首页期刊导航|中国科学:信息科学(英文版)
期刊信息/Journal information
中国科学:信息科学(英文版)
中国科学:信息科学(英文版)

周光召

月刊

1674-733X

informatics@scichina.org

010-64015683

100717

北京东黄城根北街16号

中国科学:信息科学(英文版)/Journal Science China Information SciencesCSCDCSTPCDEISCI
查看更多>>《中国科学》是中国科学院主办、中国科学杂志社出版的自然科学专业性学术刊物。《中国科学》任务是反映中国自然科学各学科中的最新科研成果,以促进国内外的学术交流。《中国科学》以论文形式报道中国基础研究和应用研究方面具有创造性的、高水平的和有重要意义的科研成果。在国际学术界,《中国科学》作为代表中国最高水平的学术刊物也受到高度重视。国际上最具有权威的检索刊物SCI,多年来一直收录《中国科学》的论文。1999年《中国科学》夺得国家期刊奖的第一名。
正式出版
收录年代

    Anti-asynchrony output regulation for switched systems under switching-Q-learning event-triggering against DoS attacks

    Lili LIYalin CHENDan MAQingjun GUO...
    190-206页
    查看更多>>摘要:This paper proposes a secure output regulation(SOR)scheme for network switched systems(NSSs)experiencing severely unstable dynamics(SUDs).This scheme aims to address the complex con-secutive asynchrony caused by long-duration denial-of-service(LDDoS)attacks.When the denial-of-service(DoS)attack lasts longer than the dwell time of each subsystem,switching to a new subsystem is necessary to manage the unstable dynamic behavior caused by SUDs.The controller cannot immediately obtain infor-mation about the new modality.However,owing to the delayed access to new modality information by the controller,consecutive asynchrony occurs.To tackle this,we propose a resilient switching rule that mitigates the impact of consecutive asynchrony by choosing the optimal subsystem once the minimum dwell time is met.Multi-stage event-triggering mechanisms(METMs)are proposed to coordinate with switching signals by incorporating modality matching conditions and a switching-Q-learning algorithm.These mechanisms reduce asynchronous durations by aligning modality matching conditions and terminating attacks using at-tack parameters.This control scheme for SOR of NSSs with SUDs disturbed by LDDoS attacks provides a detailed analysis of dynamic switching behavior,leveraging the resilient switching rule and METMs.Finally,the feasibility of the proposed methodology is substantiated through simulations with an F-18 aircraft model.

    Multi-step state-based opacity for unambiguous weighted machines

    Zhipeng ZHANGChengyi XIAGuoyuan QIJun FU...
    207-217页
    查看更多>>摘要:Opacity is a central concept in the issue of privacy security and has been studied extensively in fields such as finite automata,probabilistic automata,and stochastic automata.Here,we investigate the problem of validating multi-step opaque properties through unambiguous weighted machines from the perspective of cyber-physical systems.First,the notion of multi-step state-based opacity for unambiguous weighted machines is presented and defined.It includes two variants of delays with a finite K and infinite steps.Subsequently,the weighted state estimate with K(infinite)-step delay is established by abstracting the possible state set that the system could have through these weighted observations.Meanwhile,to keep the observable weighted sequence consistent between the bidirectional observers,the unobserved weights of the reverse weighted machine are assumed to be reserved.Subsequently,the existence conditions are developed,and the corresponding algorithms,termed the weighted bidirectional observer,are generalized to verify these properties.Finally,several numerical examples are illustrated to demonstrate the effectiveness of the proposed method.Taken together,the current approach will be conducive to a deep understanding of the security and privacy of cyber-physical systems.

    Interval analysis for neural networks with application to fault detection

    Zhenhua WANGYoudao MASong ZHUThach Ngoc DINH...
    218-233页
    查看更多>>摘要:This paper investigates an interval analysis method for neural networks and applies it to fault detection for systems with unknown but bounded measurement noise.First,a novel interval analysis method is presented,which can compute the bounds of the output of a feedforward neural network subject to a bounded input.By applying the proposed interval analysis method to a network trained with fault-free system data,adaptive thresholds for fault detection are computed.Finally,one can acquire fault detection results via a fault detection strategy.The proposed method can achieve tight bounds of the network output and employ simple operations,which leads to accurate fault detection results and a low computational burden.A numerical simulation and an experiment on an AC servo motor are given to illustrate the effectiveness and superiority of the proposed method.

    Finite-time PID control for nonlinear nonaffine systems

    Zhiqing LIURonghu CHIBiao HUANGZhongsheng HOU...
    234-247页
    查看更多>>摘要:This article proposes a finite-time proportional-integral-derivative(FT-PID)control method to fast stabilize the control system to achieve the desired performance within the predesignated time instants.For a considered nonaffined nonlinear system,we develop a new dynamic linearization approach to re-formulate the system model as a linear data model(LDM)whose arguments are consistent with that used in the PID control law.Then,a projection algorithm is presented to estimate the unknown pseudo gradient vector of the LDM.Subsequently,an adaptive tuning algorithm is designed to update the three PID param-eters by solving linear matrix inequalities in terms of the predesignated error precision and the finite-time instant.The finite-time convergence of the proposed FT-PID control system is shown mathematically,which guarantees a pre-specified error precision to be achieved within the predesignated finite-time instants.As a result,not only can the proposed FT-PID control save the control cost but it also improves the production efficiency.The simulation study verifies the results.

    Robust tube-based MPC with smooth computation for dexterous robot manipulation

    Yu LUOTianying JIFuchun SUNQie SIMA...
    248-264页
    查看更多>>摘要:Dexterous robot manipulation has shone in complex industrial scenarios,where multiple manip-ulators,or fingers,cooperate to grasp and manipulate objects.When encountering multi-objective optimiza-tion with system constraints in such scenarios,model predictive control(MPC)has demonstrated exceptional performance in complex multi-robot manipulation tasks involving multi-objective optimization with system constraints.However,in such scenarios,the substantial computational load required to solve the optimal control problem(OCP)at each triggering instant can lead to significant delays between state sampling and control application,hindering real-time performance.To address these challenges,this paper introduces a novel robust tube-based smooth MPC approach for two fundamental manipulation tasks:reaching a given target and tracking a reference trajectory.By predicting the successor state as the initial condition for immi-nent OCP solving,we can solve the forthcoming OCP ahead of time,alleviating delay effects.Additionally,we establish an upper bound for linearizing the original nonlinear system,reducing OCP complexity and enhancing response speed.Grounded in tube-based MPC theory,the recursive feasibility and closed-loop stability amidst constraints and disturbances are ensured.Empirical validation is provided through two nu-merical simulations and two real-world dexterous robot manipulation tasks,which shows that the seamless control input by our methods can effectively enhance the solving efficiency and control performance when compared to conventional time-triggered MPC strategies.

    All-day perception for intelligent vehicles:switching perception algorithms based on WBCNet

    Hongbin XIEHaiyan ZHAOChengcheng XUHong CHEN...
    265-280页
    查看更多>>摘要:A weather-and brightness-based classification network(WBCNet)is proposed for driving scene classification to address the decreased accuracy in perception caused by weather and environment changes.To facilitate its applicability in vehicles and minimize computational demands on vehicle chips,WBCNet has been designed with special modules,including attention mechanisms and dilated convolutions.Dilated convolutions combined with residual connections empower WBCNet to concurrently handle information at various scales.This aids in simplifying the training and optimization of deep networks,consequently en-hancing the model's performance and mitigating the risk of overfitting.The outstanding feature association capability originating from the fusion of channel attention and spatial attention enables WBCNet to focus more on the sky,lanes,and other traffic information features within the image.This design enables WBCNet to use only images as input,making it highly suitable for engineering applications.The output of WBCNet provides the basis for the downstream perception model selection algorithm,allowing it to choose the ap-propriate perception model for different scenes accurately.A dataset with complex scenes based on Carla is constructed for comparison to verify WBCNet's performance.Finally,a real-world driving dataset is used to validate the effectiveness and real-time performance of WBCNet.

    A zero-sum hybrid stochastic differential game with impulse controls

    Siyu LVZhen WUJie XIONG
    281-295页
    查看更多>>摘要:In this paper,we study a zero-sum stochastic differential game with the following salient features:(ⅰ)the system state is dictated by a hybrid diffusion,(ⅱ)both players use impulse controls,and(ⅲ)the game takes place on an infinite time horizon.First,the dynamic programming principle for the problem is proven.Then,the lower and upper value functions of the game are characterized as the unique viscosity solution of the associated Hamilton-Jacobi-Bellman-Isaacs(HJBI)equation,which turns out to be a coupled system of variational inequalities with bilateral obstacles.Moreover,a verification theorem as a sufficient condition to identify a Nash equilibrium is established.The Nash equilibrium strategies for the two players,indicating when and how it is optimal to intervene,are given in terms of the obstacle part of the HJBI equation.

    W-band CMOS beamforming ICs and integrated phased-array antennas with 20+Gb/s data rates

    Dixian ZHAOPeigen YUShan JIANGWeihan GAO...
    296-312页
    查看更多>>摘要:This article presents the design and implementation of W-band transmitter(TX)and receiver(RX)phased-array antennas,which leverage CMOS and printed circuit board(PCB)technologies to integrate the phased-array antennas with eight-channel beamforming ICs.The beamforming IC applies the variable gain amplifier(VGA)with fractional bits and the vector-modulated variable gain phase shifter(VGPS)for wide range and high precision of gain and phase shifting,providing moderate power gain.The phased-array board consists of 384 TX and 384 RX antenna elements,along with 48 TX and 48 RX beamforming ICs.It also incorporates Wilkinson power dividers/combiners,a power management system,and a beamforming control module,all integrated into a cost-effective multi-layer PCB.Fabricated in 65-nm bulk CMOS,the IC achieves 3° RMS phase error for phase shifting and 0.5 dB RMS gain error for gain shifting,ensuring high precision of antenna pointing.The over-the-air(OTA)measurement of the proposed W-band phased-array antennas achieves a 64-QAM constellation with a symbol rate of 3.5 GS/s,resulting in raw data rates of 21 Gb/s.

    A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM

    Kexin QIAOZhaoyang WANGHeng CHANGSiwei SUN...
    313-330页
    查看更多>>摘要:The implementation security of post-quantum cryptography(PQC)algorithms has emerged as a critical concern with the PQC standardization process reaching its end.In a side-channel-assisted chosen-ciphertext attack,the attacker builds linear inequalities on secret key components and uses the belief propagation(BP)algorithm to solve.The number of inequalities leverages the query complexity of the attack,so the fewer the better.In this paper,we use the PQC standard algorithm CRYSTALS-KYBER as a study case to construct bilateral inequalities on key variables with substantially narrower intervals using a side-channel-assisted oracle.For KYBER512,KYBER768,and KYBER1024,the average Shannon entropy carried by such inequality is improved from the previous 0.6094,0.4734,and 0.8544 to 0.6418,0.4777,and 1.2007.The number of such inequalities required to recover the key utilizing the BP algorithm for KYBER512 and KYBER1024 is reduced by 5.32%and 40.53%in theory and experimentally the reduction is even better.The query complexity is reduced by 43%,37%,and 48%for KYBER512,768,and 1024 assuming reasonably perfect reliability.Furthermore,we introduce a strategy aimed at further refining the interval of inequalities.Diving into the BP algorithm,we discover a measure metric named JSD(Jensen-Shannon distance)-metric that can gauge the tightness of an inequality.We then develop a machine learning-based strategy to utilize the JSD-metrics to contract boundaries of inequalities even with fewer inequalities given,thus improving the entropy carried by the system of linear inequalities.This contraction strategy is at the algorithmic level and has the potential to be employed in all attacks endeavoring to establish a system of inequalities concerning key variables.

    Securing STAR-FC-RIS empowered integrated sensing and multiuser communications against target eavesdropping

    Shuying LINYulong ZOUFu XIAOBin LI...
    331-342页
    查看更多>>摘要:This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfig-urable intelligent surface(STAR-FC-RIS)empowered integrated sensing and multiuser communications(ISAMC)network,where a dual-functional radar-communication base station detects a malicious radar tar-get nearby and communicates with multiple legitimate users on the other side of the STAR-RIS.We utilize an integrated architecture that combines the fully-connected(FC)-RIS,an emerging type of beyond-diagonal(BD)-RIS,with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR)schemes to strike a balance between sensing and communications performance.There-after,observing the security-reliability performance tradeoff of the downlink ISAMC,we conduct closed-form analyses to compare COPs of round-robin scheduling(RS)and multiuser scheduling(MS)with the aid of a TS-based STAR-FC-RIS.Furthermore,we derive closed-form expressions of the sensing outage probabil-ity,communications outage probability(COP),and communications intercept probability,where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA)of the STAR-FC-RIS.Numerical results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security.Moreover,an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.