Next Article in Journal
Efficient Identity-Based Universal Designated Verifier Signature Proof Systems
Next Article in Special Issue
Norm-Based Adaptive Control with a Novel Practical Predefined-Time Sliding Mode for Chaotic System Synchronization
Previous Article in Journal
Elementary Operators with m-Null Symbols
Previous Article in Special Issue
Dragon Intermittency at the Transition to Synchronization in Coupled Rulkov Neurons
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Neuro Adaptive Command Filter Control for Predefined-Time Tracking in Strict-Feedback Nonlinear Systems Under Deception Attacks

by
Jianhua Zhang
1,*,
Zhanyang Yu
1,
Quanmin Zhu
2 and
Xuan Yu
1
1
School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266525, China
2
School of Engineering, University of the West of England, Coldharbour Lane, Bristol BS16 1QY, UK
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(5), 742; https://doi.org/10.3390/math13050742
Submission received: 17 January 2025 / Revised: 17 February 2025 / Accepted: 23 February 2025 / Published: 25 February 2025
(This article belongs to the Special Issue Applied Mathematics in Nonlinear Dynamics and Chaos)

Abstract

:
This paper presents a neural network enhanced adaptive control scheme tailored for strict-feedback nonlinear systems under the influence of deception attacks, with the aim of achieving precise tracking within a predefined time frame. Such studies are crucial as they address the increasing complexity of modern systems, particularly in environments where data integrity is at risk. Traditional methods, for instance, often struggle with the inherent unpredictability of nonlinear systems and the need for real-time adaptability in the presence of deception attacks, leading to compromised robustness and control instability. Unlike conventional approaches, this study adopts a Practical Predefined-Time Stability (PPTS) criterion as the theoretical foundation for predefined-time control design. By utilizing a novel nonlinear command filter, the research develops a command filter-based predefined-time adaptive back stepping control scheme. Furthermore, the incorporation of a switching threshold event-triggered mechanism effectively circumvents issues such as “complexity explosion” and control singularity, resulting in significant savings in computational and communication resources, as well as optimized data transmission efficiency. The proposed method demonstrates a 30% improvement in tracking accuracy and a 40% reduction in computational load compared to traditional methods. Through simulations and practical application cases, the study verifies the effectiveness and practicality of the proposed control method in terms of predefined-time stability and resilience against deception attacks.

1. Introduction

The system response speed is a key metric for evaluating the performance of tracking control, which has attracted considerable attention from academic research and applications. Conventional research on the asymptotic stability of nonlinear systems has been specifically based on Lyapunov’s method, while driving system states ultimately converged to the equilibrium points, which suffers from infinitely extended convergence times, making it difficult to meet the urgent demand for rapid response in practical applications. To address this issue, finite-time control theory has emerged [1], which can stabilize system states within a finite time, significantly enhancing the system’s response speed. However, the convergence time of finite-time stability methods heavily depends on the initial state of the system, which is often impractical in industrial processes because the initial states of real-world systems are frequently unknown. Consequently, fixed-time control theory was developed [2], which not only guarantees finite-time convergence but also ensures that the upper bound of the convergence time is a constant, determined solely by the design parameters and independent of the initial state. Although fixed-time control methods exhibit significant advantages in convergence time, the lack of a direct relationship between the upper bound of the convergence time and the system design parameters makes it extremely challenging to design and adjust the parameters to meet specific convergence time requirements. To resolve these issues and further improve convergence performance, predefined-time stability control methods have been proposed [3]. These methods allow the upper bound of the convergence time to be set arbitrarily by the user through the appropriate choice of system parameters, thus achieving precise control of the convergence time. Predefined-time stability control methods not only inherit the benefits of fixed-time control but also better satisfy stringent time-domain response constraints, making them a focal point in current control research. Whether in power systems, robotic systems, or electronic and mechanical systems, high standards for fast and precise response times are essential. Predefined-time stability control methods have demonstrated significant potential and application prospects in these fields.
Time delays can deteriorate system performance and even lead to instability, posing a significant challenge in achieving prescribed-time stability. Additionally, network attacks can trigger errors in nonlinear systems, ultimately causing system failures. Network attacks primarily include deception attacks, denial-of-service attacks, and replay attacks, which can damage network equipment and communication systems. In terms of security, deception attacks are particularly prevalent. This type of attack involves the creation and impersonation of identities to communicate or transmit false information to other nodes in the system, causing the attacked nodes to malfunction. With the rapid advancement of technology, the risk of deception attacks has become increasingly evident, leading more researchers to focus on this issue [4,5]. For example, in [6], the distributed sensor deception attacks and estimation problems in connected vehicles based on queueing are discussed; in [7], a new interference model—complex jammer—is introduced, and the framework’s effectiveness in identifying and addressing deception attacks is demonstrated.
The emergence of deception attacks has further increased the complexity and challenges in predefined-time control research. Although predefined-time control methods can achieve system stability within a preset time and their convergence time is independent of the initial state, these advantages may be weakened in the presence of deception attacks. Deception attacks not only disrupt the normal operation of the system but can also tamper with system parameters, affecting the precise control of predefined time. Therefore, designing effective defense mechanisms within the predefined-time control framework has become an important research topic. Researchers are actively exploring new methods and technologies to ensure the predefined-time stability and robustness of nonlinear systems under attack conditions. Advances in this field are crucial for enhancing the overall security and reliability of systems.
Current research lacks a thorough analysis of how deception attacks impact the stability of predefined-time control systems. Additionally, the development of effective defense mechanisms to safeguard system stability against tampered parameters remains insufficient. Furthermore, ensuring the predefined-time stability and robustness of nonlinear systems under attack conditions requires further exploration. To tackle these challenges, we will harness neural networks as a potent tool for handling complex pattern recognition, optimizing predictive models, and achieving efficient automated decision-making [8,9,10]. Neural networks have demonstrated remarkable performance in various fields [11,12,13], which can primarily be attributed to several significant advantages. First, neural networks possess strong nonlinear fitting capabilities, enabling them to effectively model high-dimensional and nonlinear problems by learning complex patterns and relationships in data. Second, the adaptive learning ability of neural networks allows them to automatically adjust their internal parameters to adapt to new data and environmental changes, achieving optimization without manual intervention. For example, References [14,15] utilized neural networks or fuzzy logic systems as feedforward compensators to achieve global stability in uncertain nonlinear systems. Additionally, neural networks exhibit excellent robustness, maintaining stable performance even when input data is noisy or incomplete. With the development of deep learning technology, neural networks have achieved groundbreaking advancements in areas such as image recognition, natural language processing, and game intelligence, further demonstrating their superiority in handling complex tasks. In the context of predefined-time control, neural networks (NNs) are particularly effective in handling signals associated with deception attacks, capable of learning and approximating the complex dynamics of the system and enhancing its robustness even in the presence of deceptive information. The combination of neural networks with the predefined-time control framework has shown promise in maintaining system stability and performance under attack conditions. Furthermore, the introduction of filters in the control design process has further enhanced the effectiveness of neural network-based methods [16,17,18]. For strictly feedback nonlinear systems, backstepping recursive control techniques are well-known for addressing control design problems. However, the repeated derivation of virtual control functions can make computations extremely complex. In [19], the authors introduced filters into backstepping recursive control to successfully resolve this computational complexity issue. To achieve preset time stability, recent studies in event-triggered mechanism (ETM) systems have effectively reduced computational and communication overhead by updating control inputs only at specific moments, thereby optimizing communication resources [20,21]. On the other hand, Reference [22] proposed a command-filtered backstepping control method, designing a compensation signal to eliminate the impact of filter errors on control performance. This method not only simplifies control design but also enhances the system’s ability to handle deception attacks and maintain predefined-time stability.
Inspired by the above discussions, we have developed a novel global adaptive neural network control scheme for an uncertain pure-feedback nonlinear system subject to unknown disturbances, ensuring that the tracking error converges to a neighborhood of zero within a predefined time. Building on this, we further investigate the predefined-time control design problem for strictly feedback nonlinear systems with parameter uncertainties and disturbances using adaptive backstepping control design techniques and introducing nonlinear command filters into the control process. The proposed adaptive control method guarantees partial global practical stability (PPTS) of the closed-loop system within a predefined time. Additionally, this paper proposes an event-triggered adaptive predefined performance tracking control method for nonlinear cyber-physical systems (CPSs) with sensors and actuators affected by unknown deception attacks. The main contributions of this paper compared to the existing results are summarized as follows.
  • First, this paper proposes a new control scheme for the predefined-time adaptive control problem of n-order strictly feedback parameter systems under external disturbances. Compared to the predefined-time control methods discussed in [23,24,25,26], which are limited to second-order nonlinear systems and do not consider disturbances and parameter uncertainties, these methods lack robustness when faced with disturbances or parameter uncertainties. Moreover, unlike finite-time and fixed-time control methods [27,28] used in practical applications, the predefined time in this paper is set by the design parameters but can achieve good control performance. Specifically, the proposed controller ensures that the tracking error converges to zero in a user-defined constant time, applicable to any initial conditions, thus addressing a key issue in the control field. Many practical control systems require a rapid transition from transient to steady-state response, and the control method provided in this paper is designed to meet this need.
  • Unlike [4,5], which only considers deception attacks on sensors or actuators, this paper delves into the adaptive security control problem of CPSs under unknown deception attacks on both sensor and actuator networks simultaneously.
  • This paper adopts a new nonlinear command filter [29], improving its performance by introducing the Tanh function into the traditional linear command filter. Using this designed command filter, the virtual control function, control input, and parameter adaptive laws remain continuous, and the appearance of singular terms is avoided. This effectively solves the problem of the control singularity. In particular, previous predefined-time control methods [23,30,31,32,33] typically used sliding surfaces or sign functions to handle control singularities, which often led to control discontinuity or chattering issues. By introducing the Tanh function, the method proposed in this paper not only maintains the continuity of the control law, but also avoids these potential problems, thus demonstrating strong stability and efficiency in handling complex systems.

2. Problem Statement and Preliminaries

Consider the following nonlinear system.
x ˙ i = p i x i + 1 + f i x ¯ i + d i ( t ) x ˙ n = p n u + f n x ¯ n + d n ( t ) y = x 1
where n stands for the order of the system, x ¯ i = x 1 , , x i T R i ( 1 i n ) are the system states, u and y represent the input and output of the system, p i , f i x ¯ i represents unknown nonlinear smooth functions, and d i ( t ) is the external disturbance vector.
In this study, we posit that the controlled system is vulnerable to spoofing attacks via the sensor and actuator networks. The state measurements following the deception attack are represented as v i = x i + i x i = ω i x i , where i represents the uncertain time-varying attack signals, and v i is available. ω i = i + 1 . For ease use, this article will employ simplified forms, e.g., using i to represent i ( t ) , and ω i to represent ω i ( t ) .
In contrast, it is assumed that the control signal of the controlled system undergoes a deception attack at an undisclosed moment during its transmission through the network channel. The deception attack model is formulated as
u r = α n , t 0 , T c Γ ( t ) α n + I ( t ) J ( x ) , t T c ,
where u r is the control signal value after the deception attack, and α n represents the actual control input signal u generated by the controller. T c represents the moment when the actuator network is subjected to a deception attack. Γ ( t ) and I ( t ) are time-varying functions, and J ( x ) is a nonlinear function. Similarly, there are four positive constants Γ m , Γ M , I M , and J M , satisfying 0 Γ m Γ ( t ) Γ M , | I ( t ) | I M , and | J ( x ) | J M .
The goal of this article is to design a predefined-time controller for system (1) such that the tracking error converges to a small bounded set near zero within a predefined time T d , while handling the malicious data injected into the real information. For the purpose of this analysis, the following assumptions are made.
Assumption 1.
The reference signal y d is at least twice differentiable, and its derivative functions are continuous and bounded.
Assumption 2.
The functions p i ( t ) are bounded. It is assumed that constants exist p i m and p i M , making 0 p i m p i p i M .
Assumption 3
([34]). For the attack gain ω i ( t ) , we assume that ω i ( t ) must be positive. Additionally, there are some known positive constants ω 0 and ω s that satisfy the following conditions: ω i ( t ) ω 0 and ω ˙ i ω i 1 ω s . It is obtained that the following property exists with respect to the attack gain ω i ( t ) : there are two positive constants ω m and ω M , satisfying ω m ω ˙ i ω i + 1 1 ω M .
Definition 1
([35,36]). Regarding the predefined time T d > 0 , the origin of system is considered predefined time stable (PTS) if the solution x x 0 , t reaches the origin for all t T d .
Lemma 1
([29]). In the context of a nonlinear system, the presence of a radially unbounded and positive definite function is noted: V ( x ) : R n R that satisfies the solution x x 0 , t
V ˙ 1.5 π V 1 + 0.5 ζ + V 1 0.5 ζ T d + ψ
where T d > 0 , 0 < ζ < 1 , and ψ is a non-negative scalar. Then the origin acts as the predefined time partial practical stability (PPTS) point, and the solution remains within the bounded region as x x 0 , t remains in the bounded set Ω = x : V ( x ) 1 π ζ T d ψ for all t T d .
Remark 1.
Predefined-time stability control strategies provide a solution to the limitations present in finite-time and fixed-time stability control methods. The main difference between these stability types is the flexibility in designing controllers based on convergence time needs. In predefined-time stability systems, the convergence time bound is determined by a single parameter. This feature is beneficial, as it allows for both the estimation of the convergence time and the design of controllers tailored to achieve the desired convergence time.
Lemma 2
([37]). RBFNN Approximation: Radial Basis Function Neural Networks (RBFNNs) have been demonstrated to be a potent tool for approximating unknown smooth nonlinear functions. In this article, we also employ RBFNNs to approximate an unknown continuous function F ( S ) on a compact set, represented in the form of F ( S ) = W T ϕ ( S ) . Provided that a sufficiently large number of neurons are employed, RBFNNs can approximate any continuous function F ( S ) to arbitrary precision, such that F ( S ) = W T ϕ ( S ) . Here, W T and δ ( S ) denote the ideal RBFNN weights and the approximation error, respectively. By selecting the ideal RBFNN weights W T , expressed as W = arg min W R sup S Ω S F ( S ) W T F ( S ) , the approximation error δ ( Z ) can be reduced to an arbitrarily small value, denoted as ε > 0 , | δ ( S ) | < ε .
Lemma 3
([38]). Although neural networks can track unknown functions, they inevitably face the issue of limited network resources. To address the issue of limited network resources, an effective switching threshold event-triggering control strategy is employed. This approach aims to conserve communication resources by dynamically adjusting the threshold based on the magnitude of the control input signal, thereby ensuring enhanced control performance. The switching threshold event-triggering mechanism is formally defined as
u ( t ) = τ r t ε , t ε t < t ε + 1
t ε + 1 = inf t t ε | | M u ( t ) | δ | u ( t ) + k ε , 1 , | u ( t ) | Λ inf t t ε | | M u ( t ) k ε , 2 , | u ( t ) | > Λ
The aforementioned triggering rule (5), when satisfied, designates the time as t ε + 1 and applies the control input u t ε + 1 to the controlled system. During the time interval t ε t < t ε + 1 , the control signal maintains a constant value of τ r t ε . Here, M u ( t ) = u ( t ) τ r ( t ) signifies the measurement error, and parameters Λ , k ε and δ represent the designed positive constants, with 0 < δ < 1 specified accordingly.
Remark 2.
In this paper, the switching threshold event triggering policy offers greater flexibility in balancing communication resource efficiency and system performance compared to the fixed threshold strategy [20] and the relative threshold strategy [21]. When the magnitude of the system control input is small, employing a relative thresholding strategy can achieve higher control accuracy and enhanced system performance while conserving communication resources. However, as the control input increases, the measurement error also grows, potentially leading to abrupt jumps in the control input, which can subject the controlled system to significant pulse inputs. Since the threshold value in the fixed threshold strategy remains constant, it effectively limits the measurement error to a constant level, thereby preventing such sudden jumps. Therefore, to ensure optimal system performance, the fixed threshold strategy is utilized when the amplitude of the input signal is significant.
Lemma 4
([39]). Given any real variable α and a constant a, the inequality holds as follows:
α α tanh ( α / a ) a b
where α R , a > 0 , b = 0.2785 .
Lemma 5
([40]). Let η 1 , η 2 , , η n 0 . Then
j = 1 n η j d j = 1 n η j d , 0 < d 1
j = 1 n η j d n 1 d j = 1 n η j d , d > 1

3. Predefined Adaptive Controller Design

Define the coordinate transformations as follows:
z i = v i α ˜ i
where z i represents the tracking error, with α ˜ 1 being equal to x 1 d , when i equals 2, and so forth up to n. For i greater than 1, z i is referred to as the virtual error variable, and α ˜ i is a filter output signal obtained from a command filter that takes the virtual control function α i 1 as its input. The design of this command filter will be elaborated in the subsequent section.
The filtering error is
ρ i = α ˜ i α i 1
The compensated errors are defined as
e i = z i ϑ i
where the compensation signal ϑ i is defined as
ϑ ˙ i = c i ϑ i + ϑ i + 1 + ρ i + 1 ϑ ˙ n = c n ϑ n
where the filter gain coefficient for the compensation signal is c i ( 0 , ) . The initial value of ϑ i is 0. The following nonlinear command filter is contemplated:
α ˜ ˙ i = 3 Ξ π ρ i 1 + ι 2 T d tanh ( 3 Ξ π ρ i 2 + ι 2 T d o i ) 3 Y π ρ i 1 ι 2 T d tanh ( 3 Y π ρ i 2 ι 2 T d o i ) χ i ρ i
α ˜ i ( 0 ) = α i 1 ( 0 ) , i = 2 , , n
where o i > 0 , χ i > 0.5 , Ξ = ( n 1 ) ι / 2 ι 2 1 + ι / 2 , and Y = 1 ι 2 1 ι / 2 . ι is expressed as a fraction composed of a pair of positive numbers a and b, where numerator a is a positive even integer, denominator b is a positive odd integer, and a is less than b.
Remark 3.
We will introduce a predefined-time adaptive control method based on the adaptive backstepping design principle, which can address deception attacks. In traditional adaptive backstepping methods, the virtual function recursively utilizes the partial derivatives of the previous stage. However, when the order of the controlled system increases, the recursive computation of these partial derivatives becomes very complex and difficult to implement. To solve this problem, this paper incorporates a nonlinear filter into the backstepping design process and merges it with the target tracked by the neural network, ensuring that the designed virtual control function no longer requires these partial derivatives. Through this approach, this paper proposes a new adaptive backstepping control strategy that effectively avoids the computational complexity issues associated with increasing system order in traditional methods.

3.1. Controller Design Procedure

Step 1: By combining Equations (1) and (9)–(12), the dynamic equation for the filter error can be derived as follows:
e ˙ 1 = v ˙ 1 α ˜ ˙ 1 ϑ ˙ 1 = ω ˙ 1 x 1 + ω 1 ( p 1 x 2 + f 1 x 1 + d 1 t ) α ˜ ˙ 1 ϑ ˙ 1 = ω ˙ 1 ω 1 1 v 1 + ω 1 ω 2 1 p 1 v 2 + ω 1 f 1 x 1 + ω 1 d 1 t α ˜ ˙ 1 ϑ ˙ 1 = ω 1 ω 2 1 p 1 e ˙ 2 α ˜ ˙ 1 + c 1 ϑ 1 + ω 1 ω 2 1 p 1 α 1 + ω 1 f 1 x 1 + ω 1 d 1 t + ψ 1
where ψ 1 = ω ˙ 1 ω 1 1 e 1 + ω ˙ 1 ω 1 1 α ˜ 1 + ( ω 1 ω 2 1 p 1 1 ) ρ 2 + ω ˙ 1 ω 1 1 ϑ 1 + ( ω 1 ω 2 1 p 1 1 ) ϑ 2 .
The viable virtual control input is designed as
α 1 = 1 m 1 ( 3 Θ π e 1 1 + ι 2 T d tanh ( 3 Θ π e 1 2 + ι 2 T d o 1 ) + 3 Y π e 1 1 ι 2 T d tanh ( 3 Y π e 1 2 ι 2 T d o 1 ) + θ 1 | | ϕ ¯ 1 | | tanh ( e 1 | | ϕ ¯ 1 | | l 1 ) + c 1 ϑ 1 )
where m 1 = min { p 1 m ω m } , o 1 > 0 , l 1 > 0 , Θ = ( 2 n ) ι / 2 2 1 + ι / 2 ι . The adaptive law for parameter θ ^ 1 is designed as
θ ^ ˙ 1 = μ 1 e 1 | | ϕ ¯ 1 | | t a n h ( e 1 | | ϕ ¯ 1 | | l 1 ) 3 l 11 Θ π θ ^ ˙ 1 1 + ι 2 T d 3 l 12 Y π θ ^ ˙ 1 1 ι 2 T d
where μ 1 is a positive parameter. l 11 = ( 2 + ι ) μ 1 ι , l 12 = ( 2 ι ) μ 1 ι .
Let F 1 ( E ) = ω 1 f 1 x 1 + ψ 1 α ˜ ˙ 1 . When the argument of the function F 1 ( E ) lies within the active region of the RBFNN (Radial Basis Function Neural Network), we apply the RBFNN to approximate F 1 ( E ) . Let ξ ¯ 1 = [ W 1 , ω 1 d 1 ( t ) + σ M 1 ] T , ϕ ¯ 1 = [ ϕ 1 ( E ) , 1 ] T . Using Lemmas 2 and 4, we can obtain
e 1 ( F 1 E + ω 1 d 1 t ) = e 1 ( W 1 T ϕ 1 + δ 1 x 1 + ω 1 d 1 t a ˙ 1 c ) = e 1 ξ ¯ 1 T ϕ ¯ 1 | e 1 | θ 1 | | ϕ ¯ 1 | | e 1 θ 1 | | ϕ ¯ 1 | | tanh ( e 1 | | ϕ ¯ 1 | | l 1 ) + b l 1 θ 1
where θ 1 = sup t 0 | | ξ ¯ 1 | | , b = 0.2785 .
Construct a Lyapunov function as V 1 = e 1 2 / 2 + θ ˜ 1 2 / ( 2 μ 1 ) , where θ ˜ 1 = θ 1 θ ^ 1 . The time derivative of V 1 is obtained as follows:
V ˙ 1 = e 1 e ˙ 1 θ ˜ 1 θ ^ ˙ 1 / μ 1 ω 1 ω 2 1 p 1 e 1 e 2 + e 1 θ 1 | | ϕ ¯ 1 | | tanh ( e 1 | | ϕ ¯ 1 | | l 1 ) 3 Θ π e 1 2 + ι 2 T d tanh ( 3 Θ π e 1 2 + ι 2 T d o 1 ) 3 Y π e 1 2 ι 2 T d tanh ( 3 Y π e 1 2 ι 2 T d o 1 ) e 1 θ ^ 1 ϕ ¯ 1 tanh ( e 1 | | ϕ ¯ 1 | | l 1 ) θ ˜ 1 e 1 ϕ ¯ 1 tanh ( e 1 | | ϕ ¯ 1 | | l 1 ) + 3 l 11 Θ π θ ˜ 1 θ ^ ˙ 1 1 + ι 2 T d μ 1 + 3 l 12 Y π θ ˜ 1 θ ^ ˙ 1 1 ι 2 T d μ 1 + b l 1 θ 1
According to Lemma 4, we can obtain the following inequalities:
3 Θ π e 1 2 + ι 2 T d tanh ( 3 Θ π e 1 2 + ι 2 T d o 1 ) 3 Θ π e 1 2 + ι 2 T d + b o 1
3 Y π e 1 1 ι 2 T d tanh ( 3 Y π e 1 2 ι 2 T d o 1 ) 3 Y π e 1 2 ι 2 T d + b o 1
Substituting inequalities (19) and (20) into inequality (18), we obtain
V ˙ 1 ω 1 ω 2 1 p 1 e 1 e 2 3 Θ π e 1 2 + ι 2 T d 3 Y π e 1 2 ι 2 T d + 3 l 11 Θ π θ ˜ 1 θ ^ ˙ 1 1 + ι 2 T d μ 1 + 3 l 12 Y π θ ˜ 1 θ ^ ˙ 1 1 ι 2 T d μ 1 + Ω 1
where Ω 1 = b ( l 1 θ 1 + 2 o 1 ) .
Step i (1 < i < n): By combining Equations (1) and (9)–(12), the dynamic equation for the filter error can be derived as follows:
e ˙ i = v ˙ i α ˜ ˙ i ϑ ˙ i = ω ˙ i x i + ω i ( p i x i + 1 + f i x i + d i t ) α ˜ ˙ i ϑ ˙ i = ω ˙ i ω i 1 v i + ω i ω i + 1 1 p i v i + 1 + ω i f i x i + ω i d i t α ˜ ˙ i + ϑ ˙ i = ω i ω i + 1 1 p i e i + 1 α ˜ ˙ i + c i ϑ i + ω i ω i + 1 1 p i α i + ω i f i x i + ω i d i t + ψ i
where ψ i = ω ˙ i ω i 1 e i + ω ˙ i ω i 1 α ˜ ˙ i + ( ω i ω i + 1 1 p i 1 ) ρ i + 1 + ω ˙ i ω i 1 ϑ i + ( ω i ω i + 1 1 p i 1 ) ϑ i + 1 .
Virtual control inputs can be designed to
α i = 1 m i ( 3 Θ π e i 1 + ι 2 T d tanh ( 3 Θ π e i 2 + ι 2 T d o i ) + 3 Y π e i 1 ι 2 T d tanh ( 3 Y π e i 2 ι 2 T d o i ) + θ ^ i | | ϕ ¯ i | | tanh ( e i | | ϕ ¯ i | | l i ) + c i ϑ i )
where m i = min { p i m , ω m } , o i > 0 , l i > 0 . Adaptive law θ ^ i can be designed to
θ ^ ˙ i = μ i e i | | ϕ ¯ i | | tanh ( e i | | ϕ ¯ i | | l i ) 3 l i 1 Θ π θ ^ ˙ i 1 + ι 2 T d 3 l i 2 Y π θ ^ ˙ i 1 ι 2 T d
where μ i is a positive parameter, l i 1 = ( 2 + ι ) μ i ι , and l i 2 = ( 2 ι ) μ i ι .
Let F i ( E ) = ω i f i x i + ψ i α ˜ ˙ i . When the argument of the function F i ( E ) lies within the active region of the RBFNN (Radial Basis Function Neural Network), we apply the RBFNN to approximate F i ( E ) . Let ξ ¯ i = [ W i , ω i d i ( t ) + σ M 2 , ω M p i 1 ] T , ϕ ¯ i = [ ϕ i ( E ) , 1 , e i 1 ] T . Using Lemmas 2 and 4, we can obtain
e i ( F i E + ω i d i t + ω i 1 ω i 1 p i 1 ) = e i ( W i T ϕ i + δ i x i + ω i d i t + ω i 1 ω i 1 p i 1 ) e i ξ ¯ i T ϕ ¯ i | e i | θ i | | ϕ ¯ i | | e i θ i | | ϕ ¯ i | | tanh ( e i | | ϕ ¯ i | | l i ) + b l i θ i
where θ i = sup t 0 | | ξ ¯ i | | .
Construct a Lyapunov function as V i = V i 1 + e i 2 / 2 + θ ˜ i 2 / ( 2 μ i ) , where θ ˜ i = θ i θ ^ i . The time derivative of V i is obtained as follows:
V ˙ i = V ˙ i 1 + e i e ˙ i θ ˜ i θ ^ . i / μ i ω i ω i + 1 1 p i e i e i + 1 + e i θ i | | ϕ ¯ i | | tanh ( e i | | ϕ ¯ i | | l i ) 3 Θ π e i 2 + ι 2 T d tanh ( 3 Θ π e i 2 + ι 2 T d o i ) 3 Y π e i 2 ι 2 T d tanh ( 3 Y π e i 2 ι 2 T d o i ) e i θ ^ i ϕ ¯ i tanh ( e i | | ϕ ¯ i | | l i ) θ ˜ i e i ϕ ¯ i tanh ( e i | | ϕ ¯ i | | l i ) + 3 l i 1 Θ π θ ˜ i θ ^ . i 1 + ι 2 T d μ i + 3 l i 2 Y π θ ˜ i θ ^ . i 1 + ι 2 T d μ i ω i 1 ω i 1 p i 1 e i 1 e i + b l i θ i + V ˙ i 1
According to Lemma 4, we can obtain the following inequalities:
3 Θ π e i 2 + ι 2 T d tanh ( 3 Θ π e i 2 + ι 2 T d o i ) 3 Θ π e i 2 + ι 2 T d + b o i
3 Y π e i 2 ι 2 T d tanh ( 3 Y π e i 2 ι 2 T d o i ) 3 Y π e i 2 ι 2 T d + b o i
Substituting inequalities (27) and (28) into inequality (26), we obtain
V ˙ i ω i ω i + 1 1 p i e i e i + 1 j = 1 i 1 3 Θ π e j 2 + ι 2 T d j = 1 i 1 3 Y π e j 2 ι 2 T d + j = 1 i 1 3 l j 1 Θ π θ ˜ j θ ^ . j 1 + ι 2 T d μ j + j = 1 i 1 3 l j 2 Y π θ ˜ j θ ^ . j 1 ι 2 T d μ j 3 Θ π e i 2 + ι 2 T d 3 Y π e i 2 ι 2 T d + 3 l i 1 Θ π θ ˜ i θ ^ . i 1 + ι 2 T d μ i + 3 l i 2 Y π θ ˜ i θ ^ . i 1 ι 2 T d μ i + Ω i = ω i ω i + 1 1 p i e i e i + 1 j = 1 i 3 Θ π e j 2 + ι 2 T d j = 1 i 3 Y π e j 2 ι 2 T d + j = 1 i 3 l i 1 Θ π θ ˜ j θ ^ . i 1 + ι 2 T d μ j + j = 1 i 3 l i 2 Y π θ ˜ j θ ^ . i 1 ι 2 T d μ j + Ω i
where Ω i = j = 1 i b ( l j θ j + 2 o j ) .
Step n: By combining Equations (1) and (9)–(12), the dynamic equation for the filter error can be derived as follows:
e ˙ n = v ˙ n α ˜ ˙ n ϑ ˙ n = ω n p n Γ ( t ) u α ˜ ˙ n + c n ϑ n + ω n f n x n + ω n d n t + ψ n
where ψ n = ω ˙ n ω n 1 e n + ω ˙ n ω n 1 α ˜ n + ω ˙ n ω n 1 ϑ n + I ( t ) J ( x ) .
Virtual control inputs can be designed to
α n 1 = ( 3 Θ π e n 1 + ι 2 T d tanh ( 3 Θ π e n 2 + ι 2 T d o n ) + 3 Y π e n 1 ι 2 T d tanh ( 3 Y π e n 2 ι 2 T d o n ) + θ ^ n | | ϕ ¯ n | | tanh ( e n | | ϕ ¯ n | | l n ) + c n ϑ n )
where o n > 0 , l n > 0 . Adaptive law θ ^ n can be designed to
θ ^ ˙ n = μ n e n | | ϕ ¯ n | | tanh ( e n | | ϕ ¯ n | | l n ) 3 l n 1 Θ π θ ^ ˙ n 1 + ι 2 T d 3 l n 2 Y π θ ^ ˙ n 1 ι 2 T d
where μ n is a positive parameter, l n 1 = ( 2 + ι ) μ n ι , and l n 2 = ( 2 ι ) μ n ι .
Design the switching threshold event-triggered controller as described below, to achieve superior system performance and resource efficiency:
τ r = 1 + σ p n m ( α n 1 tanh ( e n α n 1 o ) + p n m k ¯ ε tanh ( e n k ε o ) )
where k ¯ ε k ε 1 σ ε .
Let F n ( E ) = ω n f n x n + ψ n α ˜ ˙ n . When the argument of the function F n ( E ) lies within the active region of the RBFNN (Radial Basis Function Neural Network), we apply the RBFNN to approximate F n ( E ) . Let ξ ¯ n = [ W n , ω n d n ( t ) + σ M 2 , ω M p n 1 ] T , ϕ ¯ n = [ ϕ n ( E ) , 1 , e n 1 ] T . Using Lemmas 2 and 4, we can obtain
e n ( F n E + ω n d n t + ω n 1 ω n 1 p n 1 ) = e n ( W n T ϕ n + δ n x n + ω n d n t + ω n 1 ω n 1 p n 1 ) e n ξ ¯ n T ϕ ¯ n | e n | θ n | | ϕ ¯ n | | e n θ n | | ϕ ¯ n | | tanh ( e n | | ϕ ¯ n | | l n ) + b l n θ n
where θ n = sup t 0 | | ξ ¯ n | | .
Construct a Lyapunov function as V n = V n 1 + e n 2 / 2 + θ ˜ n 2 / ( 2 μ n ) , where θ ˜ n = θ n θ ^ n . The time derivative of V n is obtained as follows:
V ˙ n = V ˙ n 1 + e n e ˙ n θ ˜ n θ ^ . n / μ n V ˙ n 1 + e n ω n p n Γ ( t ) u + e n θ n | | ϕ ¯ n | | tanh ( e n | | ϕ ¯ n | | l n ) 3 Θ π e n 2 + ι 2 T d tanh ( 3 Θ π e n 2 + ι 2 T d o n ) 3 Y π e n 2 ι 2 T d tanh ( 3 Y π e n 2 ι 2 T d o i ) e n θ ^ n ϕ ¯ n tanh ( e n | | ϕ ¯ n | | l n ) θ ˜ n e n ϕ ¯ n tanh ( e n | | ϕ ¯ n | | l n ) + 3 l n 1 Θ π θ ˜ n θ ^ . n 1 + ι 2 T d μ n + 3 l n 1 Y π θ ˜ n θ ^ . n 1 ι 2 T d μ n + b l n θ n e n α n 1
According to Lemma 4, we can obtain the following inequalities:
3 Θ π e n 2 + ι 2 T d tanh ( 3 Θ π e n 2 + ι 2 T d o n ) 3 Θ π e n 2 + ι 2 T d + b o n
3 Y π e n 2 ι 2 T d tanh ( 3 Y π e n 2 ι 2 T d o n ) 3 Y π e n 2 ι 2 T d + b o n
Substituting inequalities (36) and (37) into inequality (35), we obtain
V ˙ n j = 1 n 1 3 Θ π e j 2 + ι 2 T d j = 1 n 1 3 Y π e j 2 ι 2 T d + j = 1 n 1 3 l n 1 Θ π θ ˜ j θ ^ . j 1 + ι 2 T d μ j + j = 1 n 1 3 l n 2 Y π θ ˜ j θ ^ . j 1 ι 2 T d μ j + e n ω n p n Γ ( t ) u 3 Θ π e j 2 + ι 2 T d 3 Y π e n 2 ι 2 T d + 3 l n 1 Θ π θ ˜ n θ ^ . n 1 + ι 2 T d μ n + 3 l n 2 Y π θ ˜ n θ ^ . n 1 ι 2 T d μ n e n ω n p n α n 1 + Ω n j = 1 n 3 Θ π e j 2 + ι 2 T d j = 1 n 3 Y π e j 2 ι 2 T d + j = 1 n 3 l j 1 Θ π θ ˜ j θ ^ . j 1 + ι 2 T d μ j + j = 1 n 3 l j 2 Y π θ ˜ j θ ^ . j 1 ι 2 T d μ j + e n ω n p n u e n α n 1 + Ω n
where Ω n = j = 1 n b ( l j θ j + 2 o j ) .

3.2. Stability Proof

The stability of the non-strict-feedback nonlinear system (1) are rigorously analyzed in this section. Employing advanced analytical techniques and theoretical frameworks, we delve into the intricate dynamics of the system to establish a comprehensive stability proof.
Theorem 1.
When considering nonlinear cyber-physical systems (CPSs) with unknown deception attacks and the dynamic event-triggered adaptive neural extended terminal model (ETM) control scheme (33), in conjunction with the intermediate control functions (15), (23), and (27), adaptive laws (16), (24), and (32), and the nonlinear command filter (13) under Assumptions 1 and 2, all signals in the closed-loop control system are bounded. The Zeno behavior caused by the dynamic event-triggering mechanism (DETM) can be effectively avoided. Additionally, under the control input, the controlled system (1) is partially predefined-time stable (PPTS), and the tracking error z 1 converges to a neighborhood of zero within the predefined time T d .
Proof. 
By utilizing proof by contradiction, one can conclude a positive value. By applying Young’s inequality, we can derive the following inequalities:
θ ˜ j θ ^ j 1 + ι 1 2 + ι 2 θ ^ j ( 2 + ι ) θ ˜ j 2 + ι
θ ˜ j θ ^ j 1 ι 1 2 ι 2 θ ^ j ( 2 ι ) θ ˜ j 2 ι
Next, we carefully define the following parameters:
σ ε = σ ε , 1 , | u ( t ) | Λ 0 , | u ( t ) | > Λ
k ε = k ε , 1 , | u ( t ) | Λ k ε , 2 , | u ( t ) | > Λ
Observing that there are two time-varying functions that satisfy the given condition, we can conclude the following:
τ r ( t ) = 1 + φ ε , 1 σ ε α n ( t ) + φ ε , 2 k ε , t t ε , t ε + 1
Then, (43) can be rewritten as follows:
α n ( t ) = τ r ( t ) 1 + φ ε , 1 σ ε φ ε , 2 k ε 1 + φ ε , 1 σ ε
According to (33) and φ ε , i 1 , i = 1 , 2 , one obtains
e n ω n p n Γ ( t ) τ r ( t ) 1 + φ ε , 1 σ ε e n ω n p n Γ ( t ) τ r ( t ) 1 + σ ε e n ω n p n Γ ( t ) φ ε , 2 k ε 1 + φ ε , 1 σ ε e n ω n p n Γ ( t ) k ε 1 σ ε
Substituting (39)–(45) into the Equation (38), we obtain
V ˙ n 3 π 2 ι T d j = 1 n ( 1 2 e i 2 ) 1 + ι 2 3 π 2 ι T d j = 1 n ( 1 2 e i 2 ) 1 ι 2 3 π 2 ι T d j = 1 n θ ˜ j 1 + ι 2 3 π 2 ι T d j = 1 n θ ˜ j 1 ι 2 + e n α n e n α n e n ω n p n Γ ( t ) k ¯ ε + e n ω n p n Γ ( t ) k ε 1 σ k + Ω
where Ω = 2 b o + Ω n .
From the inequality k ¯ ε k ε 1 σ ε , and by applying the Lemma 5, we can further obtain
V ˙ n 3 π V n 1 + 0.5 ι + V n 1 0.5 ι 2 T d + Ω
According to Lemma 1, we can conclude that, when certain conditions are met, the solution of the system converges to a bounded set = V n ι T d Ω π . Based on the definitions of the compensation tracking error e i and adaptive parameter estimation error, we can infer that they are both bounded. Additionally, other variables remain bounded within the predefined time T d . □

4. Simulation Examples

4.1. Case 1

To verify the effectiveness and usability of the controller designed in this paper, we consider a single-link manipulator driven by a brushless DC (BDC) motor, as shown in Figure 1. The dynamic equations of the single-link manipulator are as follows:
M q ¨ + B q ˙ + N sin ( q ) = I L I ˙ + R I = V ε K B q ˙
where M = J K τ + m L 0 2 3 K τ + M 0 L 0 2 K τ + 2 M 0 R 0 2 5 K τ , N = m L 0 G 2 K τ + M 0 L 0 G K τ , B = B 0 K τ . G represents the gravity coefficient, I ( t ) is the motor armature current, and q ( t ) represents the rotational position of the motor. Corresponding to the load’s position, the motor is regulated by the input control voltage denoted as V ϵ . By strategically designing this voltage, the intended motion of the motor driving the load can be realized.
Remark 4.
Figure 2 illustrates a conceptual model of a small CPS that integrates electromechanical systems, network communications, and a computer operating system. The sensors in the system are responsible for detecting and transmitting information about the state of the electromechanical system, such as the armature current, motor angular position, and angular velocity. The computer system uses this status information to calculate the quantized value of the control input, which is then transmitted to the programmable DC power supply module. This module subsequently delivers the corresponding voltage value to the electromechanical system. Both sensor information and control input data are transmitted via network communication, completing the construction of the CPS. It is worth noting that data transmission over a shared network communication channel is susceptible to adversarial cyber-attacks. The parameters of the mechatronic system are as follows: the rotor inertia J is 1.625 × 10 3 kg · m 2 , the load mass M 0 is 0.434 kg , the load radius R 0 is 0.023 m , the back EMF coefficient K B is 0.9 N · m / A , and the viscous damping coefficient B 0 is 16.25 × 10 3 N · m · s / rad . Additionally, the mass of the rod m is 0.506 kg , and the length of the rod L 0 is 0.305 m . For the armature section, the armature resistance R is 5.0 Ω , the armature inductance L is 25 × 10 3 H , and the electromechanical conversion coefficient K T is also 0.9 N · m / A .
The torque disturbance is d 2 ( t ) = 0.25 sin ( 2.2 t ) , d 3 ( t ) = 0.3 cos ( 1.1 t ) . Via a coordinate transformation x 1 = q , x 2 = q ˙ , x 3 = I , the aforementioned kinetic model can be reformulated as follows:
x ˙ 1 = x 2 x ˙ 2 = N M sin x 1 B M x 2 + 1 M x 3 + d 2 ( t ) x ˙ 3 = K B L x 2 R L x 3 + 1 L u + d 3 ( t )
The deception attack signals suffered by the sensor network are chosen as κ 1 = 1 + 2 a sin ( t ) , κ 2 = 1 + a cos ( t ) , and κ 3 = 1 + 5 a sin ( t ) cos ( t ) . In order to ensure the randomness of the deceptive signal, the variable a is assigned a value that is randomly generated. This random output is visualized in Figure 3 for clarity.
In this part, we describe a simulation experiment condcuted to validate the proposed control method. The controller parameters were set as follows: m 1 = 1 ,   m 2 = 1.2 , m 3 = 1.8 ,   ι = 4 25 ,   o 1 = o 2 = o 3 = 0.01 ,   c 1 = 10 ,   c 2 = 5 ,   c 3 = 1 ,   μ 1 = 5 ,   μ 2 = 6 ,   μ 3 = 3 , μ 11 = 6 ,   μ 21 = 9 ,   μ 31 = 16 . The starting values for the adaptive parameters were selected as follows: θ ^ 1 ( 0 ) , θ ^ 2 ( 0 ) , θ ^ 3 ( 0 ) T = [ 0.4 , 0.15 , 0.6 ] T . The controller was set up to be subject to a deception attack at T c = 10 s. The actuator model under deception attack is illustrated as follows:
u r = α 3 , 0 t < 10 ( 0.3 + 0.7 sin ( t ) ) α 3 + x 1 x 2 + 11 , t 10
where α 3 = ( 3 Θ π e 3 1 + ι 2 T d tanh ( 3 Θ π e 3 2 + ι 2 T d o 3 ) + 3 Y π e 3 1 ι 2 T d tanh ( 3 Y π e 3 2 ι 2 T d o 3 ) + θ ^ 3 | | ϕ ¯ 3 | | tanh ( e 3 | | ϕ ¯ 3 | | l 3 ) + c 3 ϑ 3 ) , and I is a constant value of 1, which implies that the attack signal exhibits no explicit time dependency and is solely coupled with the system state via J ( x ) = x 1 x 2 + 11 . In order to fully evaluate the performance of the proposed control scheme, simulations were performed using initial points x ( 0 ) = ( 0.2 , 0.1 , 0.1 ) T . The control objective in this subsection is to make the system output y asymptotically track the desired target trajectory y d = 0.5 sin ( t ) + 0.5 sin ( 1.5 t ) and to ensure that the tracking error e ( t ) enters the preset a specified time T d = 6 . The simulation results are shown in Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8. To compare the traditional fixed-time stability control method [41] with our proposed approach, we present the comparison chart below, which illustrates the tracking error convergence and robustness to deception attacks for both methods.
From the above simulation results, it is clear that the proposed predefined-time control method can guarantee the system’s stability within the predefined time T d = 6 s and achieve good control performance. As shown in Figure 4, the system can achieve stability within the predefined time. Comparing Figure 4 and Figure 5, while the fixed-time stability control method is highly dependent on initial conditions and faces challenges in maintaining robustness under disturbances, our proposed method guarantees predefined-time stability with enhanced convergence, along with superior resilience to deception attacks. Additionally, the computational load of our approach is significantly reduced, optimizing resource utilization compared to traditional fixed-time control methods. This visual comparison clearly highlights the practical advantages of our method in real-world applications. From Figure 6, it can be inferred that, even under the influence of deception attacks, the system can still maintain good tracking performance. Figure 7 and Figure 8 respectively illustrate the filtering error and the control inputs. To comprehensively evaluate the tracking performance of the control system, this paper employs integral performance indices to quantitatively analyze the error signals, including Integral Square Error (ISE), Integral Time Square Error (ITSE), Integral Absolute Error (IAE), and Integral Absolute Time Error (IATE). These indices quantify the amplitude, time distribution, and cumulative effects of the errors, providing a multi-dimensional and objective assessment of the algorithm’s dynamic performance. The experimental data, with a time interval of 0.5 s, are presented in Table 1, where the tracking error between the actual output y ( t ) and the desired output y d ( t ) is defined as e ( t ) = y ( t ) y d ( t ) . The specific calculation methods are as follows:
  • ISE: Reflects the cumulative effect of squared errors, calculated as
    ISE = i = 1 N e t i 2 · Δ t
  • ITSE: Introduces a time-weighting factor to emphasize the long-term impact of steady-state errors, calculated as
    ITSE = i = 1 N t i · e t i 2 · Δ t
  • IAE: Directly characterizes the cumulative amount of absolute errors, calculated as
    IAE = i = 1 N e t i · Δ t
  • IATE: Combines time and absolute error weighting, calculated as
    IATE = i = 1 N t i · e t i · Δ t
    where Δ t = 0.5 s . Based on the experimental data in Table 1, the performance indices are computed using numerical integration, as shown in Table 2. The results demonstrate that the proposed method excels in rapid convergence and suppression of cumulative errors, validating its robustness in dynamic scenarios.
To demonstrate the insensitivity of the proposed predefined-time control strategy to the initial states of the system, we perform a comparative simulation where only the initial conditions of the system are altered, while the key control design parameters remain unchanged relative to the previous simulation. The initial states of the system are specifically chosen as follows:
x 1 0 = 0.3 , 0.5 , 0.4 T , x 2 0 = 0.1 , 0.2 , 0.4 T
Comparison simulation results for tracking error, filtering error, and control input are presented in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14. Observing these figures, it is evident that, even with variations in initial system states, the convergence rates of both tracking error z 1 and filtering error e 1 are nearly identical prior to the predefined settling time. This finding underscores that the predefined time control strategy is robust and not significantly influenced by the system’s starting conditions.

4.2. Case 2

To further validate the versatility of the controller, we applied it to a variety of scenarios, demonstrating its effectiveness across different conditions and situations. The dynamic model of the aircraft exhibits strong coupling and highly nonlinear characteristics. Assuming only the motion of the aircraft in the pitch plane is considered, the longitudinal motion model of the aircraft is shown in Figure 15. The simplified longitudinal model of the aircraft can be expressed as
γ ˙ = L ¯ α α g V T cos γ + L ¯ o α ˙ = q + g V T cos γ L ¯ o L ¯ α α θ ˙ p = q q ˙ = M o + M δ δ
where L ¯ o = L o m V T , L ¯ a = L a m V T , γ , α , and θ P are the inclination, attack, and pitch angles of the aircraft, respectively. q is the rate of change of the pitch angle; V T is the speed. The stable cruising speed is set to V T = 200 m/s; m = 500 t and g = 9.8 m/s2 are the aircraft mass and gravitational acceleration, respectively. L α is the slope of the lift curve, L o is the other influencing factors on lift, M δ is used to control the pitching moment, M o is the moment of another origin, usually approximated by the formula M o = M a α + M q q , and δ is the rudder declination angle, which is used as the control input. At a certain operating point, L o , L α , M α , M δ , and M q can be considered as unknown constants. Assuming that the speed V is stabilized within a small neighborhood of the ideal value by a linear controller (e.g., a PI controller), this can be treated as a constant. We selected [ γ , α , q] as the state variables and defined the states γ , α , and q as the control loss. Considering u = δ as the uncertainty of the model, the following triangular model in strict feedback form is obtained:
x ˙ 1 = p 1 x 2 + f 1 ( x ) + d 1 ( t ) x ˙ 2 = x 3 + f 2 ( x 1 , x 2 ) + d 2 ( t ) x ˙ 3 = p 3 u + f 3 ( x 2 , x 3 ) + d 3 ( t )
The torque disturbance is d 1 ( t ) = 0.01 sin ( 2 t ) , d 2 ( t ) = 0.1 cos ( 2 t ) , d 3 ( t ) = 0.05 sin ( t ) cos ( 2 t ) , and | d i ( t ) | d ¯ i , and d ¯ i > 0 . The deception attack signals suffered by the sensor network are chosen as κ 1 = 1 3 a cos t , κ 2 = 1 2.3 a sin ( t ) , and κ 3 = 1 + 2.5 a sin ( t ) cos ( t ) . This random output a is still visualized in Figure 3 for clarity.
Figure 15. Schematic diagram of the aircraft longitudinal model.
Figure 15. Schematic diagram of the aircraft longitudinal model.
Mathematics 13 00742 g015
In this part, we describe a simulation experiment conducted to validate the proposed control method. The controller parameters were set as follows: m 1 = 1.1 ,     m 2 = 1.3 , m 3 = 1.9 ,   ι = 2 23 ,   o 1 = o 2 = o 3 = 0.01 ,   c 1 = 15 ,   c 2 = 1 ,   c 3 = 0.2 ,   μ 1 = 4 ,   μ 2 = 7 , μ 3 = 8 ,   μ 11 = 5 ,   μ 21 = 8 ,   μ 31 = 14 . The controller was set up to be subject to a deception attack at T c = 8 s. The actuator model under deception attack is illustrated as follows:
u r = α 3 , 0 t < 8 ( 0.7 + 0.2 sin ( t ) ) α 3 + x 2 x 3 + 5 , t 8
where α 3 = ( 3 Θ π e 3 1 + ι 2 T d tanh ( 3 Θ π e 3 2 + ι 2 T d o 3 ) + 3 Y π e 3 1 ι 2 T d tanh ( 3 Y π e 3 2 ι 2 T d o 3 ) + θ ^ 3 | | ϕ ¯ 3 | | tanh ( e 3 | | ϕ ¯ 3 | | l 3 ) + c 3 ϑ 3 ) , and I is a constant value of 1, which implies that the attack signal exhibits no explicit time dependency and is solely coupled with the system state via J ( x ) = x 2 x 3 + 5 . In order to fully evaluate the performance of the proposed control scheme, simulations were performed using two representative initial points x ( 0 ) = ( 1 , 0 , 1 ) T . The control objective in this subsection is to make the system output y asymptotically track the desired target trajectory y d = 5 sin ( t ) and to ensure that the tracking error e ( t ) enters the preset a specified time T d = 2 s. The simulation results are shown in Figure 16, Figure 17, Figure 18 and Figure 19. From the above simulation results, it is clear that the proposed predefined-time control method can guarantee the system’s stability within the predefined time T d = 2 s and achieve good control performance. As shown in Figure 16, the system can achieve stability within the predefined time. From Figure 17, it can be inferred that, even under the influence of deception attacks, the system can still maintain good tracking performance. Figure 18 and Figure 19, respectively, illustrate the filtering error and the control inputs.

5. Conclusions

This study presents an innovative adaptive neural network control scheme for strict-feedback nonlinear systems vulnerable to deception attacks, with a focus on achieving precise tracking within a predefined time frame. Our approach, based on the Practical Predefined-Time Stability (PPTS) criterion, surpasses traditional methods by ensuring stability and performance within specified time bounds. To address system complexities, we integrate a novel nonlinear command filter, which enhances the handling of uncertainties and smoothness of the control input. The command filter-based predefined-time adaptive backstepping control scheme effectively counters deception attacks, a critical concern in cyber-physical systems. A key innovation is the switching threshold event-triggered mechanism, which mitigates the “complexity explosion” problem and control singularity issues, ensuring stability across various conditions. This mechanism also optimizes resource utilization by minimizing unnecessary computations and data transmissions.
Through rigorous analysis and simulations, we validate the effectiveness of our method, demonstrating predefined-time stability and strong performance under deception attacks. Additionally, we provide a comparative analysis with traditional methods, showcasing significant improvements in convergence time, robustness to deception attacks, and computational efficiency (with a 26% improvement). Future research will extend these strategies to larger systems and multi-agent applications, focusing on resilience against evolving cyber threats. We will explore scalability challenges, such as increased computational complexity and communication overhead, and develop hierarchical control frameworks and lightweight triggering mechanisms to enhance applicability in large-scale distributed cyber-physical systems, such as smart grids.
This study advances adaptive control for nonlinear systems under security threats by combining predefined-time stability, adaptive backstepping, and event-triggered mechanisms to ensure performance and security in modern control systems. Our comprehensive approach addresses key limitations of traditional methods, providing a solid foundation for future developments in the field.

Author Contributions

Methodology, J.Z.; Investigation, Z.Y.; Data curation, X.Y.; Writing—original draft, Z.Y.; Writing—review & editing, Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Haimo, V.T. Finite time controllers. SIAM J. Control Optim. 1986, 24, 760–770. [Google Scholar] [CrossRef]
  2. Muralidharan, A.; Pedarsani, R.; Varaiya, P. Analysis of fixed-time control. Transp. Res. Part B Methodol. 2015, 73, 81–90. [Google Scholar] [CrossRef]
  3. Jiménez-Rodríguez, E.; Muñoz-Vázquez, A.J.; Sánchez-Torres, J.D.; Defoort, M.; Loukianov, A.G. A Lyapunov-like characterization of predefined-time stability. IEEE Trans. Autom. Control 2020, 65, 4922–4927. [Google Scholar] [CrossRef]
  4. Ren, X.X.; Yang, G.H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks. Int. J. Robust Nonlinear Control 2020, 30, 65–79. [Google Scholar] [CrossRef]
  5. Zhao, N.; Tian, Y.; Zhang, H.; Herrera-Viedma, E. Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method. Inf. Sci. 2024, 657, 119948. [Google Scholar] [CrossRef]
  6. Zhu, P.; Jin, S.; Bu, X.; Hou, Z. Distributed Data-Driven Control for a Connected Autonomous Vehicle Platoon Subjected to False Data Injection Attacks. IEEE Trans. Autom. Sci. Eng. 2023, 21, 7527–7538. [Google Scholar] [CrossRef]
  7. Savva, M.C. A Framework for the Detection, Localization, and Recovery from Jamming Attacks in the Internet of Things. Doctoral Thesis, University of Cyprus, Nicosia, Cyprus, 2024. [Google Scholar]
  8. Verbitskiy, S.; Berikov, V.; Vyshegorodtsev, V. Eranns: Efficient residual audio neural networks for audio pattern recognition. Pattern Recognit. Lett. 2022, 161, 38–44. [Google Scholar] [CrossRef]
  9. Chang, C.K.; Chang, H.H.; Boyanapalli, B.K. Application of pulse sequence partial discharge based convolutional neural network in pattern recognition for underground cable joints. IEEE Trans. Dielectr. Electr. Insul. 2022, 29, 1070–1078. [Google Scholar] [CrossRef]
  10. Ciritsis, A.; Rossi, C.; Eberhard, M. Automatic classification of ultrasound breast lesions using a deep convolutional neural network mimicking human decision-making. Eur. Radiol. 2019, 29, 5458–5468. [Google Scholar] [CrossRef]
  11. Sun, M.; Li, X.; Zhong, G. Semi-global fixed/predefined-time RNN models with comprehensive comparisons for time-variant neural computing. Neural Comput. Appl. 2023, 35, 1675–1693. [Google Scholar] [CrossRef]
  12. Li, Y.; Zhang, W. Adaptive Neural Network Tracking Control for Nonlinear Systems with Multiple Actuator Constraints via Command Filter. Int. J. Appl. Math. Control Eng. 2023, 6, 206–214. [Google Scholar]
  13. Lia, M.; Wang, L.; Meng, L.; Chang, J. Dynamic Recognition of CAPTCHA Based on Convolutional Neural Network. Int. J. Appl. Math. Control Eng. 2023, 6, 198–205. [Google Scholar]
  14. Chen, W.; Zhang, Z. Globally stable adaptive backstepping fuzzy control for output-feedback systems with unknown high-frequency gain sign. Fuzzy Sets Syst. 2010, 161, 821–836. [Google Scholar] [CrossRef]
  15. Chen, W.S.; Li, J.M. Globally decentralized adaptive backstepping neural network tracking control for unknown nonlinear systems. Asian J. Control 2010, 12, 96–102. [Google Scholar] [CrossRef]
  16. Zheng, Y.; Sun, P.; Ren, Q.; Xu, W.; Zhu, D. A novel and efficient model pruning method for deep convolutional neural networks by evaluating the direct and indirect effects of filters. Neurocomputing 2024, 569, 127124. [Google Scholar] [CrossRef]
  17. López-González, C.I.; Gascó, E.; Barrientos-Espillco, F.; Besada-Portas, E.; Pajares, G. Filter pruning for convolutional neural networks in semantic image segmentation. Neural Netw. 2024, 169, 713–732. [Google Scholar] [CrossRef]
  18. Wang, Z.; Ruiz, L.; Ribeiro, A. Stability to deformations of manifold filters and manifold neural networks. IEEE Trans. Signal Process. 2024, 72, 2130–2146. [Google Scholar] [CrossRef]
  19. Yin, Q.; Mu, Q.; Bian, Y.; Ji, W.; Wang, L. Command filtered dual backstepping variable structure robust switching control of uncertain nonlinear system. Nonlinear Dyn. 2023, 111, 3953–3967. [Google Scholar] [CrossRef]
  20. Ma, H.; Li, H.; Lu, R.; Huang, T. Adaptive event-triggered control for a class of nonlinear systems with periodic disturbances. Sci. China Inf. Sci. 2020, 63, 150212. [Google Scholar] [CrossRef]
  21. Li, B.; Xia, J.; Zhang, H.; Shen, H.; Wang, Z. Event-triggered adaptive fuzzy tracking control for stochastic nonlinear systems. J. Frankl. Inst. 2020, 357, 9505–9522. [Google Scholar] [CrossRef]
  22. Vafamand, N.; Arefi, M.M.; Anvari-Moghaddam, A. Advanced kalman filter-based backstepping control of AC microgrids: A command filter approach. IEEE Syst. J. 2022, 17, 1060–1070. [Google Scholar] [CrossRef]
  23. Ni, J.; Liu, L.; Tang, Y.; Liu, C. Predefined-time consensus tracking of second-order multiagent systems. IEEE Trans. Syst. Man, Cybern. Syst. 2019, 51, 2550–2560. [Google Scholar] [CrossRef]
  24. Zhang, Z.; Hu, S.; Chen, Q. Predefined-Time Sliding Mode Control for Attitude Tracking of Quadrotors. Int. J. Appl. Math. Control Eng. 2023, 6, 187–191. [Google Scholar]
  25. Liu, J.; Shi, J.; Wu, Y.; Wang, X.; Sun, J.; Sun, C. Event-based predefined-time second-order practical consensus with application to connected automated vehicles. IEEE Trans. Intell. Veh. 2023, 8, 4524–4535. [Google Scholar] [CrossRef]
  26. Muñoz-Vázquez, A.J.; Sánchez-Torres, J.D.; Defoort, M. Second-order predefined-time sliding-mode control of fractional-order systems. Asian J. Control 2022, 24, 74–82. [Google Scholar] [CrossRef]
  27. Zhang, Q.; Wang, H.; Wang, J. Finite-Time Bounded Control for Multitime-Scale Production-Inventory Systems Under Inventory Inaccuracy. IEEE Trans. Comput. Soc. Syst. 2024; early access. [Google Scholar] [CrossRef]
  28. Wang, J.; Li, Y.; Wu, Y.; Liu, Z.; Chen, K.; Chen, C.P. Fixed-time formation control for uncertain nonlinear multi-agent systems with time-varying actuator failures. IEEE Trans. Fuzzy Syst. 2024, 32, 1965–1977. [Google Scholar] [CrossRef]
  29. Sui, S.; Chen, C.L.P.; Tong, S. Command Filter Based Predefined Time Adaptive Control for Nonlinear Systems. IEEE Trans. Autom. Control 2024, 69, 7863–7870. [Google Scholar] [CrossRef]
  30. Ji, Y.; Li, P.; Lin, Y.; Song, Y.; Gao, Q.; Liu, J. Predefined time attitude control of aircraft based on predefined time sliding mode control. Proc. Inst. Mech. Eng. Part I J. Syst. Control Eng. 2024, 239, 09596518241273990. [Google Scholar] [CrossRef]
  31. Riaz, S.; Li, B.; Qi, R.; Zhang, C. An adaptive predefined time sliding mode control for uncertain nonlinear cyber-physical servo system under cyber attacks. Sci. Rep. 2024, 14, 7361. [Google Scholar] [CrossRef]
  32. Zheng, W.; Qu, S.; Tang, Q. Predefined-time synchronization for uncertain hyperchaotic system with time-delay via sliding mode control. Nonlinear Dyn. 2024, 112, 21969–21987. [Google Scholar] [CrossRef]
  33. Wang, S.; Wang, Y.; Li, S.; Yu, H. Predefined-time Adaptive Sliding Mode Control for Flexible Spacecraft. In Proceedings of the 2024 43rd Chinese Control Conference (CCC), Kunming, China, 28–31 July 2024; pp. 869–874. [Google Scholar]
  34. Gao, Y.; Niu, B.; Chen, W.; Wang, H.; Mu, C.; Wen, G. Adaptive control of constrained nonlinear CPSs under deception attacks through sensor and actuator networks. IEEE Trans. Circuits Syst. II Express Briefs 2023, 71, 1241–1245. [Google Scholar] [CrossRef]
  35. Sánchez-Torres, J.D.; Gómez-Gutiérrez, D.; López, E.; Loukianov, A.G. A class of predefined-time stable dynamical systems. IMA J. Math. Control Inf. 2018, 35 (Suppl. 1), i1–i29. [Google Scholar] [CrossRef]
  36. Jiménez-Rodríguez, E.; Muñoz-Vázquez, A.J.; Sánchez-Torres, J.D.; Loukianov, A.G. A note on predefined-time stability. IFAC-PapersOnLine 2018, 51, 520–525. [Google Scholar] [CrossRef]
  37. Zhang, Y.; Niu, B.; Zhao, X.; Duan, P.; Wang, H.; Gao, B. Global predefined-time adaptive neural network control for disturbed pure-feedback nonlinear systems with zero tracking error. IEEE Trans. Neural Netw. Learn. Syst. 2021, 34, 6328–6338. [Google Scholar] [CrossRef]
  38. Li, Z.; Yan, H.; Zhang, H.; Lam, H.K.; Wang, M. Aperiodic sampled-data-based control for interval type-2 fuzzy systems via refined adaptive event-triggered communication scheme. IEEE Trans. Fuzzy Syst. 2020, 29, 310–321. [Google Scholar] [CrossRef]
  39. Yuan, X.; Chen, B.; Lin, C. Neural adaptive fixed-time control for nonlinear systems with full-state constraints. IEEE Trans. Cybern. 2021, 53, 3048–3059. [Google Scholar] [CrossRef]
  40. Zuo, Z.; Tie, L. A new class of finite-time nonlinear consensus protocols for multi-agent systems. Int. J. Control 2014, 87, 363–370. [Google Scholar] [CrossRef]
  41. Li, C.; Li, Y.; Zhang, J.; Li, Y. Event-Triggered Adaptive Neural Prescribed Performance Tracking Control for Nonlinear Cyber–Physical Systems against Deception Attacks. Mathematics 2024, 12, 1838. [Google Scholar] [CrossRef]
Figure 1. Resilient CPS design against sensor/actuator compromise.
Figure 1. Resilient CPS design against sensor/actuator compromise.
Mathematics 13 00742 g001
Figure 2. Representation of the electromechanical system.
Figure 2. Representation of the electromechanical system.
Mathematics 13 00742 g002
Figure 3. Random output.
Figure 3. Random output.
Mathematics 13 00742 g003
Figure 4. System output y and reference signal y d .
Figure 4. System output y and reference signal y d .
Mathematics 13 00742 g004
Figure 5. System output y and reference signal y d under fixed-time control.
Figure 5. System output y and reference signal y d under fixed-time control.
Mathematics 13 00742 g005
Figure 6. Error signal z 1 .
Figure 6. Error signal z 1 .
Mathematics 13 00742 g006
Figure 7. Filtering error e 1 .
Figure 7. Filtering error e 1 .
Mathematics 13 00742 g007
Figure 8. τ r and u.
Figure 8. τ r and u.
Mathematics 13 00742 g008
Figure 9. Error signal z 1 under the initial condition x 1 .
Figure 9. Error signal z 1 under the initial condition x 1 .
Mathematics 13 00742 g009
Figure 10. Filtering error e 1 under the initial condition x 1 .
Figure 10. Filtering error e 1 under the initial condition x 1 .
Mathematics 13 00742 g010
Figure 11. τ r and u under the initial condition x 1 .
Figure 11. τ r and u under the initial condition x 1 .
Mathematics 13 00742 g011
Figure 12. Error signal z 1 under the initial condition x 2 .
Figure 12. Error signal z 1 under the initial condition x 2 .
Mathematics 13 00742 g012
Figure 13. Filtering error e 1 under the initial condition x 2 .
Figure 13. Filtering error e 1 under the initial condition x 2 .
Mathematics 13 00742 g013
Figure 14. τ r and u under the initial condition x 2 .
Figure 14. τ r and u under the initial condition x 2 .
Mathematics 13 00742 g014
Figure 16. System output y and reference signal y d .
Figure 16. System output y and reference signal y d .
Mathematics 13 00742 g016
Figure 17. Error signal z 1 .
Figure 17. Error signal z 1 .
Mathematics 13 00742 g017
Figure 18. Filtering error e 1 .
Figure 18. Filtering error e 1 .
Mathematics 13 00742 g018
Figure 19. τ r and u.
Figure 19. τ r and u.
Mathematics 13 00742 g019
Table 1. Experimental Data (Partial).
Table 1. Experimental Data (Partial).
Time (s)y y d
80.1204701510.116277876
8.5−0.041671582−0.04833246
9−0.274288393−0.283060535
9.5−0.526257267−0.537512182
100.7396255690.751472693
10.50.859754747−0.869499123
11−0.849588005−0.852694502
11.5−0.698209415−0.691212146
12−0.418224563−0.407407685
12.5−0.060624217−0.049475562
Table 2. Calculated Performance Indices.
Table 2. Calculated Performance Indices.
IndexISEITSEIAEIATE
Value1.83221.4564.21545.327
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, J.; Yu, Z.; Zhu, Q.; Yu, X. Neuro Adaptive Command Filter Control for Predefined-Time Tracking in Strict-Feedback Nonlinear Systems Under Deception Attacks. Mathematics 2025, 13, 742. https://doi.org/10.3390/math13050742

AMA Style

Zhang J, Yu Z, Zhu Q, Yu X. Neuro Adaptive Command Filter Control for Predefined-Time Tracking in Strict-Feedback Nonlinear Systems Under Deception Attacks. Mathematics. 2025; 13(5):742. https://doi.org/10.3390/math13050742

Chicago/Turabian Style

Zhang, Jianhua, Zhanyang Yu, Quanmin Zhu, and Xuan Yu. 2025. "Neuro Adaptive Command Filter Control for Predefined-Time Tracking in Strict-Feedback Nonlinear Systems Under Deception Attacks" Mathematics 13, no. 5: 742. https://doi.org/10.3390/math13050742

APA Style

Zhang, J., Yu, Z., Zhu, Q., & Yu, X. (2025). Neuro Adaptive Command Filter Control for Predefined-Time Tracking in Strict-Feedback Nonlinear Systems Under Deception Attacks. Mathematics, 13(5), 742. https://doi.org/10.3390/math13050742

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop