ) = ( f ( σ 1 ( t ) ) , f ( σ 2 ( t ) ) , , f ( σ N ( t ) ) ) , K = ( K 1 , K 2 , , K N ) , g ( σ ¯ ( t ) ) = ( g ( σ ¯ 1 ( t ) ) , g ( σ ¯ 2 ( t ) ) , , g ( σ ¯ N ( t ) ) , C ¯ = ( I N C + τ ( L p I n ) , and B ¯ = I N B .

4. Main Results

Theorem 1.
For given scalars d 2 > d 1 > 0 , τ > 0 , α > 0 , γ > 0 , and h ¯ > 0 and N n × N n diagonal matrix K, if there exist N n × N n matrices P > 0 , Y > 0 , D > 0 , Q > 0 , S i > 0 , and Z i > 0 ; arbitrary matrices R, H, and W; 2 N n × 2 N n matrices X and R; 3 N n × 3 N n matrix M; and N n × N n diagonal matrices U 1 , U 2 , and Λ, such that for d k d 1 , d 2 ,
Θ ( d k ) < 0 ,
Π ( d k ) < 0 ,
Z i W i Z i > 0 , i 1 , 2 , , m ,
D H Q > 0 ,
where Θ 11 = D + H + H T Q Z + S U 1 T C ¯ 2 R 1 2 R 2 2 R 3 2 R 4 , Θ 12 = P + Y + Y T 1 2 U 1 T 1 2 C ¯ T U 2 + d k ( R 1 + R 1 T ) + d k ( R 2 + R 2 T ) , Θ 13 = D 1 2 ( H + H T ) + R 1 + R 1 T + R 2 T R 3 X 1 + X 3 , Θ 14 = H + 1 2 ( Q + Q T ) + R 2 R 3 T R 4 R 4 T X 2 + X 4 , Θ 15 = 1 2 U 1 T ( 1 γ ) K , Θ 16 = Z W , Θ 17 = W , Θ 18 = 1 2 U 1 T B ¯ + F T Λ , Θ 19 = 1 2 γ U 1 T K , Θ 22 = d k 2 D + μ 2 Z U 2 T , Θ 23 = Y T + d k ( R 1 R 1 T ) d k R 2 T + d k X 1 , Θ 24 = Y d k R 2 + d k X 2 , Θ 25 = 1 2 U 2 T ( 1 γ ) K , Θ 28 = 1 2 U 2 T B ¯ , Θ 29 = 1 2 γ U 2 T K , Θ 33 = D 2 R 1 + 2 X 1 + d k M 1 , Θ 34 = H + d k M 2 R 2 + R 3 T + X 2 X 3 T , Θ 35 = d k M 3 , Θ 44 = Q + d k M 4 + 2 R 4 2 X 4 , Θ 45 = d k M 5 , Θ 55 = d k M 6 , Θ 56 = 1 2 α L T L , Θ 66 = 2 Z + W T + W , Θ 67 = Z W , Θ 77 = Z S Θ 88 = 2 Λ , Θ 99 = α , Π 11 = D + H + H T Q Z + S U 1 T C ¯ 2 R 1 2 R 2 + 2 R 3 + 2 R 4 , Π 12 = P + 2 Y 1 2 U 1 T 1 2 C ¯ T U 2 + d k ( R 3 + R 3 T ) + d k ( R 4 + R 4 T ) , Π 13 = D 1 2 ( H + H T ) + R 1 + R 1 T + R 2 T R 3 + X 1 + X 3 , Π 14 = 1 2 ( H + H T ) + Q + R 2 R 3 T 1 2 ( R 4 + R 4 T ) , Π 15 = 1 2 U 1 T ( 1 β ( t ) ) K , Π 16 = Z W , Π 17 = W , Π 18 = 1 2 U 1 T B ¯ + F T Λ , Π 19 = 1 2 U 1 T β ( t ) K , Π 22 = d k 2 Q + μ 2 Z U 2 T , Π 23 = Y T + d k ( X 3 R 3 ) , Π 24 = Y d k ( R 4 + R 4 T ) d k R 3 T + d k X 4 , Π 25 = 1 2 U 2 T ( 1 β ( t ) ) K , Π 28 = 1 2 U 2 T B ¯ , Π 29 = 1 2 U 2 T β ( t ) K , Π 33 = D 2 R 1 + 2 X 1 + d k M 1 , Π 34 = H + d k M 2 R 2 + R 3 T + X 2 X 3 T , Π 35 = d k M 3 , Π 44 = Q + d k M 4 + 2 R 4 2 X 4 , Π 45 = d k M 5 , Π 55 = d k M 6 , Π 56 = 1 2 α L T L , Π 66 = 2 Z + W T + W , Π 67 = Z W , Π 67 = Z S , Π 88 = 2 Λ , and Π 99 = α , then error system (5) is exponentially stable. That is, the bipartite synchronization of CCNNs (1) and (3) can be achieved using controller (4).
Proof. 
Construct the Lyapunov–Krasovskii functional as
V ( t ) = i = 1 6 V i ( t ) , t [ t k , t k + 1 )
with
V 1 ( t ) = σ T ( t ) P σ ( t ) , V 2 ( t ) = 2 ζ 1 T ( t ) Y ζ 2 ( t ) , V 3 ( t ) = ( t k + 1 t ) ( t t k ) ζ 3 T M ζ 3 , V 4 ( t ) = ( t k + 1 t ) ( t k + 1 t k ) t k t σ ˙ T ( s ) D σ ˙ ( s ) d s ( t t k ) ( t k + 1 t k ) t t k + 1 σ ˙ T ( s ) Q σ ˙ ( s ) d s , V 5 ( t ) = i = 1 m t d ¯ i t σ i T ( s ) S i σ i ( s ) d s + i = 1 m d ¯ i d ¯ i 0 t + θ t σ i T ( s ) Z i σ i ( s ) d s d θ , V 6 ( t ) = 2 ( t k + 1 t ) ζ 1 ( t ) ( t t k ) ζ 2 ( t ) T R ζ 1 ( t ) ζ 2 ( t ) + X σ ( t k ) σ ( t k + 1 ) ,
and ζ 1 ( t ) = σ ( t ) σ ( t k ) ,   ζ 2 ( t ) = σ ( t ) σ ( t k + 1 ) ,   ζ 3 = col σ ( t k ) ,   σ ( t k + 1 ) ,   σ ¯ ( t k ) ,
M = M 1 M 2 M 3 M 4 M 5 M 6 , R = R 1 R 2 R 3 R 4 , X = X 1 X 2 X 3 X 4 .
Next, the proof is divided into two parts.
When t [ t k , t k + 1 ) , we will prove the stability at the sampling points.
E { V ˙ 1 ( t ) } = E 2 σ ( t ) P σ ˙ ( t ) E { V ˙ 2 ( t ) } = E 2 σ ˙ T ( t ) Y ζ 2 ( t ) + 2 ζ 1 ( t ) Y σ ˙ ( t ) , E { V ˙ 3 ( t ) } = E ( t k + 1 t ) ζ 3 T M ζ 3 ( t t k ) ζ 3 T M ζ 3 , E V ˙ 4 ( t ) = E h k t k t σ ˙ T ( s ) D σ ˙ ( s ) d s + ( t k + 1 t ) ( t k + 1 t k ) σ ˙ T ( t ) D σ ˙ ( t ) h k t t k + 1 σ ˙ T ( s ) Q σ ˙ ( s ) d s + ( t t k ) ( t k + 1 t k ) σ ˙ T ( t ) Q σ ˙ ( t ) , E V 5 ˙ ( t ) = E i = 1 m σ i T ( t ) S i σ i ( t ) σ i T ( t d ¯ i ) S i σ i ( t d ¯ i ) + i = 1 m ( d ¯ i ) 2 σ i T ( t ) Z i σ i ( t ) i = 1 m d i ¯ t d ¯ i t σ ˙ i T ( s ) Z i σ ˙ i ( s ) d s = E { σ T ( t ) S σ ( t ) σ ˜ T ( t ) S σ ˜ ( t ) + μ 2 σ ˙ T ( t ) Z σ ˙ ( t ) i = 1 m d ¯ i t p i ( t ) t σ ˙ i T ( s ) Z i σ ˙ i ( s ) d s i = 1 m d ¯ i t d ¯ i t p i ( t ) σ ˙ i T ( s ) Z i σ ˙ i ( s ) d s } , E { V ˙ 6 ( t ) } = E 2 ζ 1 ( t ) + ( t k + 1 ) σ ˙ ( t ) ζ 2 ( t ) + ( t t k ) σ ˙ ( t ) R ζ 1 ( t ) ζ 2 ( t ) + X σ ( t k ) σ ( t k + 1 ) + ( t k + 1 t ) ζ 1 ( t ) ( t t k ) ζ 2 ( t ) R σ ˙ ( t ) σ ˙ ( t ) ,
where μ = diag d ¯ 1 , d ¯ 1 , , d ¯ m and σ ˜ ( t ) = σ ( t d ¯ 1 ) , σ ( t d ¯ 2 ) , , σ ( t d ¯ m ) .
Based on the Jensen inequality and Lemma 2, one can derive that
d k t k t σ ˙ T ( s ) D σ ˙ ( s ) d s d k t t k + 1 σ ˙ T ( s ) Q σ ˙ ( s ) d s d k t t k t k t σ ˙ ( s ) d s T D t k t σ ˙ ( s ) d s d k t k + 1 t t t k + 1 σ ˙ ( s ) d s T Q t t k + 1 σ ˙ ( s ) d s d k t t k σ ( t ) σ ( t k ) T D σ ( t ) σ ( t k ) d k t k + 1 t σ ( t k + 1 σ ( t ) ) T Q σ ( t k + 1 σ ( t ) ) σ ( t ) σ ( t k ) σ ( t k + 1 ) σ ( t ) T D H Q σ ( t ) σ ( t k ) σ ( t k + 1 ) σ ( t ) .
i = 1 m d ¯ i t p i ( t ) t σ ˙ i T ( s ) Z i σ ˙ i ( s ) d s i = 1 m d ¯ i t d ¯ i t p i ( t ) σ ˙ i T ( s ) Z i σ ˙ i ( s ) d s i = 1 m d ¯ i p i ( t ) σ i ( t ) σ i ( t p i ( t ) ) T Z i σ i ( t ) σ i ( t p i ( t ) ) i = 1 m d ¯ i d ¯ i p i ( t ) σ i ( t p i ( t ) ) σ i ( t d ¯ i ) T Z i σ i ( t p i ( t ) ) σ i ( t d ¯ i ) i = 1 m σ i ( t ) σ i ( t p i ( t ) ) σ i ( t p i ( t ) ) σ i ( t d ¯ i ) T Z i W i Z i σ i ( t ) σ i ( t p i ( t ) ) σ i ( t p i ( t ) ) σ i ( t d ¯ i ) σ ( t ) σ ¯ ( t ) σ ( t ) σ ˜ ( t ) T Z W Z σ ( t ) σ ¯ ( t ) σ ( t ) σ ˜ ( t ) .
Based on the feature of the attack signal and the activation function, this yields
E 2 f T ( σ ( t ) ) Λ F σ ( t ) 2 f T ( σ ( t ) ) Λ f ( σ ( t ) ) 0 ,
E α σ ¯ T ( t ) L T L σ ¯ T ( t ) α g T ( σ ¯ ( t ) ) g ( σ ¯ ( t ) ) 0 .
For arbitrary matrices U 1 and U 2 , one can obtain
0 = E 2 σ T ( t ) U 1 T + σ ˙ T ( t ) U 2 T σ ˙ ( t ) ( I N C ) σ ( t ) + ( I N B ) f ( σ ( t ) ) ( L p I n ) σ ( t ) + ( 1 β ( t ) ) K σ ¯ ( t ) + β ( t ) K g ( σ ¯ ( t ) ) .
Based on the V ˙ ( t ) = i = 1 6 V ˙ i ( t ) and (9)–(13), one has
E V ˙ ( t ) E t k + 1 t d k ς T ( t ) Θ ( d k ) ς ( t ) + t t k d k ς T ( t ) Π ( d k ) ς ( t ) .
where ς ( t ) = col σ ( t ) , σ ˙ ( t ) , σ ( t k ) , σ ( t k + 1 ) , σ ¯ ( t k ) , σ ¯ ( t ) , σ ˜ ( t ) , f ( σ ( t ) ) , g ( σ ¯ ( t ) ) . From (7) and (8), Θ ( d 1 ) < 0 and Θ ( d 2 ) < 0 , and Θ ( d k ) < 0 is guaranteed based on the convex combination technique. Similarly, Π ( d k ) < 0 can be guaranteed if Π ( d 1 ) < 0 and Π ( d 2 ) < 0 . Then, we can know that
E V ˙ ( t ) < 0 , t [ t k , t k + 1 ) .
So, based on (20), we can know that
E V ( t ) E V ( t k ) E V ( t k 1 ) E V ( 0 ) .
When t [ t k , t k + 1 ) , we can derive the following norm estimate:
E σ ( t ) E σ ( t k i i ) + t k i i t C ¯ σ ( s ) d s + t k i i t B ¯ f ( σ ( s ) ) d s + t k i i t K σ ¯ ( s ) d s + t k i i t K g ( σ ¯ ( s ) ) d s .
Using the Cauchy–Schwarz inequality, we can know that
E σ ( t ) 2 E 5 σ ( t k i i ) 2 + 5 t k i i t C ¯ σ ( s ) d s 2 + 5 t k i i t B ¯ f ( σ ( s ) ) d s 2 + 5 t k i i t K σ ¯ ( s ) d s 2 + 5 t k i i t K g ( σ ¯ ( s ) ) d s 2 E 5 σ ( t k i i ) 2 + 5 t k i i t C ¯ σ ( s ) d s 2 + 5 t k i i t B ¯ f ( σ ( s ) ) d s 2 + 5 t k i i t K σ ¯ ( s ) d s 2 + 5 t k i i t K g ( σ ¯ ( s ) ) d s 2 E 5 σ ( t k i i ) 2 + 5 d ¯ C ¯ 2 t k i i t σ ( s ) 2 d s + 5 d ¯ B ¯ F 2 t k i i t σ ( s ) 2 d s + 5 d ¯ 2 K 2 σ ¯ ( t ) 2 + 5 d ¯ 2 K 2 L 2 σ ¯ ( t ) 2 E 5 σ ( t k i i ) 2 + 5 d ¯ K 2 σ ¯ ( t ) 2 + 5 d ¯ K 2 L 2 σ ¯ ( t ) 2 + 5 d ¯ C ¯ 2 + B ¯ 2 F ¯ 2 t k i i t σ ( s ) 2 d s .
Add up the m inequalities for i = 1, 2, …, m:
E σ ( t ) 2 E 5 m σ ( t k 1 1 ) 2 + σ ( t k 2 2 ) 2 + + σ ( t k i i ) 2 + 5 d ¯ K 2 1 + L 2 σ ¯ ( t ) 2 E 5 d ¯ m C ¯ 2 + B ¯ 2 F ¯ 2 t k 1 1 t σ ( s ) d s + t k 2 2 t σ ( s ) d s + + t k i i t σ ( s ) d s E 5 m + 5 d ¯ K 2 1 + L 2 σ ( t k 1 1 ) 2 + σ ( t k 2 2 ) 2 + + σ ( t k i i ) 2 + 5 d ¯ C ¯ 2 + B ¯ 2 F ¯ 2 m i n 1 t m t k i i t σ ( s ) 2 d s E 5 m + 5 d ¯ K 2 1 + L 2 e 5 d ¯ 2 C ¯ 2 + B ¯ 2 F ¯ 2 σ ( t k 1 1 ) 2 + σ ( t k 2 2 ) 2 + + σ ( t k i i ) 2 E ω σ ( t k 1 1 ) 2 + σ ( t k 2 2 ) 2 + + σ ( t k i i ) 2 E ω λ min ( P ) λ min ( P ) σ ( t k 1 1 ) 2 + σ ( t k 2 2 ) 2 + + σ ( t k i i ) 2 E ω λ min ( P ) σ T ( t k 1 1 ) P σ ( t k 1 1 ) + σ T ( t k 2 2 ) P σ ( t k 2 2 ) + + σ T ( t k m m ) P σ ( t k m m ) E ω e 2 α t k λ min ( P ) V 1 ( t k 1 1 ) , V 1 ( t k 2 2 ) , , V m ( t k m m ) e 2 α t e 2 α ( t t k ) E m ω e 2 α ( d 1 + t k ) λ min ( P ) V ( 0 ) e 2 α t .
where ω = 5 m + 5 d ¯ K 2 1 + L 2 e 5 d ¯ 2 C ¯ 2 + B ¯ 2 F ¯ 2 .
E V ( 0 ) = E σ T ( 0 ) P σ ( 0 ) E λ m a x ( P ) σ ( 0 ) 2 .
Then, one can obtain
E σ ( t ) E ϱ σ ( 0 ) e α t .
where ϱ = e α ( d 1 + t k ) m ω λ m a x ( P ) λ m i n ( P ) . So, system (5) is exponentially stable; that is, CCNNs (1) and (3) achieve bipartite synchronization under controller (4).
Theorem 2.
For given scalars d 2 > d 1 > 0 , τ > 0 , α > 0 , γ > 0 , and h ¯ > 0 , if there exist N n × N n matrices P > 0 , Y > 0 , D > 0 , Q > 0 , S i > 0 , and Z i > 0 ; arbitrary matrices R, H, and W; 2 N n × 2 N n matrices X and R; 3 N n × 3 N n matrix M; and N n × N n diagonal matrices U 1 , U 2 , and Λ, U 2 = ς U 1 and G 1 = U 1 T K for d k d 1 , d 2 . The control gain can be solved by K = U 1 1 G 1 .
Proof. 
Let U 2 = ς U 1 , G 1 = U 1 T K in LMIs (7) and (8); then, we can solve the feedback gain K using the MATLAB LMI toolbox. The proof is complete. □

5. Numerical Examples

Consider the CCNNs ϕ i ( t ) , i = 1 , , 4 . The directed graph of the CCNNs is shown in Figure 2. The parameters and the activation function of each node are as follows:
C = 0.9712 0 0 0 0.9712 0 0 0 0.9712 , B = 0.05 0.03 0.0125 0.0625 0.0425 0.0287 0.2225 0 0.0113 ,
f ( ϕ i ( t ) ) = t a n h ( ϕ i ( t ) ) ,
Then, let F i j = 1 .
Based on Assumption 1 and Figure 2, we can know that the directed graph of the CCNNs is structurally balanced and the node set can be divided into ν 1 = { 1 , 3 } and ν 2 = { 2 , 4 } . Here, we set a four-node CCNNs to show the effectiveness of the control scheme. In the future, we will design a 100-node CCNN, and then, it can be used in the simulation section.
Set the initial conditions as follows: S ( 0 ) = ( 0 , 0.76 , 0 ) , ϕ 1 ( 0 ) = ( 0.5 , 0.5 , 1.6 ) , ϕ 2 ( 0 ) = ( 1.2 , 1.5 , 0 ) , ϕ 3 ( 0 ) = ( 0.5 , 0.6 , 0.5 ) , and ϕ 4 ( 0 ) = ( 0.5 , 0.6 , 1.5 ) . With some calculation, we can derive some parameters:
A P = 0 0 0 0.2 0.3 0 0 0.3 0 0.4 0 0 0 0 0.2 0 , L P = 0.2 0 0 0.2 0.3 0.6 0 0.3 0 0.4 0.4 0 0 0 0.2 0.2 .
Based on Lemma 1 and Figure 2, we can know that there exists a diagonal matrix
Ξ = 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 ,
and then,
L q = Ξ L p Ξ = 0.2 0 0 0.2 0.3 0.6 0 0.3 0 0.4 0.4 0 0 0 0.2 0.2 .
As long as Theorem 2 can be solved in MATLAB, the bipartite synchronization behavior can be achieved by choosing specific parameters. Set α = 0.2 ,   d 1 = 0.01 ,   d 2 = 0.2 , and γ = 0.5 . Two sensors with different sampling rates, d ¯ 1 = 0.2 and d ¯ 2 = 0.15 , are selected for each node. It can be seen that the sampling schemes are different between the two sensors. Assign the first two state variables of each node to d ¯ 1 and the third state variable to d ¯ 2 = 0.15 ; then, we derive τ = I 4 d i a g ( 0.2 , 0.2 , 0.15 ) . Here, the deception signals are considered as follows:
g ( σ ¯ i ( t ) ) = c o l ( t a n h ( 0.2 σ ¯ i 1 ( t ) ) , t a n h ( 0.1 σ ¯ i 2 ( t ) ) , t a n h ( 0.2 σ ¯ i 3 ( t ) ) ) .
From Assumption 2, one can obtain
L = I 4 d i a g ( 0.2 , 0.2 , 0.2 ) .
Based on Theorem 2, we can derive the feedback gain by the MATLAB LMI toolbox (2016 version) as follows:
K = d i a g { K 1 , K 2 , K 3 , K 4 }
where
K 1 = d i a g { 0 , 0 , 0 } , K 2 = d i a g { 5.5 , 5.5 , 5.5 } , K 3 = d i a g { 0 , 0 , 0 } , K 4 = d i a g { 5.5 , 5.5 , 5.5 } .
From Figure 3, one can see that node 2 and node 3 have the same trajectory with the leader s ( t ) as times goes by. On the other hand, node 1 and node 4 have the same trajectory with s ( t ) . Also, Figure 4 displays the responses of σ i ( t ) , σ i ( t k ) , i = 1 , 2 , , 4 . It can be seen that σ i ( t ) and σ i ( t k ) converge to 0. It is clear why the states of systems (1) and (3) are said to achieve bipartite synchronization under theorem 2. Hence, we can draw a conclusion that CCNNs (1) and (3) achieve bipartite synchronization under controller (4).
Implementation Considerations: The purpose of the proposed LMIs is to identify matrices that ensure the LMIs in Theorem 1 are satisfied. It is worth noting that LMI optimization is an active field in applied mathematics and optimization. The MATLAB toolbox facilitates solving the unknown matrices in Theorem 1. If these unknown matrices can be determined using the MATLAB toolbox, it indicates that the LMIs are solvable.

6. Conclusions

This paper uses signed graph theory to model CCNNs for describing cooperation–competition interactions. To tackle the challenge of constructing an error system caused by non-positive, definite adjacency matrices, a zero-row-sum Laplacian matrix is obtained through coordinate transformation, facilitating error system modeling. In order to counter deception attacks while maintaining performance, a security control scheme is designed, which integrates asynchronous sampling control. A bilateral loop function is suggested to reduce conservatism by encapsulating state information. By employing Lyapunov-based lemmas and inequality techniques, sufficient conditions for bipartite synchronization under deception attacks are derived. Simulations confirm the effectiveness of the synchronization criteria.

Author Contributions

Writing—original draft preparation, S.F.; supervision, Y.S.; investigation, Z.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the State Grid Hubei Electric Power Co., Ltd. SKDHKQ20230683.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

We would like to express our great appreciation to the editors and reviewers.

Conflicts of Interest

The authors declare that this study received funding from the State Grid Hubei Electric Power Co., Ltd. The funder was not involved in the study design, collection, analysis, interpretation of data, the writing of this article or the decision to submit it for publication.

Abbreviations

The following abbreviations are used in this manuscript:
CCNNsCooperation–competition neural networks;
LMILinear matrix inequality.

References

  1. Wu, Z.; Li, Q.; He, B. Practical vertical federated learning with unsupervised representation learning. IEEE Trans. Big Data 2022, 10, 864–878. [Google Scholar] [CrossRef]
  2. Huang, W.; Wang, D.; Ouyang, X.; Wan, J.; Liu, J.; Li, T. Multimodal federated learning: Concept, methods, applications and future directions. Inf. Fusion 2024, 112, 102576. [Google Scholar] [CrossRef]
  3. Guo, D.; Liu, Z.; Li, R. RegraphGAN: A graph generative adversarial network model for dynamic network anomaly detection. Neural Netw. 2023, 166, 273–285. [Google Scholar] [CrossRef]
  4. Xue, L.; Wu, H.; Zheng, H.; He, Z. Control chart pattern recognition for imbalanced data based on multi-feature fusion using convolutional neural network. Comput. Ind. Eng. 2023, 182, 109410. [Google Scholar] [CrossRef]
  5. Zhang, H.; Wang, J.; Wang, Z.; Liang, H. Mode-dependent stochastic synchronization for Markovian coupled neural networks with time-varying mode-delays. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 2621–2634. [Google Scholar] [CrossRef] [PubMed]
  6. Luo, Y.; Wang, Z.; Chen, Y.; Yi, X. State estimation for coupled stochastic complex networks with periodical communication protocol and intermittent nonlinearity switching. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1414–1425. [Google Scholar] [CrossRef]
  7. Liu, F.; Song, Q.; Wen, G.; Lu, J.; Cao, J. Bipartite synchronization of Lur’e network under signed digraph. Int. J. Robust Nonlinear Control 2018, 28, 6087–6105. [Google Scholar] [CrossRef]
  8. Zhou, B.; Yang, Y.; Li, L.; Xu, X.; Yang, R. Bipartite consensus for second-order multi-agent systems with external disturbances via constraint data-sampled impulsive method. Commun. Nonlinear Sci. Numer. Simul. 2022, 109, 106314. [Google Scholar] [CrossRef]
  9. Chi, X.; Liu, X.; Jia, X. Multi-rate sampled-data observer-based networked load frequency control for multi-area interconnected power systems under multiple cyber-attacks. J. Frankl. Inst. 2025, 362, 107427. [Google Scholar] [CrossRef]
  10. He, Y.; Zhu, D.; Chen, C.; Wang, Y. Data-driven control of singularly perturbed hybrid systems with multi-rate sampling. ISA Trans. 2024, 148, 490–499. [Google Scholar] [CrossRef]
  11. Chi, X.; Jia, X.; Cheng, F.; Fan, M. Networked H filtering for Takagi–Sugeno fuzzy systems under multi-output multi-rate sampling. J. Frankl. Inst. 2019, 356, 3661–3691. [Google Scholar] [CrossRef]
  12. Park, J.; Park, P. An improved stability criterion for linear systems with multi-rate sampled data. Nonlinear Anal. Hybrid Syst. 2020, 38, 100947. [Google Scholar] [CrossRef]
  13. Chang, Q.; Park, J.H.; Yang, Y. The optimization of control parameters: Finite-time bipartite synchronization of memristive neural networks with multiple time delays via saturation function. IEEE Trans. Neural Netw. Learn. Syst. 2022, 34, 7861–7872. [Google Scholar] [CrossRef]
  14. Zhao, Y.; Zhou, Y.; Huang, P.; Chen, G. Appointed-time and attack-free bipartite synchronization of generic linear multiagent systems over directed switching networks. IEEE Trans. Autom. Control 2022, 67, 4498–4513. [Google Scholar] [CrossRef]
  15. Li, N.; Zheng, W.X. Bipartite synchronization of multiple memristor-based neural networks with antagonistic interactions. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 1642–1653. [Google Scholar] [CrossRef]
  16. Zhang, H.; Yan, X. Prescribed-time synchronization of Kuramoto oscillators over undirected network. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 3041–3045. [Google Scholar] [CrossRef]
  17. Akhmet, M.; Başkan, K.; Yeşil, C. Markovian noise-induced delta synchronization approach for Hindmarsh–Rose model. Chaos Solitons Fractals 2024, 185, 115155. [Google Scholar] [CrossRef]
  18. Matusik, R.; Michalak, A.; Nowakowski, A. Fixed-time anti-synchronization for reaction-diffusion neural networks. Comput. Math. Appl. 2024, 173, 19–32. [Google Scholar] [CrossRef]
  19. Feng, H.; Wu, Z.; Zhang, X.; Xiao, Z.; Zhang, M.; Tao, J. Secure adaptive event-triggered anti-synchronization for BAM neural networks with energy-limited DoS attacks. Inf. Sci. 2024, 670, 120594. [Google Scholar] [CrossRef]
  20. Sun, Y.; Hu, C.; Yu, J. Bipartite leaderless synchronization of fractional-order coupled neural networks via edge-based adaptive pinning control. J. Frankl. Inst. 2024, 361, 1303–1317. [Google Scholar] [CrossRef]
  21. Li, N.; Cao, J.; Wang, F. Bipartite secure synchronization criteria for coupled quaternion-valued neural networks with signed graph. Neural Netw. 2024, 180, 106717. [Google Scholar] [CrossRef]
  22. Yang, J.; Huang, J.; He, X.; Wen, S. Bipartite synchronization of signed Lur’e network via quantized control. IEEE Trans. Circuits Syst. II Express Briefs 2023, 70, 2475–2479. [Google Scholar]
  23. Yang, D.; Wang, H.; Ren, G.; Yu, Y.; Zhang, X.L. Exponential bipartite synchronization of distributed-order multilayer neural networks with antagonistic interactions via aperiodic intermittent control. Commun. Nonlinear Sci. Numer. Simul. 2025, 147, 108820. [Google Scholar] [CrossRef]
  24. Liu, X.; Qin, P. Parameter estimation and model-free multi-innovation adaptive control algorithms. Int. J. Control. Autom. Syst. 2024, 22, 3509–3524. [Google Scholar] [CrossRef]
  25. Zhu, S.; Zhou, J.; Lü, J.; Lu, J.A. Further on Synchronization of Dynamical Networks Via Adaptive Intermittent Control. IEEE Trans. Autom. Control 2024, 69, 7216–7222. [Google Scholar] [CrossRef]
  26. Wang, L.; Qi, R.; Jiang, B. Adaptive fault-tolerant optimal control for hypersonic vehicles with state constrains based on adaptive dynamic programming. J. Frankl. Inst. 2024, 361, 106833. [Google Scholar] [CrossRef]
  27. Zhang, S.; Ding, X.; Lu, J.; Lou, J.; Liu, Y. Output-feedback stabilization of probabilistic Boolean control networks. Nonlinear Anal. Hybrid Syst. 2024, 53, 101505. [Google Scholar] [CrossRef]
  28. Liang, H.; Chen, L.; Pan, Y.; Lam, H.K. Fuzzy-based robust precision consensus tracking for uncertain networked systems with cooperative–antagonistic interactions. IEEE Trans. Fuzzy Syst. 2022, 31, 1362–1376. [Google Scholar] [CrossRef]
  29. Park, P.; Ko, J.W.; Jeong, C. Reciprocally convex approach to stability of systems with time-varying delays. Automatica 2011, 47, 235–238. [Google Scholar] [CrossRef]
Figure 1. Functions p 1 ( t ) , p 2 ( t ) , and p ( t ) for asynchronous sampled-data control system with two sensors.
Figure 1. Functions p 1 ( t ) , p 2 ( t ) , and p ( t ) for asynchronous sampled-data control system with two sensors.
Axioms 14 00625 g001
Figure 2. Directed signed digraph of CNNs.
Figure 2. Directed signed digraph of CNNs.
Axioms 14 00625 g002
Figure 3. Bipartite synchronization of σ i ( t ) , σ i ( t k ) , and s ( t ) , i = 1 , 2 , , 4 .
Figure 3. Bipartite synchronization of σ i ( t ) , σ i ( t k ) , and s ( t ) , i = 1 , 2 , , 4 .
Axioms 14 00625 g003
Figure 4. Time responses of ϕ i j ( t ) and s i ( t ) , i = 1 , 2 , , 4 , j = 1 , 2 , 3 .
Figure 4. Time responses of ϕ i j ( t ) and s i ( t ) , i = 1 , 2 , , 4 , j = 1 , 2 , 3 .
Axioms 14 00625 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fan, S.; Shi, Y.; Wei, Z. Bipartite Synchronization of Cooperation–Competition Neural Networks Using Asynchronous Sampling Scheme. Axioms 2025, 14, 625. https://doi.org/10.3390/axioms14080625

AMA Style

Fan S, Shi Y, Wei Z. Bipartite Synchronization of Cooperation–Competition Neural Networks Using Asynchronous Sampling Scheme. Axioms. 2025; 14(8):625. https://doi.org/10.3390/axioms14080625

Chicago/Turabian Style

Fan, Shuxian, Yongjie Shi, and Zhongliang Wei. 2025. "Bipartite Synchronization of Cooperation–Competition Neural Networks Using Asynchronous Sampling Scheme" Axioms 14, no. 8: 625. https://doi.org/10.3390/axioms14080625

APA Style

Fan, S., Shi, Y., & Wei, Z. (2025). Bipartite Synchronization of Cooperation–Competition Neural Networks Using Asynchronous Sampling Scheme. Axioms, 14(8), 625. https://doi.org/10.3390/axioms14080625

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop