{"id":"https://openalex.org/W7123368017","doi":"https://doi.org/10.1109/access.2026.3652544","title":"Security Analysis of Cluster Synchronization for Boolean Control Networks Under Deception Attacks","display_name":"Security Analysis of Cluster Synchronization for Boolean Control Networks Under Deception Attacks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123368017","doi":"https://doi.org/10.1109/access.2026.3652544"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3652544","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652544","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3652544","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102441668","display_name":"Yanbo Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108245","display_name":"Police Department","ror":"https://ror.org/01pd36221","country_code":"LT","type":"government","lineage":["https://openalex.org/I4210108245","https://openalex.org/I4210150337"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Yanbo Sun","raw_affiliation_strings":["Information Center, Chongqing Police College, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Information Center, Chongqing Police College, Chongqing, China","institution_ids":["https://openalex.org/I4210108245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025153862","display_name":"Chi Huang","orcid":"https://orcid.org/0000-0001-8927-4072"},"institutions":[{"id":"https://openalex.org/I204831749","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822","country_code":"CN","type":"education","lineage":["https://openalex.org/I204831749"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Huang","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu, China","institution_ids":["https://openalex.org/I204831749"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102441668"],"corresponding_institution_ids":["https://openalex.org/I4210108245"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09261501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"7079","last_page":"7088"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.5931000113487244,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.5931000113487244,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10621","display_name":"Gene Regulatory Network Analysis","score":0.20309999585151672,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.032600000500679016,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.7027999758720398},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.551800012588501},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.4970000088214874},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.492000013589859},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4196999967098236},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.40779998898506165},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4025999903678894},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.37610000371932983}],"concepts":[{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.7027999758720398},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7006000280380249},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.551800012588501},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.4970000088214874},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.492000013589859},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4196999967098236},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.40779998898506165},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4056999981403351},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.37610000371932983},{"id":"https://openalex.org/C167964875","wikidata":"https://www.wikidata.org/wiki/Q17011487","display_name":"Exponential stability","level":3,"score":0.35249999165534973},{"id":"https://openalex.org/C134444547","wikidata":"https://www.wikidata.org/wiki/Q585230","display_name":"Boolean network","level":3,"score":0.34380000829696655},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.31630000472068787},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2745000123977661},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2703999876976013},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.2630000114440918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3652544","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652544","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3652544","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652544","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6394854784011841,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4567286984","display_name":null,"funder_award_id":"2024NSFSC0527","funder_id":"https://openalex.org/F4320336756","funder_display_name":"Tianjin Science and Technology Program"},{"id":"https://openalex.org/G8588520804","display_name":null,"funder_award_id":"2024ZYD0183","funder_id":"https://openalex.org/F4320336756","funder_display_name":"Tianjin Science and Technology Program"}],"funders":[{"id":"https://openalex.org/F4320336756","display_name":"Tianjin Science and Technology Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1966538276","https://openalex.org/W1971224531","https://openalex.org/W1972951991","https://openalex.org/W2024273375","https://openalex.org/W2025037494","https://openalex.org/W2030393377","https://openalex.org/W2065016221","https://openalex.org/W2073775042","https://openalex.org/W2088270301","https://openalex.org/W2114518254","https://openalex.org/W2184384388","https://openalex.org/W2341009958","https://openalex.org/W2435595704","https://openalex.org/W2486512961","https://openalex.org/W2579603034","https://openalex.org/W2726043678","https://openalex.org/W2733375039","https://openalex.org/W2775236842","https://openalex.org/W2795505133","https://openalex.org/W2801370262","https://openalex.org/W2906920831","https://openalex.org/W2918518675","https://openalex.org/W2918584976","https://openalex.org/W2964305055","https://openalex.org/W2996657988","https://openalex.org/W3013443218","https://openalex.org/W3159128651","https://openalex.org/W3167027892","https://openalex.org/W4200523352","https://openalex.org/W4281812384","https://openalex.org/W4293197789","https://openalex.org/W4296705755","https://openalex.org/W4308822543","https://openalex.org/W4379531887","https://openalex.org/W4391019930","https://openalex.org/W4404198400","https://openalex.org/W4407213010","https://openalex.org/W4408183018","https://openalex.org/W4411997620","https://openalex.org/W4416822366"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,30,109,130,133],"security":[4,49,100],"of":[5,32,111,132],"cluster":[6,67,87,98,120],"synchronization":[7,68,88,99],"in":[8],"Boolean":[9],"control":[10],"networks":[11],"under":[12,36,69,123],"deception":[13,37,124],"attacks,":[14],"where":[15],"attackers":[16],"manipulate":[17],"system":[18],"states":[19],"to":[20,47],"disrupt":[21],"feedback":[22,34,112],"controller":[23],"selections.":[24],"Using":[25],"an":[26],"equivalent":[27],"algebraic":[28],"framework,":[29],"evolution":[31],"state":[33],"controllers":[35],"attacks":[38],"is":[39,82,101],"analyzed,":[40],"and":[41,57,65,118],"secure":[42],"invariant":[43],"subsets":[44],"are":[45,60,106],"introduced":[46],"recast":[48],"issues":[50],"as":[51],"set":[52],"stability":[53],"problems.":[54],"Some":[55],"necessary":[56],"sufficient":[58],"conditions":[59],"established":[61],"for":[62,84,95,108],"both":[63],"finite-time":[64,86,117],"asymptotic":[66,97,119],"attacks.":[70,125],"To":[71],"avoid":[72],"computationally":[73],"intensive":[74],"high-dimensional":[75],"matrix":[76],"operations,":[77],"a":[78,92],"state-space":[79],"partitioning":[80],"method":[81],"proposed":[83,134],"verifying":[85],"security.":[89],"In":[90],"addition,":[91],"trajectory-set-sequence":[93],"approach":[94],"assessing":[96],"proposed.":[102],"Furthermore,":[103],"two":[104],"criteria":[105],"derived":[107],"existence":[110],"gain":[113],"matrices":[114],"that":[115],"guarantee":[116],"synchronization,":[121],"respectively,":[122],"Finally,":[126],"numerical":[127],"simulations":[128],"validate":[129],"effectiveness":[131],"methods.":[135]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
