Abstract
For multi-input multi-output (MIMO) nonlinear discrete-time bipartite formation multiagent systems (BFMASs) performing trajectory tracking tasks with unknown dynamics, a dynamic event-triggered model-free adaptive iterative learning control (DET-MFAILC) algorithm is proposed to address periodic denial-of-service (DoS) attacks. First, using the pseudo-partial derivative, a compact format dynamic linearization (CFDL) method is employed to construct an equivalent CFDL data model for the MIMO multi-agent system. A DoS attack model and its corresponding compensation algorithm are developed, while a dynamic event-triggered condition is designed considering both the consensus error and the tracking error. Subsequently, the proposed DoS attack compensation algorithm and the dynamic event-triggered mechanism are integrated with the model-free adaptive iterative learning control algorithm to design a controller, which is further extended from fixed-topology systems to time-varying topology systems. The convergence of the control system is rigorously proven. Finally, simulation experiments are conducted on bipartite formation multi-agent systems (BFMASs) under fixed and time-varying communication topologies. The results demonstrate that the proposed algorithm effectively mitigates the impact of DoS attacks, reduces controller updates, conserves network resources, and ensures that both the tracking error and consensus error converge to an ideal range close to zero within a finite number of iterations while maintaining a good formation shape.
1. Introduction
The control of a single agent is no longer sufficient to meet the demands of complicated activities due to the recent rapid development of agent applications in a variety of industries. As a result, multi-agent systems (MASs) formation control has attracted significant attention from scholars and researchers. MASs are widely applied to collaboratively accomplish various complex tasks, such as target tracking [1], UAV swarm missions [2], and environmental detection [3]. Formation control is one of the core functions of MASs, with the primary objective of controlling multiple agents to form a specific formation for cooperative operations. Currently, increasing research efforts have been directed toward formation control, leading to numerous achievements. For example, ref. [4] studies formation control for quadrotor UAVs, while ref. [5] discusses formation control for underwater vehicles.
It is worth noting that most existing studies adopt model-based control (MBC) methods to address such problems, requiring an accurate mathematical model of the MASs and assuming that all agents have identical structures. However, in practice, obtaining the plant’s accurate mathematical models is challenging, and MASs often consist of heterogeneous agents operating in complex environments with numerous uncertainties. Therefore, MBC methods are difficult to generalize and apply to practical systems. To address this challenge, data-driven control (DDC) methods have gained increasing attention, as they avoid the need for accurate data models. Various DDC approaches have emerged, such as reinforcement learning control [6], model-free adaptive control (MFAC) [7,8,9], and iterative learning control (ILC) [10,11,12]. Among these methods, MFAC designs controllers are solely based on the input/output (I/O) data of the controlled system, without requiring implicit or explicit system models, making it particularly suitable for heterogeneous MASs.
The model-free adaptive iterative learning control (MFAILC) method combines MFAC and ILC and is effective for controlling unknown nonlinear non-affine systems with repetitive operations. This method ensures monotonic convergence of system output errors along the iteration axis. Ref. [13] studies a bipartite formation event-triggered control scheme for single-input single-output (SISO) systems, introducing an observer to estimate outputs and designing event-triggered conditions based on the difference between observed and actual outputs. Ref. [14] employs the matrix transformation and the property of the nonnegative matrix, guaranteeing the iterative asymptotic convergence of the error of the SISO-type MASs under the structurally balanced digraph with an oriented spanning tree.
Moreover, information exchange between agents relies on network communication. The stability and security of formation systems are now significantly impacted by network attacks due to the rapid growth of network technology. Information transmission channels between agents often experience instability and physical limitations, making MASs susceptible to various network attacks, such as denial-of-service (DoS) attacks, deception attacks, and replay attacks [15,16,17]. Among these, DoS attacks are the most common, causing system instability or even loss of control. Therefore, addressing formation control problems under network attacks has become a research hotspot for MASs. Event-triggered mechanisms, which update the controller only when certain triggered conditions are met, can significantly reduce communication burdens and computational pressure [18], thereby alleviating the impact of DoS attacks to some extent. However, they cannot entirely eliminate the adverse effects caused by DoS attacks. Ref. [19] proposes a resilient event-triggered mechanism that effectively mitigates periodic DoS attacks while conserving network resources. In order to lessen the impact of DoS attacks, Zhao [20] suggests a hierarchical resilient learning technique and creates a virtual reference signal for every agent to estimate the time-varying reference signal. Additionally, ref. [21] presents an attack detection mechanism and buffer-based compensation strategies to address the adverse effects of DoS attacks. Designing more effective compensation strategies to minimize or eliminate the impact of DoS attacks remains an important research challenge.
The bipartite formation trajectory tracking problem for unknown non-affine nonlinear MASs that are subject to recurring DoS attacks is discussed in this study. The following is a summary of this work’s primary contributions:
- 1.
- For MIMO heterogeneous multi-agent bipartite formation systems with unknown dynamics, a controller is designed based on the MFAILC method.
- 2.
- To address the impact of periodic DoS attacks on MIMO heterogeneous MASs, a DoS attack compensation mechanism is introduced within the MFAILC framework to mitigate the effects of such attacks.
- 3.
- An improved dynamic event-triggered mechanism is proposed, which incorporates both consensus error and tracking error into the dynamic triggered condition. Compared to the event-triggered conditions in ref. [22], the proposed mechanism significantly reduces controller updates, alleviates communication and computational pressure, and further enhances the system’s resilience against DoS attacks.
This is how the remainder of the paper is structured: Graph theory and modeling of periodic DoS attacks are introduced in Section 2. The controller design is detailed in Section 3. The system stability analysis and dynamic event-triggered mechanism are discussed in Section 4. Section 5 reports the simulation experiments. Finally, the conclusions are summarized in Section 6.
2. Preliminaries and Problem Formulation
2.1. Algebraic Graph Theory
Graph theory is an effective tool for describing the communication relationships among agents in MASs. Taking Figure 1 as an example, it illustrates the communication topology among the agents. The communication topology of this system can be represented as a directed graph . presents the node set of the directed graph , where , N represents the number of agents, and consists of two subsets and , satisfying and . denotes the edge set of the directed graph . As shown in Figure 1, the topology represents a bipartite Formation Multi-Agent System (BFMAS). The direction of information flow between nodes is indicated by the arrows. Nodes within the same subset are considered to have a cooperative relationship, and the information flow arrows for such nodes are colored black. Conversely, nodes in different subsets are regarded as having a competitive relationship, and the arrows indicating information flow between these nodes are colored red. In the adjacency matrix A, the diagonal elements , while the off-diagonal elements are determined by the relationship between the nodes and their respective subsets. If node p can receive signals from node j and both nodes belong to the same subset, then . If the two nodes belong to different subsets, then . If there is no information flow between the two nodes, . The Laplacian matrix of the directed graph can be expressed as , . Here, , . Therefore, matrix is defined to describe the subset attributes of node . For example, when node , ; if node , .
Figure 1.
Communication topology of the agents.
For leaderless BFMASs, each agent adjusts its state solely based on the information from its neighboring agents, without a clear goal. This may lead to local optimal solutions or chaotic movements among the agents. Introducing a virtual leader as a reference point can provide a common goal or direction for all agents, enabling better coordination. In Figure 1, node 0 represents the virtual leader. The connection matrix describes the information flow between the virtual leader and the agents. If node p can receive signals from the virtual leader, ; otherwise, .
Furthermore, for BFMASs with time-varying and switching communication topologies, the time-varying communication topology can be described by a directed graph . Here, represents all possible communication topologies of the BFMAS. The Laplacian matrix of the directed graph is denoted as , where , and is the connection matrix between the virtual leader and the agents.
2.2. Problem Formulation
For the repeatedly operated BFMASs, a multi-input multi-output (MIMO) agent p can be described as a nonlinear system as follows:
here, k represents the sampling instant , , where N is the number of agents. and are unknown positive integers, and are the system output and the control input of agent p in the iteration and the sampling instant k, respectively. denotes an unknown nonlinear function.
To obtain the equivalent linearized model of the MASs, the assumptions are as follows:
Assumption 1.
has a continuous partial derivative with regard to , i.e., exists and is continuous.
Assumption 2.
For all and, if, then the generalized Lipschitz condition holds for Equation (1) in the iterative domain, i.e.,
here, and . Both and are bounded, and b is a finite constant.
Assumption 3.
The communication topology of the MASs is strongly connected, meaning that each agent has a communicable path to the virtual leader.
Remark 1.
For many practical control systems, Assumptions 1 and 2 are reasonable. Assumption 1 represents a typical constraint imposed on general nonlinear systems in control system design. Assumption 2 imposes an upper limit on the rate of change of the system output caused by variations in the control input along the iterative axis. These assumptions have also been discussed in the literature, such as [12,13,23].
Theorem 1.
For the agent described in system (1) that satisfies Assumptions 1 and 2, when , there must exist a time-varying pseudo-Jacobian matrix (PJM) associated with the iterative axis, such that the agent can be equivalently represented by the following compact-form dynamic linearization (CFDL) data model:
Here, as below
Moreover, , , denotes a positive constant.
Consequently, the following linearized model can be used to rewrite the relationship between the nonlinear agent p’s system input and output:
For the agent p in Equation (1), the trajectory of the virtual leader is considered as the reference output curve, denoted by , where represents the leader’s position at time k. Considering that there exists a distance gap between the followers and the leader in the formation system, the tracking error of agent p in the bipartite formation system is defined as:
In the above equation, is the relative distance between agent p and the virtual leader, is the output of the each agent, and represents the node attribute of agent p in the communication topology graph, i.e., the membership indicator of agent p in the subset. The tracking error serves as a response to the agents’ ability to track in accordance with their individual desired curves. Then, the distributed formation error of agent p in the bipartite formation system is defined as:
here, represents the neighboring agents of agent p, and indicates whether there is a competitive or cooperative relationship between agent p and agent j. indicates if agent p is able to obtain information from the virtual leader . The system’s agents’ ability to maintain consensus and complete the task can be determined by the formation error.
3. Design of the Controller Scheme
3.1. Modeling of Periodic DoS Attacks
Due to the inherent unreliability of the information transmission channels between multiple agents, the system is prone to being affected by DoS attacks during the information transmission process. Generally speaking, DoS attacks are divided into two types: attacks on individual agents within the multi-agent system and attacks on the communication channels between the agents. This paper primarily focuses on the latter and assumes that the DoS attack is energy-constrained and periodic. The attacker performs attacks on the communication channels between the multi-agent system during the attack period, while reserving energy during the dormant period for the next attack. For each iteration, the attacker’s attack period is within , as shown in Figure 2.
Figure 2.
Schematic diagram of DoS attack working cycle.
In Figure 2, is the start time of the attack in the attack period , and is the end time of the attack in the attack period . The time interval is defined as the attack period when the DoS attacker is actively attacking, and the time interval is defined as the dormant period when the DoS attacker is resting. For the data transmission process in the BFMASs, the dormant period of the attacker is defined as , and the attack period is defined as , where:
In MASs under periodic DoS attacks, the probability of successful data transmission between agents follows a Bernoulli distribution. Let represent the success or failure of data transmission between agents. A successful data transmission is indicated by , whereas a failure data transfer is shown by . The probability of successful transmission is denoted as , and the probability of transmission failure is .
To reduce the influence of DoS attack, a DoS attack compensation is designed as below:
Remark 2.
The two primary components of the attack compensation system are and . If information transmission fails, the distributed formation error of agents is denoted as . In this case, the controller will use the most recent data received stored in the buffer to compensate for the effects of the DoS attack.
3.2. Design of the Dynamic Event-Triggered Mechanism
To lessen the strain of communication amongst agents in BFMASs and effectively conserve communication resources, an event-triggered mechanism is used to decrease the update frequency of control inputs. This is an effective approach.
Considering the effects of both the formation error and tracking error, the DET conditions are designed as follows:
where is the formation error of agent p recorded during the iteration, is the formation error from the previous iteration, and , is a small positive constant.
The dynamic variant is defined as follows:
denotes the number of iterations when the event is triggered, which is obtained by the following equation:
The convergence proof of the event-triggered condition is provided below.
Since , it follows from Equation (9) that
Taking the norm on both sides of Equation (10), we obtain:
Let and ; there exists a constant such that . Thus, .
3.3. Design of the MFAILC Controller Based on the Event-Triggered Mechanism
For the BFMASs, based on the CFDL data model (4) of agent p and the formation error , the control update law is defined as follows [24]:
According to Equations (8) and (14), combined with , this satisfies the event-triggered condition and the iteration sequence satisfying the event-triggered condition is recorded. Considering that is difficult to obtain directly, its estimated value is used as a substitute. Incorporating the event-triggered mechanism, a further rewrite of the control input update law (14) is as follows:
Here, is the step factor and is the weight factor. The parameter has a large impact on the algorithm; the smaller the , the faster the system responds while the amount of overshooting is larger. Conversely, the slower the response of the system, the smaller the amount of overshooting. For the of Equation (15), an objective function is defined as below:
To proceed with the partial derivative of Equation (16) with respect to and set , we can obtain the parameter estimation law as follows:
In Equation (17), the weight factor and the step factor are used to update the PJM; the range of values of and is given in the proof section. The selection of and can be referred to and . To ensure the algorithm is general and applicable, the following two conditions need to be satisfied:
where and are the initial values of and , . Remark: Without the above reset condition there may be unstable control effects.
4. Proof of Convergence
The main goal of the section is to demonstrate that the algorithm suggested in this paper is convergent. Before proceeding with the convergence proof derivation, the following lemma should be considered:
Lemma 1
([9]). The relationship between the parameters representing the information transmission relationship between neighbors in a directed graph, the parameters of the adjacency relationship, and the parameters of the subordinate subset of the agent is as follows:
- (1)
- ;
- (2)
- ;
- (3)
here, W, A, , D, .
Lemma 2
([8]). Let denote an irreducible sub-stochastic matrix with positive diagonal entries that changes with each iteration and P are P matrices arbitrarily selected from M. Then, we have:
where .
Theorem 2.
Considering MIMO-type agents in BFMASs that satisfy the conditions of Assumptions 1 and 2. The parameter satisfies the following conditions:
4.1. Boundedness of the
Taking the norm of both sides of Equation (21), it follows from Theorem 1 that:
Squaring both sides of the norm in the above equation, we obtain:
Selecting and , then
From the above, is bounded; since is bounded, we obtain a conclusion that and are bounded.
4.2. Convergence Analysis of the Tracking Error for Agents
The parameters are defined as follows:
From Lemma 1, the consensus error can be rewritten in the following form:
Multiplying both sides of Equation (26) by , we obtain the following:
Rewriting (27) as below:
where , since , and hence is an invertible matrix. From Equation (28), we have
Considering the two cases of event-triggered and non-event-triggered for BFMASs that is, when and hold, the control input is unchanged from the last triggered iteration. The following is obtained:
where , .
Since , where , and the desired distance among each agent and the virtual leader is a time-invariant constant, it follows that:
When combined with (30), we obtain the following:
where . Taking the norm of both sides of Equation (32), we have
where ,
.
Rewriting as below
Taking the norm of (37)’s two sides, we obtain
Defining and verifying the boundedness of as the following part. Since and have the same sign, .Therefore, when , there is a such that we have
From the above, the block matrix . Theorem 2 states that is a graph with strong connections. Combining Equation (39), we select a such that is an irreducible sub-stochastic matrix that contains diagonal components that are positive, and at least one row of is strictly less than 1. Thus, the conclusion is that is bounded.
Since the matrix has zero diagonal elements, by the Gerschgorin Circle Theorem, we have:
where , . The eigenvalues of are , and all eigenvalues lie within the union and are less than or equal to the spectral radius, i.e., . Therefore, there exists a such that and . We can obtain
From the above situation, it follows that by selecting , we obtain , where is an arbitrarily small positive number. Thus, we have .
Combining the boundedness of and , the boundedness of is verified as follows:
where
The recursion relation for Equation (42) is given as follows:
From Lemma 2, we have
where is the floor function. For , it is required that , i.e., satisfies the following conditions:
From the above, it can be concluded that when , we have and converging. From Equation (28), it follows that is bounded.
4.3. Time-Varying Communication Switching Topology
The situation of time-varying communication topology in BFMASs control is discussed in this paper. The topology of BFMASs is represented by , where . Equation (6) is revised as follows:
Considering that in the BFMASs, the agent (1) is constrained by Assumptions 1 and 2, and the time-varying topology is constrained by Assumption 3, the following can be derived from Equation (19):
Combining with (47) and the below equation
By repeating the proof process in (2), it can be concluded that is bounded in a time-varying communication topology system. From Equation (28), it follows that is bounded.
5. Simulation Examples
To confirm the efficacy of the proposed design in this study, this section conducts multi-agent bipartite formation control simulations from different perspectives and analyzes the results. In the experiments, the MIMO agents that form the multi-agent system are selected according to Equation (49). It should be mentioned that Equation (49) does not contribute to the controller architecture; rather, it exists solely to create the agents’ input-output data. The experimental environment is as follows: CPU—AMD Ryzen 7 5800H, RAM—16 GB, software version—MATLAB2022b.
where , p=1,2,3,4,5,6, , , .
The trajectory of the virtual leader: .
The desired distance between the virtual leader and each agent is selected as follows:
5.1. Simulation Experiment of BFMASs with a Fixed Topology
As illustrated in Figure 1, the BFMASs in the experiment are composed of one virtual leader and six followers, with a communication topology structure. The union of two sets is the directed graph’s vertex set, , where and are the sets of vertices corresponding to the virtual leader and followers, respectively. The agents in set are assigned the formation control task with the desired trajectory , while the agents in set are assigned the formation control task with the desired trajectory . The Laplacian matrix of this BFMAS is given by:
The matrix of relationships between the agents and the virtual leader is .
Selecting the initial system output as
Selecting the initial system input as and the related parameters , , , . The initial PJM is as .
5.1.1. Simulation Experiment of BFMASs Under DoS Attacks
In order to confirm the effectiveness of the proposed scheme for BFMASs control under DoS attacks, simulation experiments are conducted using the traditional MFAILC scheme and the proposed DET-MFAILC scheme.
Figure 3 illustrates the periodic DoS attacks on the multi-agent system. The gray areas represent the active periods of the periodic DoS attacks, while the remaining areas represent the dormant periods. During the dormant periods of DoS attacks, the data transmission success rate between agents is set to 0.9, while during the active periods, the success rate is reduced to 0.7.
Figure 3.
Diagram of periodic DoS attacks.
Figure 4 and Figure 5 show the output results of the multi-agent formation at the 250th iteration and the output curves of each agent along the iteration axis, respectively, under periodic DoS attacks using the traditional MFAILC scheme. It is evident that due to the impact of DoS attacks, the agents do not track the trajectory of the virtual leader. The maximum tracking error of each agent along the iteration axis is shown in Figure 6. It can be observed that the maximum tracking error of each agent cannot converge to an ideal range.
Figure 4.
System output of MFAILC under DoS attack (300th iteration).
Figure 5.
Tracking performance curves of MAFILC under DoS attack (300th iteration).
Figure 6.
Maximum tracking error of MAFILC under DoS attack.
Figure 7 and Figure 8 depict the output of the system under the MFAC algorithm with the same parameter conditions. Figure 9 and Figure 10 illustrate the formation control results at the 280th iteration and the output curves of each agent, respectively, using the proposed DET-MFAILC scheme with the DoS attack compensation mechanism under DoS attacks. It can be observed that the agents in the bipartite formation system effectively track the trajectory of the virtual leader. Figure 11 shows the maximum tracking error curves of the agents in this experiment. Despite the impact of DoS attacks, the maximum tracking errors of all agents converge stably and approach zero after 280 iterations. It can be seen that the tracking performance of the MFAC algorithm without the effect of DoS attacks is also significantly weaker than that of this paper. Figure 12 shows the variation in the mean squared error of with the number of iterations, showing that it gradually decreases with the number of iterations.
Figure 7.
MAFC system output.
Figure 8.
Tracking performance curves of MFAC.
Figure 9.
DET-MAFILC system output with compensation mechanism under Dos attack (280th iteration).
Figure 10.
Tracking performance curves of DET-MAFILC with compensation mechanism under DoS attack (280th iteration).
Figure 11.
Maximum tracking error of agents under DoS attacks.
Figure 12.
The MSE of .
5.1.2. Simulation Experiment of BFMASs Under Different Event-Triggered Condition
Comparing with [22], this paper incorporates both the consensus error and tracking error into the DET condition, resulting in a new DET condition, as shown in Equation (9). To verify its effectiveness, simulation experiments are conducted within the DET-MFAILC scheme using the DET condition proposed in [22] and the improved event-triggered condition proposed in this paper. The experimental results are shown in Figure 13 and Figure 14, respectively.
Figure 13.
The ET signal of condition [22].
Figure 14.
The ET signal of this paper.
Using the DET condition from [22], it is evident that the number of event triggers during system operation decreases along the iteration axis but exhibits instability with fluctuations. In contrast, when using the DET condition proposed in this paper, the number of event triggers during system operation stabilizes and decreases significantly after 120 iterations. This shows how the event-triggered condition designed in this paper can more efficiently save network resources by reducing the amount of controller updates.
5.2. Extension to Time-Vraying Topology
This experiment verifies the effectiveness of the proposed DET-MFAILC scheme for controlling the formation of BFMASs with time-varying topologies. In the experiment, all initialization parameters are the same as those for the BFMASs with a fixed topology. The difference lies in that the communication topology of the BFMASs in this experiment is time-varying, as shown in Figure 15. The pattern of variation in the communication topology is as follows:
Figure 15.
Time-varying topology of BFMASs.
The simulation results are shown in Figure 16, Figure 17 and Figure 18. As can be seen in Figure 16 and Figure 17, all agents are able to effectively track the leader’s trajectory with good consensus. The tracking errors of the agents converge close to zero after 250 iterations, as shown in Figure 18. Furthermore, the formation shape of the agents is well maintained, as illustrated in Figure 19. These results verify that the proposed DET-MFAILC scheme also achieves good control performance in the bipartite formation control task of BFMASs with time-varying switching topologies.
Figure 16.
DET-MAFILC system output with compensation mechanism under Dos attack (250th iteration).
Figure 17.
Tracking performance curves of DET-MAFILC with compensation mechanism under DoS attack (250th iteration).
Figure 18.
Maximum tracking error of agents under DoS attacks.
Figure 19.
Formation at different sampling times k (250th iteration).
6. Conclusions
Unlike most studies that focus on MASs composed of SISO-type single agents, this paper investigates bipartite formation trajectory tracking control MASs composed of MIMO-type single agents, considering the impact of periodic DoS attacks. To mitigate the effects of DoS attacks on bipartite formation systems, a DoS attack compensation mechanism is introduced. To reduce the frequency of controller updates, conserve network resources, and alleviate computational pressure while further enhancing the system’s ability to resist DoS attacks, an event-triggered condition is designed to construct a DET mechanism. The DoS attack compensation algorithm and DET mechanism are combined with the MFAILC method for controller design. Furthermore, this algorithm is extended from fixed topology systems to time-varying topology systems, and the convergence of the system is proven.
The simulation results show that for MIMO-type bipartite formation systems under periodic DoS attacks, the proposed algorithm ensures that the tracking errors and consensus errors of the agents converge to an ideal range close to zero and the formation shape is well maintained. The algorithm effectively suppresses the impact of DoS attacks on the formation system and reduces the frequency of controller updates, thus conserving network resources. Future research will focus on further integrating predictive control to achieve faster system convergence.
Author Contributions
Conceptualization, H.L.; methodology, H.L. and L.F.; software, H.L. and W.W.; validation, H.L., L.F. and W.W.; formal analysis, H.L.; investigation, H.L.; resources, L.F.; data curation, H.L.; writing—original draft preparation, H.L.; writing—review and editing, H.L. and L.F.; visualization, H.L.; supervision, L.F. and W.W.; project administration, L.F.; funding acquisition, L.F. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the National Natural Science Foundation of China (No. 62263017).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
All of the data generated and analyzed during this work are included in this paper.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Briñón-Arranz, L.; Seuret, A.; Pascoal, A. Circular formation control for cooperative target tracking with limited information. J. Frankl. Inst. 2019, 356, 1771–1788. [Google Scholar] [CrossRef]
- Shao, S.; Zhao, Y.; Wu, X. Robust fixed-time formation control for quadrotor unmanned aerial vehicles with directed topology. TRansactions Inst. Meas. Control 2022, 44, 324–338. [Google Scholar] [CrossRef]
- Hu, J.; Niu, H.; Carrasco, J.; Lennox, B.; Arvin, F. Fault-tolerant cooperative navigation of networked UAV swarms for forest fire monitoring. Aerosp. Sci. Technol. 2022, 123, 107494. [Google Scholar] [CrossRef]
- Yu, Y.; Guo, J.; Chadli, M.; Xiang, Z. Distributed adaptive fuzzy formation control of uncertain multiple unmanned aerial vehicles with actuator faults and switching topologies. IEEE Trans. Fuzzy Syst. 2022, 31, 919–929. [Google Scholar] [CrossRef]
- Suryendu, C.; Subudhi, B. Formation control of multiple autonomous underwater vehicles under communication delays. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 3182–3186. [Google Scholar] [CrossRef]
- Yan, B.; Shi, P.; Lim, C.C.; Shi, Z. Optimal robust formation control for heterogeneous multi-agent systems based on reinforcement learning. Int. J. Robust Nonlinear Control 2022, 32, 2683–2704. [Google Scholar] [CrossRef]
- Zhao, H.; Shan, J.; Peng, L.; Yu, H. Data-driven event-triggered formation of mimo multiagent systems with constrained information. IEEE Trans. Syst. Man Cybern. Syst. 2023, 54, 39–49. [Google Scholar] [CrossRef]
- Bu, X.; Hou, Z.; Zhang, H. Data-driven multiagent systems consensus tracking using model free adaptive control. IEEE Trans. Neural Netw. Learn. Syst. 2017, 29, 1514–1524. [Google Scholar] [CrossRef] [PubMed]
- Liang, J.; Bu, X.; Cui, L.; Hou, Z. Data-driven bipartite formation for a class of nonlinear MIMO multiagent systems. IEEE Trans. Neural Netw. Learn. Syst. 2021, 34, 3161–3173. [Google Scholar] [CrossRef]
- Bu, X.; Yu, Q.; Hou, Z.; Qian, W. Model free adaptive iterative learning consensus tracking control for a class of nonlinear multiagent systems. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 677–686. [Google Scholar] [CrossRef]
- Ren, Y.; Hou, Z. Robust model-free adaptive iterative learning formation for unknown heterogeneous non-linear multi-agent systems. IET Control Theory Appl. 2020, 14, 654–663. [Google Scholar] [CrossRef]
- Bu, X.; Cui, L.; Hou, Z.; Qian, W. Formation control for a class of nonlinear multiagent systems using model-free adaptive iterative learning. Int. J. Robust Nonlinear Control 2018, 28, 1402–1412. [Google Scholar] [CrossRef]
- Zhao, H.; Yu, H.; Peng, L. Event-triggered distributed data-driven iterative learning bipartite formation control for unknown nonlinear multiagent systems. IEEE Trans. Neural Netw. Learn. Syst. 2022, 35, 417–427. [Google Scholar] [CrossRef] [PubMed]
- Liang, J.; Bu, X.; Hou, Z. Finite-time Asymmetric Bipartite Consensus for Multi-Agent Systems Using Data-Driven Iterative Learning Control. IEEE Trans. Signal Inf. Process. Over Netw. 2024, 10, 227–238. [Google Scholar] [CrossRef]
- Li, F.; Hou, Z. Distributed model-free adaptive control for MIMO nonlinear multiagent systems under deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 53, 2281–2291. [Google Scholar] [CrossRef]
- Bu, X.; Yu, W.; Yin, Y.; Hou, Z. Event-triggered data-driven control for nonlinear systems under frequency-duration-constrained DoS attacks. IEEE Trans. Inf. Forensics Secur. 2022, 18, 1449–1460. [Google Scholar] [CrossRef]
- Liu, L.; Ma, L.; Wang, Y.; Zhang, J.; Bo, Y. Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks. J. Frankl. Inst. 2020, 357, 4983–5003. [Google Scholar] [CrossRef]
- Ding, L.; Han, Q.L.; Ge, X.; Zhang, X.M. An overview of recent advances in event-triggered consensus of multiagent systems. IEEE Trans. Cybern. 2017, 48, 1110–1123. [Google Scholar] [CrossRef] [PubMed]
- Wang, J.; Gao, J.; Wu, P. Attack-resilient event-triggered formation control of multi-agent systems under periodic DoS attacks using complex Laplacian. ISA Trans. 2022, 128, 10–16. [Google Scholar] [CrossRef]
- Deng, C.; Jin, X.Z.; Wu, Z.G.; Che, W.W. Data-driven-based cooperative resilient learning method for nonlinear MASs under DoS attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 35, 12107–12116. [Google Scholar] [CrossRef] [PubMed]
- Qi, Y.; Zhao, X.; Ahn, C.K. Dual-Domain triggered iterative learning control for networked switched systems against denial-of-service attacks. IEEE Syst. J. 2022, 17, 3246–3257. [Google Scholar] [CrossRef]
- Zhao, H.; Xu, D.; Zhou, Z.; Yu, H. Dynamic Event-Triggered Resilient Heading Control for Unmanned Surface Vehicle With Encrypted Data. IEEE Trans. Intell. Veh. 2024; early access. [Google Scholar] [CrossRef]
- Zhao, H.; Peng, L.; Yu, H. Model-free adaptive consensus tracking control for unknown nonlinear multi-agent systems with sensor saturation. Int. J. Robust Nonlinear Control 2021, 31, 6473–6491. [Google Scholar] [CrossRef]
- Feng, J.; Song, W.; Zhang, H.; Wang, W. Data-driven robust iterative learning consensus tracking control for MIMO multiagent systems under fixed and iteration-switching topologies. IEEE Trans. Syst. Man Cybern. Syst. 2020, 52, 1331–1344. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).