Next Article in Journal
Uncertainty-Based Scale Identification and Process–Topography Interaction Analysis via Bootstrap: Application to Grit Blasting
Previous Article in Journal
Existence Results of Nonlocal Fractional Integro-Neutral Differential Inclusions with Infinite Delay
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks

1
College of Mathematics and System Sciences, Xinjiang University, Urumqi 830017, China
2
Xinjiang Key Laboratory of Applied Mathematics, Urumqi 830017, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2025, 9(1), 47; https://doi.org/10.3390/fractalfract9010047
Submission received: 27 November 2024 / Revised: 9 January 2025 / Accepted: 13 January 2025 / Published: 17 January 2025

Abstract

This article investigates the problem of finite-time synchronization of fractional-order complex-valued random multi-layer networks without decomposing them into two real-valued systems. Firstly, by promoting real-valued signum functions, sign functions on the complex-valued domain are introduced. Simultaneously, quantization functions in the complex-valued domain are also introduced, and several related formulas for sign functions and quantization functions in complex-valued domain are established. Under the framework of the given sign function and quantization function, an adaptive quantized control scheme with or without deception attacks is designed. According to the finite-time theorem, Lyapunov function, and graph theory methods, some sufficient criteria for realizing finite-time synchronization in complex-valued fractional-order multi-layer networks have been obtained. Furthermore, the setting time of finite-time synchronization is effectively evaluated. Eventually, the reliability of our results and the practicality of control strategies are verified through numerical examples.

1. Introduction

In recent years, loads of practical systems have been represented by single-layer complex networks, for instance, transportation networks [1], power networks [2] and the World Wide Web [3]. Nevertheless, the above research results describe complex single-layer networks and are unable to really regard the interactivities between networks in actual life. For instance, in transportation networks, multiple types of transportation, such as subways, buses, and taxis, coexist [1]. In social networks, people who use different social methods, such as phone, QQ, WeChat, etc., can be divided into different network layers [4]. These are composed of multi-layer networks (MLNs), which can better describe multiple relationships. Regarding the complicated interactions among network layers, MLNs have arisen at the historic moment and become an important research subfield little by little in the network science field.
It is noteworthy noting that most existing research on MLNs focuses on integer-order MLNs. However, traditional integer-order integral models are complex and, therefore, cannot fully describe the dynamic characteristics of certain real-world systems. Fortunately, due to its infinite memory and heritable properties [5], fractional calculus is considered a significant improvement over integer-order MLNs. It has already been used in the fields of synchronization and control applications, for example, electromagnetic waves, viscoelastic rheology, dielectric polarization [6,7,8]. In real life, the rotating fluid and laser issues in the real world can be precisely described and effectively overcome based on complex-valued problems [9,10]. Unlike real-valued complex networks, complex-valued complex networks have intricate features and widespread applications. For instance, in the complex-valued domain, both the XOR problem and symmetry detection can be better tackled [11]. Even better, the transmission of the signal through complex-valued MLNs has superior resistance to attacks [12]. The synchronization problem of multiple fractional-order fuzzy complex-valued networks was studied by designing a fuzzy pinning control protocol in [13]. Considering the universal applicability of MLNs, some research on complex-valued stochastic MLNs has achieved significant results [14,15]. However, these are the results of integer-order complex-valued multi-layer networks. Further in-depth research is needed on fractional-order complex-valued MLNs (FOCVMLNs).
Synchronization describes the phenomenon in nature where multiple individuals eventually converge through certain interactions. Real life applications contain swarm performance of drones [16] and communication [17]. Due to the great research significance of synchronization in MLNs, the current synchronization types in MLNs can be classified as complete synchronization [18], intra-layer synchronization [19], inter-layer synchronization [20], cluster synchronization [21]. Due to the lifespan of some biological agents and machinery equipment in practical engineering applications, it is often expected that the network will realize synchronization within a finite time rather than infinite time. Furthermore, finite-time synchronization (FITS) has better robustness and interference suppression characteristics [22]. Some research results have been achieved on FITS of fractional-order real-valued MLNs [23,24]. Due to the excellent resistance of signals transmitted through complex-valued networks to attacks, fruitful results have been achieved so far [25,26,27]. The FITS problem of fractional-order complex-valued networks was discussed by putting forward feedback control strategies in [25,26]. However, the above research results are all about the FITS of fractional-order complex-valued single-layer networks. The research results on FOCVMLNs are not yet sufficient. Therefore, studying the FITS of FOCVMLNs is reasonable and meaningful.
Generally speaking, FOCVMLNs cannot synchronize through their own behavior or coupling forms, which requires some external control to be applied to networks. General control inputs include adaptive control, impulsive control, quantized control, etc. In addition, in the aforementioned control methods, the quantized control is both effective and economical. Signal quantization can be seen as mapping continuous signals to a finite set of discrete signals, which merely requires encryption and transmission of these discrete signals. It greatly reduces the signal interference and lowers control costs. A new quantized control strategy was devised to study the fixed-time synchronization of a replication-coupled network with external and random disturbances in [28]. A new quantized intermittent control strategy was designed to investigate the exponential synchronization problem of neural networks based on complex-valued memristors in [29]. In contrast to the feedback control with a fixed control gain, the control gain of adaptive control can regulate itself according to constantly changing node states, therefore seeking out the optimum control gain and optimizing control costs [30,31,32]. The FITS of fractional-order complex-valued networks was discussed by devising adaptive control strategies in [30,31]. The FITS of fractional-order complex and neural networks were discussed by devising an adaptive quantized controller (AQC) in [24,33]. Nevertheless, there is currently a shortage of FITS results for AQC protocol in complex-valued domains. Hence, it is of vital importance to consider studying the FITS of FOCVMLNs under the AQC strategy.
Presently, with the widespread application and development of network communication technology, network security issues cannot be ignored. During the synchronization process, the network control systems will inevitably suffer from some malicious intrusions and random attacks, which commonly lead to a decline in network behavior or interruptions in realizing synchronization targets of MLNs by coupling. Generally speaking, cyber-attacks can be approximately classified as two types: denial-of-service attacks (DoS attacks) and deceptive attacks (DPAs). DoS attacks disrupt the communication channels between nodes in the network by taking up network resources, thereupon then impeding the successful transmission of data packets [34,35]. DPAs infuse incorrect data into the communication channels of the network and alter data packages to destroy the wholeness of control signals, which is extremely covert and not easy to prevent. It deserves the attention of researchers. Two kinds of event-triggered control strategies were designed to investigate the event-triggered synchronization of fractional-order networks with DPAs [36,37]. However, there are currently no relevant outcomes on the FITS of FOCVMLNs under DPAs.
Inspired by the above, a new AQC strategy is proposed in a complex-valued domain. In addition, due to the features of network information sharing, the control systems of the network are susceptible to malignant network attacks. Enlightened by these discussions, this article investigates the FITS problem of FOCVMLNs under DPAs. The major contributions of this text are as below.
(1)
The designed AQC strategy combines the merits of adaptive control and quantized control. Considering the vulnerability of network systems to stochastic DPAs, a random variable that follows the Bernoulli distribution has been designed, which is more practical.
(2)
This article introduces new sign functions and quantization functions in the complex domain and establishes some related formulas for the complex-valued domain. It studies the FITS of FOCVMLNs, and the settling time of FITS is sufficiently evaluated.
(3)
A sufficient criterion for FITS of FOCVMLNs under stochastic DPAs is designed based on Lyapunov functions and graph theory methods. The numerical simulation presented at the end demonstrates the dependability of theoretical deductions.
Notations:  R + is the set composed of all non-negative constants. R n represents the space consisted of total n-dimensional real vectors. C and C n × n separately express the set of total complex numbers and a space consisting of total n-dimensional complex vectors. = { 1 , 2 , , N } and = { 1 , 2 , , L } individually mean the set of vertexes and the set of layers. For any k = x + i y C , k ¯ = x i y signifies the conjugate of k , | k | 1 = | x | + | y | , | k | 2 = k ¯ k , wherein i 2 = 1 , x , y R and Re ( k ) = x , Im ( k ) = y . For arbitrary K = ( k 1 , k 2 , , k n ) C n , K H denotes its conjugate transposition, | | K | | 1 = 𝚤 = 1 N | k 𝚤 | 1 , | | K | | 2 = ( 𝚤 = 1 N | k 𝚤 | 2 ) 1 2 . Assuming C n × n represents the set of total n-dimensional complex-valued matrices. I n stands for the n × n unit matrix. ⊗ denotes Kronecker product. λ max ( A ) signifies the maximum eigenvalue of real symmetric matrix A. P { Ψ } denotes the probability operator of event Ψ . E { Ψ } denotes the exception operator for an event Ψ .

2. Preliminaries and Problem Description

A. Algebraic Graph Theory
Consider a FOCVMLN undigraph  G ( r ) = ( V , E ( r ) , A ( r ) ) , wherein V = { V 1 , V 2 , , V N } represents the set of vertexes, E ( r ) V × V expresses the set of edges composed of vertexes. A ( r ) = ( a 𝚤 j ( r ) ) N × N ( 𝚤 , j ) denotes the adjacency matrix of G ( r ) , where a 𝚤 j ( r ) = a j 𝚤 ( r ) > 0 ( 𝚤 j ) when there is a link between vertex ı and vertex j in layer r, otherwise a 𝚤 j ( r ) = 0 . The corresponding Laplace matrix L A ( r ) = ( a ^ 𝚤 j ( r ) ) N × N is a ^ 𝚤 j ( r ) = a ^ j 𝚤 ( r ) = a 𝚤 j ( r ) < 0 ( 𝚤 j ) , and a ^ 𝚤 𝚤 ( r ) = j = 1 , j 𝚤 N a 𝚤 j ( r ) .
B. Problem Description
The dynamic equation of FOCVMLN consists of an L ( L 2 ) -layer network with N nodes in each layer, as shown below.
D t α ˘ t 0 C x ˘ 𝚤 ( r ) ( t ) = f ( x ˘ 𝚤 ( r ) ( t ) ) + c j = 1 N a 𝚤 j ( r ) P ( x ˘ j ( r ) ( t ) x ˘ 𝚤 ( r ) ( t ) ) + d k = 1 L b r k Q ( x ˘ 𝚤 ( k ) ( t ) x ˘ 𝚤 ( r ) ( t ) ) + u 𝚤 ( r ) ( t ) , 𝚤 , r ,
in which x ˘ 𝚤 ( r ) ( t ) = ( x ˘ 𝚤 1 ( r ) ( t ) , x ˘ 𝚤 2 ( r ) ( t ) , , x ˘ 𝚤 n ( r ) ( t ) ) T C n represents the state vector of the ıth node in the rth layer, f ( x ˘ 𝚤 ( r ) ( t ) ) = ( f 1 ( x ˘ 𝚤 ( r ) ( t ) ) , f 2 ( x ˘ 𝚤 ( r ) ( t ) ) , , f n ( x ˘ 𝚤 ( r ) ( t ) ) ) C n expresses a sleek nonlinear vector function, c and d separately show the coupling weights of intra-layer and inter-layer. P = diag ( P 1 , P 2 , , P n ) C n × n means the coupling matrix of intra-layer. Q = diag ( Q 1 , Q 2 , , Q n ) C n × n shows the coupling matrix between vertexes in the inter-layer. B = ( b r k ) L × L is the corresponding adjacency matrix between nodes in the rth and the kth layer. L B = ( b ^ r k ) L × L is the Laplace matrix of inter-layer, which is defined as b ^ r k = b ^ k r = b r k < 0 ( r k ) , and b ^ r r = k = 1 , k r L b r k > 0 . The initial condition for system (1) is X ( r ) ( 0 ) = ( ( x ˘ 1 ( r ) ( 0 ) ) T , ( x ˘ 2 ( r ) ( 0 ) ) T , , ( x ˘ N ( r ) ( 0 ) ) T ) T C N n .
Definition 1
([8,38]). The Caputo fractional-order derivative of order α ˘ > 0 for a function ϕ ( t ) : [ t 0 , + ) C is given by
D t α ˘ t 0 C ϕ ( t ) = 1 Γ ( 1 α ˘ ) t 0 t ϕ ( ω ˘ ) ( t ω ˘ ) α ˘ d ω ˘ , 0 < α ˘ < 1 .
Definition 2
([8,38]). For an integrable function ϕ ( t ) : [ t 0 , + ) C , the fractional integral of it with order α ˘ is given by
I t α ˘ t 0 ϕ ( t ) = 1 Γ ( α ˘ ) t 0 t ( t ω ˘ ) α ˘ 1 ϕ ( ω ˘ ) d ω ˘ , 0 < α ˘ < 1 ,
where t t 0 , Γ ( α ˘ ) = 0 ω ˘ α ˘ 1 g ω ˘ d ω ˘ .
Lemma 1
([39]). If x ( t ) C n is a continuous and analytic function, then for any t t 0 ,
D t α ˘ t 0 C x H ( t ) x ( t ) x H ( t ) D t α ˘ t 0 C x ( t ) + ( D t α ˘ t 0 C x H ( t ) ) x ( t ) , 0 < α ˘ < 1 .
Lemma 2
([8,38]). Suppose that function ϕ ( t ) : [ t 0 , + ) C is consecutive differentiable, then for all t [ t 0 , + ) ,
I t α ˘ t 0 D t α ˘ t 0 C ϕ ( t ) = ϕ ( t ) ϕ ( t 0 ) , 0 < α ˘ < 1 .
Lemma 3
([25]). For any a C ,
a + a ¯ = 2 R e ( a ) 2 | a | 2 2 | a | 1 .
Definition 3
([26]). For any υ C , [ υ ] = sign ( Re ( υ ) ) + i sign ( Im ( υ ) ) is called the signum function of υ. For any μ C n , [ μ ] = ( sign ( Re ( μ 1 ) ) + i sign ( Im ( μ 1 ) ) , , sign ( Re ( μ n ) ) + i sign ( Im ( μ n ) ) ) T is called the signum function of μ.
Lemma 4
([26]). Assume that υ ( t ) C , μ ( t ) C n , then
(1) 
υ H ( t ) [ μ ( t ) ] + [ μ ( t ) ] H υ ( t ) 2 | | υ ( t ) | | 1 .
(2) 
μ H ( t ) [ μ ( t ) ] + [ μ ( t ) ] H μ ( t ) = 2 | | μ ( t ) | | 1 2 | | μ ( t ) | | 2 .
(3) 
D t α ˘ t 0 C ( [ μ ( t ) ] H μ ( t ) + μ H ( t ) [ μ ( t ) ] ) [ μ ( t ) ] H D t α ˘ t 0 C μ ( t ) + ( D t α ˘ t 0 C μ H ( t ) ) [ μ ( t ) ] .
(4) 
[ μ ( t ) ] H [ μ ( t ) ] = | | [ μ ( t ) ] | | 1 .
Lemma 5
([26]). Assume that V ( t ) : [ t 0 , + ) R + is a continuous positive definite function, if there exists a constant ξ > 0 such that
D t α ˘ t 0 C V ( t ) ξ , V ( t ) R + \ { 0 } ,
then V ( t ) = 0 for all t t , where 0 < α ˘ < 1 , t = t 0 + ( Γ ( α ˘ + 1 ) V ( t 0 ) ξ ) 1 α ˘ .
The synchronization objective equation of network (1) is described as
D t α ˘ t 0 C s ( r ) ( t ) = f ( s ( r ) ( t ) ) , r ,
wherein 0 < α ˘ < 1 , s ( r ) ( t ) = ( s 1 ( r ) , s 2 ( r ) , , s n ( r ) ) C n .
Definition 4
([40]). The system (1) is called to realize FITS provided that there exists a constant T 0 related to the initial value such that
lim t T | | x ˘ 𝚤 ( r ) ( t ) s ( r ) ( t ) | | = 0 , 𝚤 , r ,
and | | x ˘ 𝚤 ( r ) ( t ) s ( r ) ( t ) | | = 0 for all t T , where
T = inf { T 0 : x ˘ 𝚤 ( r ) ( t ) = s ( r ) ( t ) for t T }
is known as the settling time of synchronization.
Assumption 1.
There exists a constant L f > 0 such that
| | f ( y ) f ( z ) | | 2 L f | | y z | | 2 , y , z C n .
Define the state error as ϵ 𝚤 ( r ) ( t ) = x ˘ 𝚤 ( r ) ( t ) s ( r ) ( t ) , the error system is express as below.
D t α ˘ t 0 C ϵ 𝚤 ( r ) ( t ) = f ˜ ( ϵ 𝚤 ( r ) ( t ) ) + c j = 1 N a 𝚤 j ( r ) P ( ϵ j ( r ) ( t ) ϵ 𝚤 ( r ) ( t ) ) + d k = 1 L b r k Q ( ϵ 𝚤 ( k ) ( t ) ϵ 𝚤 ( r ) ( t ) ) + u 𝚤 ( r ) ( t ) , 𝚤 , r ,
where f ˜ ( ϵ 𝚤 ( r ) ( t ) ) = f ( x ˘ 𝚤 ( r ) ( t ) ) f ( s ( r ) ( t ) ) .

3. Main Results

A. FITS with cyber attack
In this part, we will investigate the FITS of FOMLNs under cyber-attacks. In recent years, cyber-attacks have occurred frequently, and network security has turned into a hot research topic. When the network communication channel is attacked, the controller is unable to accept the correct state information. Based on previous research results [36,37], we design an adaptive quantized control strategy under random cyber attack as below.
u 𝚤 ( r ) ( t ) = ϖ ( t ) H ( t ) + ( 1 ϖ ( t ) ) φ 𝚤 ( r ) ( t ) , 𝚤 , r ,
where H ( t ) is the stochastic DPAs signal. ϖ ( t ) denotes a Bernoulli random variable, which satisfies P { ϖ ( t ) = 1 } = ϖ , P { ϖ ( t ) = 0 } = 1 ϖ , ϖ ( 0 , 1 ) is a known constant, and E { ϖ ( t ) } = E { ϖ ( t ) 2 } = ϖ . φ 𝚤 ( r ) ( t ) is a controller that receives normal signals, which is designed as below.
φ 𝚤 ( r ) ( t ) = k 𝚤 ( r ) ( t ) q ( ϵ 𝚤 ( r ) ( t ) ) η ( r ) sign ( q ( ϵ 𝚤 ( r ) ( t ) ) ) Λ q ( ϵ 𝚤 ( r ) ( t ) ) | | ϵ 𝚤 ( r ) ( t ) | | 2 , | | ϵ 𝚤 ( r ) ( t ) | | 0 0 , | | ϵ 𝚤 ( r ) ( t ) | | = 0 .
D t α ˘ t 0 C k 𝚤 ( r ) ( t ) = ε ( 1 ϖ ( t ) ) ( 1 χ ) ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ,
where k 𝚤 ( r ) ( t ) represents the adaptive control gain, Λ R + , q ( ϵ 𝚤 ( r ) ( t ) ) = ( q ^ ( ϵ 𝚤 1 ( r ) ( t ) ) , q ^ ( ϵ 𝚤 2 ( r ) ( t ) ) , , q ^ ( ϵ 𝚤 n ( r ) ( t ) ) ) T , where q ^ ( ϵ 𝚤 l ( r ) ( t ) ) = q ˘ ( Re ( ϵ 𝚤 l ( r ) ( t ) ) ) + i q ˘ ( Im ( ϵ 𝚤 l ( r ) ( t ) ) ) , wherein l = 1 , 2 , , n , sign ( q ( ϵ 𝚤 ( r ) ( t ) ) ) = ( [ q ^ ( ϵ 𝚤 1 ( r ) ( t ) ) ] , [ q ^ ( ϵ 𝚤 2 ( r ) ( t ) ) ] , , [ q ^ ( ϵ 𝚤 n ( r ) ( t ) ) ] ) .
q ˘ ( μ ) = ι , 1 1 + χ ι < μ 1 1 χ ι , 0 , μ = 0 , q ˘ ( μ ) , μ < 0 ,
wherein ζ = { ± ι : ι = ϱ ι 0 , ι = 0 , ± 1 , ± 2 , } { 0 } ( 0 > 0 ) represents the set of quantification levels. χ = 1 ϱ 1 + ϱ expresses the quantification step. 0 < ϱ < 1 denotes the quantization density. Analysis according to [41], there has a Filippov solution σ [ χ , χ ) meeting q ˘ ( μ ) = ( 1 + σ ) μ , μ R .
Remark 1.
The specific structure of cyber-attacks is shown in Figure 1. The sensor receives status information x ˘ 𝚤 ( r ) ( t ) from plant i and then transmits it to the controller. The controller u 𝚤 ( r ) ( t ) sends control signals to the actuator through the communication network. During the signal transmission process, the attacker inputs an incorrect data packet H ( t ) to the control signal through the communication network. Then, the tampered signal is sent to plant i through the actuator, thus completing the deceptive attack process.
Remark 2.
Actually, the AQC controller (4) has the following two situations:
(1) 
When ϖ ( t ) = 1 , DPAs are active. At this time, the AQC (4) can only receive erroneous data packets H ( t ) .
(2) 
When ϖ ( t ) = 0 , DPAs do not exist. At this moment, the AQC (4) can only receive rightful data packets φ 𝚤 ( r ) ( t ) .
Assumption 2.
For the continuous function H ( · ) : R n R n , there is a constant H 1 > 0 such that
| | H ( · ) | | 2 H 1 .
Remark 3.
The FITS problem of complex dynamic networks was investigated by devising an AQC algorithm in [42], but it neither considers random DPAs nor the situation in the complex-valued domain in synchronization. The controller (4) in this article has been improved based on this. Considering the influence of complex variables and DPAs on FOMLNs, a new adaptive complex-valued quantized controller is designed. Not only can it effectively reduce bandwidth and signal transmission voltage, but it can also resist network DPAs and suppress external interference.
Denote
L A = ( L A ( 1 ) , L A ( 2 ) , , L A ( L ) ) ,
λ 1 = λ min ( c L A P ) + ( c L A P ) H ,
λ 2 = λ min I N d L B Q + ( d L B Q ) H ,
λ 3 = λ min 2 ( 1 ϖ ) ( 1 χ ) ( Δ I L n ) ,
ξ = 2 Λ ( 1 ϖ ) ( 1 χ ) .
Theorem 1.
Under Assumptions 1 and 2 and the control protocol (4), the system (1) realizes FITS if there is a constant η > 0 satisfying
η > ϖ H 1 1 ϖ , η = min r L { η ( r ) } ,
where the setting time of FITS is estimated as
T 1 = t 0 + V ( ϵ ( t 0 ) ) Γ ( α ˘ + 1 ) ξ 1 α ˘ .
Proof. 
Construct the following Lyapunov functions.
V ( ϵ ( t ) ) = r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) + r = 1 L 𝚤 = 1 N ( k 𝚤 ( r ) ( t ) δ 𝚤 ) 2 ε ,
where δ 𝚤 > 0 is the adaptive constant,
ϵ ( t ) = ( ϵ ( 1 ) ( t ) ) T , ( ϵ ( 2 ) ( t ) ) T , , ( ϵ ( L ) ( t ) ) T T ,
ϵ ( r ) ( t ) = ( ϵ 1 ( r ) ( t ) ) T , ( ϵ 2 ( r ) ( t ) ) T , , ( ϵ N ( r ) ( t ) ) T T .
For ϵ ( t ) C L N n \ { 0 L N n } , with the help of Lemma 1,
E { D t α ˘ t 0 C V ( ϵ ( t ) ) } r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H f ˜ ( ϵ 𝚤 ( r ) ( t ) ) + f ˜ H ( ϵ 𝚤 ( r ) ( t ) ) ϵ 𝚤 ( r ) ( t ) + r = 1 L 𝚤 = 1 N j = 1 N ( ( ϵ 𝚤 ( r ) ( t ) ) H c a 𝚤 j ( r ) P ϵ j ( r ) ( t ) ϵ 𝚤 ( r ) ( t ) + c a 𝚤 j ( r ) ¯ P H ( ϵ j ( r ) ( t ) ) H ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ) + r = 1 L 𝚤 = 1 N k = 1 L ( ( ϵ 𝚤 ( r ) ( t ) ) H d b r k Q ϵ 𝚤 ( k ) ( t ) ϵ 𝚤 ( r ) ( t ) + d ¯ b r k ¯ Q H ( ϵ 𝚤 ( k ) ( t ) ) H ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ) + ( 1 ϖ ) r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H φ 𝚤 ( r ) ( t ) + ( φ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) + r = 1 L 𝚤 = 1 N ϖ ( ϵ 𝚤 ( r ) ( t ) ) H H ( t ) + H H ( t ) ϵ 𝚤 ( r ) ( t ) + 2 ( 1 ϖ ) ( 1 χ ) r = 1 L 𝚤 = 1 N ( k 𝚤 ( r ) ( t ) δ 𝚤 ) ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) .
Based on Lemma 3 and Assumption 1,
( ϵ 𝚤 ( r ) ( t ) ) H f ˜ ( ϵ 𝚤 ( r ) ( t ) ) + f ˜ H ( ϵ 𝚤 ( r ) ( t ) ) ϵ 𝚤 ( r ) ( t ) 2 r = 1 L 𝚤 = 1 N | | ϵ 𝚤 ( r ) ( t ) | | 2 | | f ˜ ( ϵ 𝚤 ( r ) ( t ) ) | | 2 2 L f r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) = 2 L f ϵ H ( t ) ϵ ( t ) ,
r = 1 L 𝚤 = 1 N ( ( ϵ 𝚤 ( r ) ( t ) ) H c j = 1 N a 𝚤 j ( r ) P ϵ j ( r ) ( t ) ϵ 𝚤 ( r ) ( t ) + j = 1 N c a 𝚤 j ( r ) ¯ P H ( ϵ j ( r ) ( t ) ) H ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ) = r = 1 L ( ϵ ( r ) ( t ) ) H ( c L A ( r ) P ) + ( c L A ( r ) P ) H ϵ ( r ) ( t ) = ϵ H ( t ) ( c L A P ) + ( c L A P ) H ϵ ( t ) λ 1 ϵ H ( t ) ϵ ( t ) ,
r = 1 L 𝚤 = 1 N k = 1 L ( ( ϵ 𝚤 ( r ) ( t ) ) H d b r k Q ϵ 𝚤 ( k ) ( t ) ϵ 𝚤 ( r ) ( t ) + d b r k ¯ Q H ( ϵ 𝚤 ( k ) ( t ) ) H ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ) = 𝚤 = 1 N ( ϵ 𝚤 ( t ) ) H d L B Q + ( d L B Q ) H ϵ 𝚤 ( t ) = ϵ ˜ H ( t ) I N d L B Q + ( d L B Q ) H ϵ ˜ ( t ) λ 2 ϵ H ( t ) ϵ ( t ) ,
where
ϵ 𝚤 ( t ) = ( ϵ 𝚤 ( 1 ) ( t ) ) T , ( ϵ 𝚤 ( 2 ) ( t ) ) T , , ( ϵ 𝚤 ( L ) ( t ) ) T T ,
ϵ ˜ ( t ) = ( ϵ 1 T ( t ) ) , ( ϵ 2 T ( t ) ) , , ( ϵ N T ( t ) ) T .
By Lemmas 3 and 4,
( 1 ϖ ) r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H φ 𝚤 ( r ) ( t ) + ( φ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) = ( 1 ϖ ) r = 1 L 𝚤 = 1 N l = 1 n ( ϵ 𝚤 l ( r ) ( t ) ¯ k 𝚤 l ( r ) ( t ) q ^ ( ϵ 𝚤 l ( r ) ( t ) ) η ( r ) [ q ^ ( ϵ 𝚤 l ( r ) ( t ) ) ] Λ q ^ ( ϵ 𝚤 l ( r ) ( t ) ) | | ϵ 𝚤 ( r ) ( t ) | | 2 k 𝚤 l ( r ) ( t ) q ^ ( ϵ 𝚤 l ( r ) ( t ) ) ¯ + η ( r ) [ q ^ ( ϵ 𝚤 l ( r ) ( t ) ) ] ¯ + Λ q ^ ( ϵ 𝚤 l ( r ) ( t ) ) ¯ | | ϵ 𝚤 ( r ) ( t ) ¯ | | 2 ϵ 𝚤 l ( r ) ( t ) ) ( 1 ϖ ) ( 1 χ ) r = 1 L 𝚤 = 1 N l = 1 n k 𝚤 l ( r ) ( t ) ϵ 𝚤 l ( r ) ( t ) ¯ ϵ 𝚤 l ( r ) ( t ) + ϵ 𝚤 l ( r ) ( t ) ¯ ϵ 𝚤 l ( r ) ( t ) 2 ( 1 ϖ ) r = 1 L 𝚤 = 1 N l = 1 n η ( r ) | | ϵ 𝚤 ( r ) ( t ) | | 1 Λ ( 1 ϖ ) ( 1 χ ) r = 1 L 𝚤 = 1 N l = 1 n e 𝚤 l ( r ) ( t ) ¯ ϵ 𝚤 l ( r ) ( t ) | | ϵ 𝚤 ( r ) ( t ) | | 2 + ϵ 𝚤 l ( r ) ( t ) ¯ ϵ 𝚤 l ( r ) ( t ) | | ϵ 𝚤 ( r ) ( t ) ¯ | | 2 = 2 ( 1 ϖ ) ( 1 χ ) r = 1 L 𝚤 = 1 N k 𝚤 ( r ) ( t ) ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) 2 ( 1 ϖ ) r = 1 L 𝚤 = 1 N η ( r ) | | ϵ 𝚤 ( r ) ( t ) | | 1 2 Λ ( 1 ϖ ) ( 1 χ ) ,
By means of Lemma 3,
r = 1 L 𝚤 = 1 N ϖ ( ϵ 𝚤 ( r ) ( t ) ) H H ( t ) + H H ( t ) ϵ 𝚤 ( r ) ( t ) 2 ϖ r = 1 L 𝚤 = 1 N | | ϵ 𝚤 ( r ) ( t ) | | 2 | | H ( t ) | | 2 2 ϖ H 1 r = 1 L 𝚤 = 1 N | | ϵ 𝚤 ( r ) ( t ) | | 1 .
Combining Equations (9)–(14)
E { D t α ˘ t 0 C V ( ϵ ( t ) ) } 2 L f ϵ H ( t ) ϵ ( t ) λ 1 ϵ H ( t ) ϵ ( t ) λ 2 ϵ H ( t ) ϵ ( t ) ϵ H ( t ) 2 ( 1 ϖ ) ( 1 χ ) ( Δ I L n ) ϵ ( t ) 2 ( 1 ϖ ) r = 1 L 𝚤 = 1 N η ( r ) | | ϵ 𝚤 ( r ) ( t ) | | 1 + 2 ϖ H 1 r = 1 L 𝚤 = 1 N | | ϵ 𝚤 ( r ) ( t ) | | 1 2 Λ ( 1 ϖ ) ( 1 χ ) ( 2 L f λ 1 λ 2 λ 3 ) ϵ H ( t ) ϵ ( t ) + 2 ϖ H 1 ( 1 ϖ ) η r = 1 L 𝚤 = 1 N | | ϵ 𝚤 ( r ) ( t ) | | 1 2 Λ ( 1 ϖ ) ( 1 χ ) ,
where Δ = diag ( δ 1 , δ 2 , , δ N ) . Take a suitable Δ > 0 such that 2 L f λ 1 λ 2 λ 3 < 0 . Under the condition (8), according to (15),
E { D t α ˘ t 0 C V ( ϵ ( t ) ) } ξ .
Afterwards by means of Lemma 5,
T 1 = t 0 + V ( ϵ ( t 0 ) ) Γ ( α ˘ + 1 ) ξ 1 α ˘ .
Whereupon, V ( ϵ ( t ) ) = 0 for any t T 1 . Moreover, ϵ ( t ) = 0 for t T 1 . By Definition 4, it can be obtained that the system (1) realizes FITS under AQC strategy (4) with DPAs. □
Remark 4.
The FITS of multiplex networks was discussed by designing an AQC in [43]. Unlike the integer-order real-valued systems studied in [43], this paper considers fractional-order complex-valued systems, which have superior resistance to attacks. Additionally, when the AQC (4) receives DPAs signal ϖ ( t ) , we assume that the attack probability is 0 < ϖ < 1 . On this basis, the FOCVMLNs (1) can achieve FITS under AQC (4).
If Λ = 0 , Formula (5) can be abbreviated as
φ 𝚤 ( r ) ( t ) = k 𝚤 ( r ) ( t ) q ( ϵ 𝚤 ( r ) ( t ) ) η ( r ) sign ( q ( ϵ 𝚤 ( r ) ( t ) ) ) .
Corollary 1.
Based on Assumptions 1 and 2 and the control protocol (17), the system (1) realizes asymptotic synchronization if there has a constant η > 0 satisfying
η > ϖ H 1 1 ϖ , η = min r L { η ( r ) } .
Remark 5.
An AQC was designed to study the problem of robust H synchronization between multiplex neural networks under random network attacks and external disturbances in [44]. The controller (5) in [44] is the same as AQC (17) in this article. By contrast, it considered H synchronization and real-valued systems in [44]. In this article, we consider asymptotic synchronization and complex-valued systems, which have superior resistance to attacks. However, both of them consider network DPAs. The signals transmitted through FOCVMLNs have superior resistance to attacks and have greater research significance and practicality.
B. FITS without cyber attack
If there is no cyber attack, then the AQC (4) can be depicted as below
u ˜ 𝚤 ( r ) ( t ) = k ˜ 𝚤 ( r ) ( t ) q ( ϵ 𝚤 ( r ) ( t ) ) η ˜ ( r ) sign ( q ( ϵ 𝚤 ( r ) ( t ) ) ) Λ ˜ q ( ϵ 𝚤 ( r ) ( t ) ) | | ϵ 𝚤 ( r ) ( t ) | | 2 , | | ϵ 𝚤 ( r ) ( t ) | | 0 0 , | | ϵ 𝚤 ( r ) ( t ) | | = 0 .
where
D t α ˘ t 0 C k ˜ 𝚤 ( r ) ( t ) = ε ˜ ( 1 χ ) ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) ,
Denote
λ 4 = λ min 2 ( 1 χ ) ( Δ ˜ I L n ) ,
ϑ = 2 Λ ˜ ( 1 χ ) .
Theorem 2.
Based on Assumption 1 and the control strategy (18), the system (1) realizes FITS. The setting time of FITS is estimated as
T 2 = t 0 + V ˜ ( ϵ ( t 0 ) ) Γ ( α ˘ + 1 ) ϑ 1 α ˘ .
Proof. 
Let
V ˜ ( ϵ ( t ) ) = r = 1 L 𝚤 = 1 N ( ϵ 𝚤 ( r ) ( t ) ) H ϵ 𝚤 ( r ) ( t ) + r = 1 L 𝚤 = 1 N ( k ˜ 𝚤 ( r ) ( t ) δ ˜ 𝚤 ) 2 ε ˜ ,
wherein δ ˜ 𝚤 > 0 represents the adaptive constant. For ϵ ( t ) C L N n \ { 0 L N n } , the proof analogous to Theorem 1 can be obtained
E { D t α ˘ t 0 C V ˜ ( ϵ ( t ) ) } 2 L f ϵ H ( t ) ϵ ( t ) λ 1 ϵ H ( t ) ϵ ( t ) λ 2 ϵ H ( t ) ϵ ( t ) ϵ H ( t ) 2 ( 1 χ ) ( Δ ˜ I L n ) ϵ ( t ) 2 r = 1 L 𝚤 = 1 N η ˜ ( r ) | | ϵ 𝚤 ( r ) ( t ) | | 1 2 Λ ˜ ( 1 χ ) ( 2 L f λ 1 λ 2 λ 4 ) ϵ H ( t ) ϵ ( t ) 2 Λ ˜ ( 1 χ ) r = 1 L 𝚤 = 1 N η ˜ | | ϵ 𝚤 ( r ) ( t ) | | 1 .
where η ˜ = min r L { η ˜ ( r ) } > 0 . Take a suitable Δ ˜ > 0 such that 2 L f λ 1 λ 2 λ 4 < 0 , then it can be obtained from (20)
E { D t α ˘ t 0 C V ˜ ( ϵ ( t ) ) } ϑ .
T 2 = t 0 + V ˜ ( ϵ ( t 0 ) ) Γ ( α ˘ + 1 ) ϑ 1 α ˘ .
Then, V ˜ ( ϵ ( t ) ) = 0 for any t T 2 . Furthermore, ϵ ( t ) = 0 for t T 2 . By Definition 4, it can be concluded that the system (1) realizes FITS under the AQC strategy (18). □
Remark 6.
The quasi-synchronization and FITS of fractional-order BAM neural networks were studied by designing an AQC in [33]. Unlike the two different real-valued AQCs designed in [33], this paper only studied one complex-valued AQC. The value of H in the setting time T in [33] needs to be limited by the constants B and D in both controllers, while the value of ϑ in the setting time T 1 and T 2 in this paper are only related to the constant Λ in the AQC. This makes the conditions of this article more relaxed.
If Λ = 0 , Formula (18) can be simplified as
u ˜ 𝚤 ( r ) ( t ) = k ˜ 𝚤 ( r ) ( t ) q ( e 𝚤 ( r ) ( t ) ) η ˜ ( r ) sign ( q ( e 𝚤 ( r ) ( t ) ) ) .
Corollary 2.
Under Assumption 1 and the control strategy (23), the system (1) reaches asymptotic synchronization.
Remark 7.
The synchronization matter of fractional-order multiplex networks was investigated by designing an AQC strategy in [45]. Unlike the real-valued systems studied in [45], this paper focuses on complex-valued systems. In addition, this article defines a new complex-valued quantization function that has fine robustness and anti-interference properties.
Remark 8.
From the expression of the setting time, it can be counted that the order α is intimately related to the synchronization rate. Moreover, the setting time is also related to the initial value V ( ϵ ( t 0 ) ) and the quantization step. It is not difficult to observe that the setting time T 1 and T 2 , respectively, decrease with the increase of ξ and ϑ, indicating that the larger the ξ and ϑ, the shorter the setting time of synchronization. Therefore, we can obtain the impact of setting time on network synchronization.
Remark 9.
Unlike the common decomposition results in [46,47], in order to achieve FITS of the network (1), this paper introduces sign functions and quantization functions in complex-valued domain, and designs Lyapunov functions in complex-valued domain. The synchronization condition (8) obtained is simpler and easier to verify using the proposed non-separation method. Apparently, our proposed method has extensive applicability and is more apt to implement than previous separation methods.
Remark 10.
Unlike previous methods of separating complex-valued networks into two real-valued networks [48,49], this article is based on a new quadratic norm consisted of the real and imaginary parts of the complex number. Then, new definitions of complex-valued signum functions and quantization functions on the complex-valued domain were introduced. Additionally, a new control strategy in a complex domain was proposed, and a suitable Lyapunov function was designed to explore the FITS of FOCVMLNs. This makes the theoretical results obtained more superior.

4. Numerical Simulations

In the section, we will offer two simulation examples to validate the effectiveness of the our outcomes.
Regarding a FOCVMLN composing of 2 layers, each with 6 nodes, the dynamic behaviors of the controlled network are described below.
D t α ˘ t 0 C x ˘ 𝚤 ( r ) ( t ) = f ( x ˘ 𝚤 ( r ) ( t ) ) + c j = 1 6 a 𝚤 j ( r ) P ( x ˘ j ( r ) ( t ) x ˘ 𝚤 ( r ) ( t ) ) + d k = 1 2 b r k Q ( x ˘ 𝚤 ( k ) ( t ) x ˘ 𝚤 ( r ) ( t ) ) + u 𝚤 ( r ) ( t ) , 𝚤 { 1 , 2 , , 6 } , r { 1 , 2 }
wherein x ˘ 𝚤 ( r ) ( t ) = ( x ˘ 𝚤 1 ( r ) ( t ) , x ˘ 𝚤 2 ( r ) ( t ) , x ˘ 𝚤 3 ( r ) ( t ) ) T C 3 , u 𝚤 ( r ) ( t ) = ( u 𝚤 1 ( r ) ( t ) , u 𝚤 2 ( r ) ( t ) , u 𝚤 3 ( r ) ( t ) ) C 3 .
The dynamics of its isolated nodes are as follows
D t α ˘ t 0 C s ( r ) ( t ) = f ( s ( r ) ( t ) ) , r { 1 , 2 } ,
in which s ( r ) ( t ) = ( s 1 ( r ) ( t ) , s 2 ( r ) ( t ) , s 3 ( r ) ( t ) ) T C 3 , f ( s ( r ) ( t ) ) = W ( r ) z ( s ( r ) ( t ) ) = W ( r ) ( sin ( s 1 ( r ) ( t ) ) ,
sin ( s 2 ( r ) ( t ) ) , sin ( s 3 ( r ) ( t ) ) ) T , where sin ( s ( r ) ( t ) ) = sin ( Re ( s ( r ) ( t ) ) ) + i sin ( Im ( s ( r ) ( t ) ) ) ( = 1 , 2 , 3 ) ,
W ( 1 ) = 1.3 1.6 9.1 8.9 2.2 1.5 1.1 9.2 1.5 , W ( 2 ) = 1.3 1.5 9.2 8.9 2.5 1.7 1.2 9 1.2 .
In the thereafter simulation, the initial values of System (25) are offered as s 1 ( 1 ) ( 0 ) = 0.2 + 0.3 i , s 2 ( 1 ) ( 0 ) = 0.5 + 0.1 i , s 3 ( 1 ) ( 0 ) = 0.8 0.1 i , s 1 ( 2 ) ( 0 ) = 0.3 + 0.2 i , s 2 ( 2 ) ( 0 ) = 0.4 + 0.3 i , s 3 ( 3 ) ( 0 ) = 0.5 0.2 i .
When α = 0.85 , the image trajectories of the real and imaginary parts of the first and second layers of System (24) are shown in Figure 2 and Figure 3.
The inter-layer Laplacian matrix is
B = 0.15 + 0.2 i 0.15 0.2 i 0.25 0.1 i 0.25 + 0.1 i .
The topology structure of the model (24) is manifested in Figure 4. The intra-layer coupling matrix and inter-layer coupling matrix are as follows.
P = 0.2 + 0.2 i 0 0 0 0.2 + 0.1 i 0 0 0 0.5 + 0.25 i ,
Q = 0.2 + 0.15 i 0 0 0 0.3 + 0.3 i 0 0 0 0.2 + 0.2 i .
The coupling coefficients of intra-layer and inter-layer are, respectively, c = 1.8 + 0.1 i and d = 0.1 0.1 i .
Example 1.
FITS with cyber attack.
Choosing quantification density ϱ = 0.7 , Λ = 25 , ε = 100 , η ( 1 ) = 6.2 , η ( 2 ) = 5.5 , L f = 12 , Δ = diag ( 30 , 30 , 30 , 30 , 30 , 30 ) . The attack function is selected as H = 1.3 tanh ( x ) , H 1 = 1.3 and ϖ = 0.5 . The initial values of adaptive control gain k 𝚤 ( r ) ( t ) for the first and second layers are k 𝚤 ( 1 ) ( t ) = 0.6 γ and k 𝚤 ( 2 ) ( t ) = 0.3 γ ( γ = 1 , 2 , , 6 ) , respectively. Through calculations, η = 5.5 . Thus, we can conclude that conditions (8) is valid. In the light of Theorem 1, the system (24) is FITS within settling time T 1 = 8.0586 under the control protocol (4).
The first and second evolution of FITS error ϵ 𝚤 ( r ) ( t ) under the control strategy (4) are, respectively, shown in Figure 5 and Figure 6.
Figure 7 and Figure 8 separately depict the trajectory evolution of k 𝚤 ( r ) ( t ) , and the switching of deception attack signals under ϖ ( t ) .
Example 2.
FITS without cyber attack.
Choosing quantification density ϱ = 0.7 , Λ ˜ = 12 , ε ˜ = 35 , η ˜ ( 1 ) = 3.2 , η ˜ ( 2 ) = 2.5 , Δ = diag ( 16 , 16 , 16 , 16 , 16 , 16 ) , L f = 12 . The initial values of adaptive control gain k ˜ 𝚤 ( r ) ( t ) for the first and second layers are k ˜ 𝚤 ( 1 ) ( t ) = 0.9 γ and k ˜ 𝚤 ( 2 ) ( t ) = 0.8 γ ( γ = 1 , 2 , , 6 ) , respectively. Through calculations, the system (24) is FITS within settling time T 2 = 6.5343 under the control protocol (18).
The first and second evolution of FITS error ϵ 𝚤 ( r ) ( t ) under the control protocol (18) are shown in Figure 9 and Figure 10, respectively. Figure 11 describes the trajectory evolution of the adaptive control gain function k ˜ 𝚤 ( r ) ( t ) .
Remark 11.
Enlightened by [50], it was concluded from (7) that when q ˘ ( μ ) = ι , 1 1 + χ ι < μ 1 1 χ ι . Since the function q ˘ ( · ) is an arbitrary real number, to guarantee that R is the disjoint union of whole intervals, like ( 1 1 + χ ι , 1 1 χ ι ] , this needs 1 1 χ ι + 1 = 1 1 + χ ι . Due to ι = ϱ ι 0 , it can be inferred that ϱ = 1 χ 1 + χ , i.e., χ = 1 ϱ 1 + ϱ . Combined with ϱ = 0.7 ( 0 , 1 ) , we can obtain χ = 0.176 ( 0 , 1 ) .
Remark 12.
In the numerical simulation section, we chose an MLN composing of 2 layers of networks with 6 nodes in every layer as the research object. The topology structure is shown in Figure 4. Example 1 considers FITS of FOCVMLNs under DPAs. The attack probability ϖ = 0.5 , and the attack function was selected as H = 1.3 tanh ( x ) . Under the control protocol (4), the system (3) achieves FITS with a synchronization setting time of T 1 = 8.0586 . The evolution of synchronization error is revealed in Figure 4 and Figure 5. Example 2 studied the FITS of FOCVMLNs without cyber-attacks and obtained that system (3) achieved FITS under control protocol (18), with a synchronization setting time of T 2 = 6.5343 . The evolution of synchronization error is revealed in Figure 9 and Figure 10. The data obtained shows that cyber-attacks can slow down the speed of network synchronization.

5. Conclusions

This article discussed the FITS issue of FOCVMLNs under stochastic DPAs. Firstly, two AQC strategies were designed to study the scenarios with or without stochastic DPAs. Then, based on graph theory and the Lyapunov method, sufficient criteria for FITS of FOCVMLNs with or without stochastic DPAs were obtained. Eventually, numerical simulations validated the practicability of the theoretical results.
As is known to all, discontinuous control plays a crucial role as an efficient control method. Event-triggered control can tremendously reduce resource consumption. The impulsive moment is decided by the event-trigger mechanism (ETM), which significantly reduces control costs compared to the impulsive moment triggered by time. Hybrid event-triggered and impulsive control integrates the merits of event-triggered control and impulsive control. In addition, there often exists a time-delay in the transmission and processing speed of information between nodes. Malicious attackers often exploit input latency to affect system performance. Considering these interesting issues, we will explore the synchronization of fractional-order MLN networks with time-delay under hybrid event-triggered impulsive control in future jobs.

Author Contributions

Methodology, C.H.; software, K.X.; validation, J.Y.; formal analysis, L.X.; writing—original draft preparation, L.X.; writing—review and editing, J.Y.; visualization, T.S.; supervision, J.Y. and C.H.; funding acquisition, J.Y. and C.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported jointly by the National Natural Science Foundation of China (62263029), by the Key Project of Natural Science Foundation of Xinjiang Uygur Autonomous Region (2024D01D04, 2021D01D10), by Tianshan Talent Program (2022TSYCCX0013) and Intelligent Control and Optimization Research Platform in Xinjiang University.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Tran, T.H.; Nguyen, T.B.; Le, H.S.; Phung, D.C. Formulation and solution technique for agricultural waste collection and transport network design. Eur. J. Oper. Res. 2024, 313, 1152–1169. [Google Scholar] [CrossRef]
  2. Wang, S.L.; Guo, Z.Y.; Huang, X.D.; Zhang, J.H. A three-stage model of quantifying and analyzing power network resilience based on network theory. Reliab. Eng. Syst. Saf. 2024, 241, 109681. [Google Scholar] [CrossRef]
  3. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef]
  4. Sun, Y.P.; Jia, R.Y.; Razzaq, A.; Bao, Q. Social network platforms and climate change in China: Evidence from TikTok. Technol. Forecast. Soc. Change 2024, 200, 123197. [Google Scholar] [CrossRef]
  5. Elfarhani, M.; Jarraya, A.; Abid, S.; Haddar, M. Fractional derivative and hereditary combined model for memory effects on flexible polyurethane foam. Mech.-Time-Depend. Mater. 2016, 20, 197–217. [Google Scholar] [CrossRef]
  6. Podlubny, I. Fractional Differential Equations: An Introduction to Fractional Derivatives, Fractional Differential Equations, to Methods of Their Solution and Some of Their Applications; Elsevier: Berkeley, CA, USA, 1998. [Google Scholar]
  7. Hilfer, R. Applications of Fractional Calculus in Physics; Word Scientific Press: Singapore, 2000. [Google Scholar]
  8. Kilbas, A.A.; Srivastava, H.M.; Trujillo, J.J. Theory and Applications of Fractional Differential Equations; Elsevier: Amsterdam, The Netherlands, 2006. [Google Scholar]
  9. Gibbon, J.D.; McGuinness, M.J. The real and complex Lorenz equations in rotating fluids and lasers. Phys. D Nonlinear Phenomena 1982, 5, 108–122. [Google Scholar] [CrossRef]
  10. Rauh, A.; Hannibal, L.; Abraham, N.B. Global stability properties of the complex Lorenz model. Phys. D Nonlinear Phenomena 1996, 99, 45–58. [Google Scholar] [CrossRef]
  11. Tripathi, B.K.; Kalra, P.K. On efficient learning machine with root-power mean neuron in complex domain. IEEE Trans. Neural Netw. 2011, 22, 727–738. [Google Scholar] [CrossRef]
  12. Adali, T.; Schreier, P.J.; Scharf, L.L. Complex-valued signal processing: The proper way to deal with impropriety. IEEE Trans. Signal Process. 2011, 59, 5101–5125. [Google Scholar] [CrossRef]
  13. Wu, K.; Tang, M.; Liu, Z.H.; Ren, H.; Zhao, L. Pinning synchronization of multiple fractional-order fuzzy complex-valued delayed spatiotemporal neural networks. Chaos Solitons Fractals 2024, 182, 114801. [Google Scholar] [CrossRef]
  14. Ren, Y.; Jiang, H.J.; Hu, C.; Qin, X.J. Discontinuous control for exponential synchronization of complex-valued stochastic multi-layer networks. Chaos Solitons Fractals 2023, 174, 113792. [Google Scholar] [CrossRef]
  15. Li, S.; Ren, X.N.; Li, W.X. Inter-layer noise-based topology of complex-valued multi-layer networks: Almost sure stability via time-varying hybrid intermittent pinning control. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1477–1492. [Google Scholar] [CrossRef]
  16. He, X.Y.; Li, L.S.; Mo, Y.F.; Huang, J.X.; Qin, S.J. A distributed route network planning method with congestion pricing for drone delivery services in cities. Transp. Res. Part C Emerg. Technol. 2024, 160, 104536. [Google Scholar] [CrossRef]
  17. Li, C.D.; Liao, X.F.; Wong, K.W. Lag synchronization of hyperchaos with application to secure communications. Chaos Solitons Fractals 2005, 23, 183–193. [Google Scholar] [CrossRef]
  18. Tang, L.K.; Wu, X.Q.; Lv, J.H.; Lu, J.A.; D’Souza, R.M. Master stability functions for complete, intralayer, and interlayer synchronization in multiplex networks of coupled Rössler oscillators. Phys. Rev. E 2019, 99, 012304. [Google Scholar] [CrossRef]
  19. Li, Z.W.; Tang, L.K.; Zhuang, J.S. Bounded intra-layer synchronization of multilayer heterogeneous networks without external controllers. Nonlinear Dyn. 2024, 112, 14497–14512. [Google Scholar] [CrossRef]
  20. Shi, J.Y.; Zhou, P.P.; Cai, S.M. On fixed-time interlayer synchronization of two-layer multiweighted complex dynamic networks: An economic and practical non-chattering adaptive control approach. Chaos Solitons Fractals 2024, 182, 114835. [Google Scholar] [CrossRef]
  21. Yin, Y.W.; Yu, J.; Hu, C.; Shi, T.T. Pinning synchronization of fractional-order two-layer networks: From inter-layer synchronization to cluster synchronization. In Proceedings of the International Conference on Neuromorphic Computing (ICNC2023), Wuhan, China, 15–17 December 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 297–302. [Google Scholar]
  22. Sun, J.W.; Wu, Y.Y.; Cui, G.Z.; Wang, Y.F. Finite-time real combination synchronization of three complex-variable chaotic systems with unknown parameters via sliding mode control. Nonlinear Dyn. 2017, 88, 1677–1690. [Google Scholar] [CrossRef]
  23. Du, F.F.; Lu, J.G.; Zhang, Q.H. Delay-dependent finite-time synchronization criterion of fractional-order delayed complex networks. Commun. Nonlinear Sci. Numer. Simul. 2023, 119, 107072. [Google Scholar] [CrossRef]
  24. Zhang, H.W.; Cheng, R.; Ding, D.W. Finite-time synchronization of uncertain fractional-order multi-weighted complex networks with external disturbances via adaptive quantized control. Chin. Phys. B 2022, 31, 100504. [Google Scholar] [CrossRef]
  25. Zheng, B.B.; Hu, C.; Yu, J.; Jiang, H.J. Finite-time synchronization of fully complex-valued neural networks with fractional-order. Neurocomputing 2020, 373, 70–80. [Google Scholar] [CrossRef]
  26. Hou, T.Q.; Yu, J.; Hu, C.; Jiang, H.J. Finite-time synchronization of fractional-order complex-variable dynamic networks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 51, 4297–4307. [Google Scholar] [CrossRef]
  27. Fan, H.G.; Chen, X.J.; Shi, K.B.; Liang, Y.H.; Wang, Y.; Wen, H. Mittag-Leffler synchronization in finite time for uncertain fractional-order multi-delayed memristive neural networks with time-varying perturbations via information feedback. Fractal Fract. 2024, 8, 422. [Google Scholar] [CrossRef]
  28. Wu, E.; Wang, Y.; Li, Y.D.; Li, K.L.; Luo, F. Fixed-time synchronization of complex-valued coupled networks with hybrid perturbations via quantized control. Mathematics 2023, 11, 3845. [Google Scholar] [CrossRef]
  29. Pan, C.N.; Bao, H.B. Exponential synchronization of complex-valued memristor-based delayed neural networks via quantized intermittent control. Neurocomputing 2020, 404, 317–328. [Google Scholar] [CrossRef]
  30. Xu, Y.; Li, Y.Z.; Li, W.X. Adaptive finite-time synchronization control for fractional-order complex-valued dynamical networks with multiple weights. Commun. Nonlinear Sci. Numer. Simul. 2020, 85, 105239. [Google Scholar] [CrossRef]
  31. Xiang, K.Q.; Kang, Q.K.; Chang, H.; Yang, J. Adaptive control for finite-time cluster synchronization of fractional-order fully complex-valued dynamical networks. Fractal Fract. 2023, 7, 645. [Google Scholar] [CrossRef]
  32. Chen, S.L.; Luo, X.P.; Yang, J.K.; Li, Z.M.; Li, H.L. Adaptive synchronization of fractional-order uncertain complex-valued competitive neural networks under the non-decomposition method. Fractal Fract. 2024, 8, 449. [Google Scholar] [CrossRef]
  33. Yang, J.P.; Li, H.L.; Zhang, L.; Hu, C.; Jiang, H.J. Quasi-projective and finite-time synchronization of delayed fractional-order BAM neural networks via quantized control. Math. Methods Appl. Sci. 2023, 46, 197–214. [Google Scholar] [CrossRef]
  34. Bai, J.; Wu, H.Q.; Cao, J.D. Secure synchronization and identification for fractional complex networks with multiple weight couplings under DoS attacks. Comput. Appl. Math. 2022, 41, 187. [Google Scholar] [CrossRef]
  35. Lu, Y.; Wu, X.R.; Wang, Y.N.; Huang, L.H.; Wei, Q.J. Quantization-based event-triggered H consensus for discrete-time Markov Jump fractional-order multiagent systems with DoS Attacks. Fractal Fract. 2024, 8, 147. [Google Scholar] [CrossRef]
  36. Sakthivel, R.; Kwon, O.M.; Park, M.J.; Sakthivel, R. Event-triggered synchronization control for fractional-order IT2 fuzzy multi-weighted complex dynamical networks with deception attacks. Commun. Nonlinear Sci. Numer. Simul. 2024, 136, 108091. [Google Scholar] [CrossRef]
  37. Liu, X.; Chen, L.L.; Zhao, Y.F.; Li, H.L. Event-triggered hybrid impulsive control for synchronization of fractional-order multilayer signed networks under cyber attacks. Neural Netw. 2024, 172, 106124. [Google Scholar] [CrossRef]
  38. Podlubny, I. Fractional Differential Equations; Academic Press: New York, NY, USA, 1999. [Google Scholar]
  39. Yang, S.; Yu, J.; Hu, C.; Jiang, H.J. Quasi-projective synchronization of fractional-order complex-valued recurrent neural networks. Neural Netw. 2018, 104, 104–113. [Google Scholar] [CrossRef]
  40. Ji, G.J.; Hu, C.; Yu, J.; Jiang, H.J. Finite-time and fixed-time synchronization of discontinuous complex networks: A unified control framework design. J. Frankl. Inst. 2018, 355, 4665–4685. [Google Scholar] [CrossRef]
  41. Xu, C.; Yang, X.S.; Lu, J.Q.; Feng, J.W.; Alsaadi, F.E.; Hayat, T. Finite-time synchronization of networks via quantized intermittent pinning control. IEEE Trans. Cybern. 2017, 48, 3021–3027. [Google Scholar] [CrossRef]
  42. He, J.J.; Chen, H.; Ge, M.F.; Ding, T.F.; Wang, L.M.; Liang, C.D. Adaptive finite-time quantized synchronization of complex dynamical networks with quantized time-varying delayed couplings. Neurocomputing 2021, 431, 90–99. [Google Scholar] [CrossRef]
  43. Tan, F.; Zhou, L.L.; Lu, J.W.; Quan, H.Z.; Liu, K.Y. Adaptive quantitative control for finite time synchronization among multiplex switched nonlinear coupling complex networks. Eur. J. Control 2023, 70, 100764. [Google Scholar] [CrossRef]
  44. Tan, F.; Xu, S.Y.; Li, Y.M.; Chu, Y.M.; Zhang, Z.Q. Adaptive quantitative control for robust H synchronization between multiplex neural networks under stochastic cyber attacks. Neurocomputing 2022, 493, 129–142. [Google Scholar] [CrossRef]
  45. Bai, Y.Z.; Yu, J.; Hu, C. Adaptive quantized synchronization of fractional-order output-coupling multiplex networks. Fractal Fract. 2022, 7, 22. [Google Scholar] [CrossRef]
  46. Song, X.N.; Man, J.T.; Song, S.; Zhang, Y.J.; Ning, Z.K. Finite/fixed-time synchronization for Markovian complex-valued memristive neural networks with reaction-diffusion terms and its application. Neurocomputing 2020, 414, 131–142. [Google Scholar] [CrossRef]
  47. Zhang, Y.L.; Deng, S.F. Fixed-time synchronization of complex-valued memristor-based neural networks with impulsive effects. Neural Process. Lett. 2020, 52, 1263–1290. [Google Scholar] [CrossRef]
  48. Ding, D.W.; Yan, J.; Wang, N.; Liang, D. Adaptive synchronization of fractional order complex-variable dynamical networks via pinning control. Commun. Theor. Phys. 2017, 68, 366. [Google Scholar] [CrossRef]
  49. Xu, Q.; Xu, X.H.; Zhuang, S.X.; Xiao, J.X.; Song, C.H.; Che, C. New complex projective synchronization strategies for drive-response networks with fractional complex-variable dynamics. Appl. Math. Comput. 2018, 338, 552–566. [Google Scholar] [CrossRef]
  50. Shi, J.Y.; Zhou, P.P.; Jia, Q.; Cai, S.M. Fixed-time synchronization of multilayered complex dynamic networks via quantized variable-gain saturated control. Inf. Sci. 2024, 681, 121206. [Google Scholar] [CrossRef]
Figure 1. AQC loop under DPAs.
Figure 1. AQC loop under DPAs.
Fractalfract 09 00047 g001
Figure 2. The image trajectory of s ( 1 ) ( t ) .
Figure 2. The image trajectory of s ( 1 ) ( t ) .
Fractalfract 09 00047 g002
Figure 3. The image trajectory of s ( 2 ) ( t ) .
Figure 3. The image trajectory of s ( 2 ) ( t ) .
Fractalfract 09 00047 g003
Figure 4. Topology of system (24).
Figure 4. Topology of system (24).
Fractalfract 09 00047 g004
Figure 5. FITS error ϵ 𝚤 ( 1 ) ( t ) under AQC (4).
Figure 5. FITS error ϵ 𝚤 ( 1 ) ( t ) under AQC (4).
Fractalfract 09 00047 g005
Figure 6. FITS error ϵ 𝚤 ( 2 ) ( t ) under AQC (4).
Figure 6. FITS error ϵ 𝚤 ( 2 ) ( t ) under AQC (4).
Fractalfract 09 00047 g006
Figure 7. The trajectory evolution of gains k 𝚤 ( r ) ( t ) under AQC (4).
Figure 7. The trajectory evolution of gains k 𝚤 ( r ) ( t ) under AQC (4).
Fractalfract 09 00047 g007
Figure 8. The attack random switch signal.
Figure 8. The attack random switch signal.
Fractalfract 09 00047 g008
Figure 9. FITS error ϵ 𝚤 ( 1 ) ( t ) under AQC (18).
Figure 9. FITS error ϵ 𝚤 ( 1 ) ( t ) under AQC (18).
Fractalfract 09 00047 g009
Figure 10. FITS error ϵ 𝚤 ( 2 ) ( t ) under AQC (18).
Figure 10. FITS error ϵ 𝚤 ( 2 ) ( t ) under AQC (18).
Fractalfract 09 00047 g010
Figure 11. The trajectory evolution of function k ˜ 𝚤 ( r ) ( t ) under AQC (18).
Figure 11. The trajectory evolution of function k ˜ 𝚤 ( r ) ( t ) under AQC (18).
Fractalfract 09 00047 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, L.; Yu, J.; Hu, C.; Xiong, K.; Shi, T. Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks. Fractal Fract. 2025, 9, 47. https://doi.org/10.3390/fractalfract9010047

AMA Style

Xu L, Yu J, Hu C, Xiong K, Shi T. Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks. Fractal and Fractional. 2025; 9(1):47. https://doi.org/10.3390/fractalfract9010047

Chicago/Turabian Style

Xu, Lulu, Juan Yu, Cheng Hu, Kailong Xiong, and Tingting Shi. 2025. "Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks" Fractal and Fractional 9, no. 1: 47. https://doi.org/10.3390/fractalfract9010047

APA Style

Xu, L., Yu, J., Hu, C., Xiong, K., & Shi, T. (2025). Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks. Fractal and Fractional, 9(1), 47. https://doi.org/10.3390/fractalfract9010047

Article Metrics

Back to TopTop