{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:45:33Z","timestamp":1766159133712,"version":"build-2065373602"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,3,12]],"date-time":"2023-03-12T00:00:00Z","timestamp":1678579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,12]],"date-time":"2023-03-12T00:00:00Z","timestamp":1678579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12171124"],"award-info":[{"award-number":["12171124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00521-023-08419-x","type":"journal-article","created":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T22:07:19Z","timestamp":1679868439000},"page":"13261-13273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Outlier-resistant variance-constrained $$\\mathit{H}_{\\infty }$$ state estimation for time-varying recurrent neural networks with randomly occurring deception attacks"],"prefix":"10.1007","volume":"35","author":[{"given":"Yan","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7852-5064","authenticated-orcid":false,"given":"Jun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Junhua","family":"Du","sequence":"additional","affiliation":[]},{"given":"Chaoqing","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,12]]},"reference":[{"issue":"24","key":"8419_CR1","doi-asserted-by":"crossref","first-page":"16881","DOI":"10.1007\/s00521-021-06049-9","volume":"33","author":"R Sakthivel","year":"2021","unstructured":"Sakthivel R, Aravinth N, Aouiti C, Arumugam K (2021) Finite-time synchronization of hierarchical hybrid coupled neural networks with mismatched quantization. Neural Comput Appl 33(24):16881\u201316897","journal-title":"Neural Comput Appl"},{"issue":"3","key":"8419_CR2","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TCE.2022.3190384","volume":"68","author":"L Dong","year":"2022","unstructured":"Dong L, Zhang H, Yang K, Zhou D, Shi J, Ma J (2022) Crowd counting by using Top-k relations: a mixed ground-truth CNN framework. IEEE Trans Consum Electron 68(3):307\u2013316","journal-title":"IEEE Trans Consum Electron"},{"issue":"6","key":"8419_CR3","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1080\/08839514.2021.1902124","volume":"35","author":"ME Morocho-Cayamcela","year":"2021","unstructured":"Morocho-Cayamcela ME, Lim W (2021) Pattern recognition of soldier uniforms with dilated convolutions and a modified encoder-decoder neural network architecture. Appl Artif Intell 35(6):476\u2013487","journal-title":"Appl Artif Intell"},{"issue":"5","key":"8419_CR4","doi-asserted-by":"crossref","first-page":"4033","DOI":"10.1007\/s00521-021-06662-8","volume":"34","author":"G Vladimir","year":"2022","unstructured":"Vladimir G, Yury M, Natalya K (2022) Pattern recognition techniques for classifying aeroballistic flying vehicle paths. Neural Comput Appl 34(5):4033\u20134045","journal-title":"Neural Comput Appl"},{"issue":"16","key":"8419_CR5","doi-asserted-by":"crossref","first-page":"12667","DOI":"10.1007\/s00521-022-07170-z","volume":"34","author":"M Liao","year":"2022","unstructured":"Liao M, Wang C, Sun Y, Lin H, Xu C (2022) Memristor-based affective associative memory neural network circuit with emotional gradual processes. Neural Comput Appl 34(16):12667\u201313682","journal-title":"Neural Comput Appl"},{"key":"8419_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06478-6","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Jiao X (2021) Intelligent analysis system for signal processing tasks based on LSTM recurrent neural network algorithm. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06478-6","journal-title":"Neural Comput Appl"},{"key":"8419_CR7","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.neucom.2020.05.085","volume":"410","author":"EF -Blanco","year":"2020","unstructured":"-Blanco EF, Rivero D, Pazos A (2020) EEG signal processing with separable convolutional neural network for automatic scoring of sleeping stage. Neurocomputing 410:220\u2013228","journal-title":"Neurocomputing"},{"issue":"7","key":"8419_CR8","doi-asserted-by":"crossref","first-page":"7451","DOI":"10.1109\/TPEL.2019.2954740","volume":"35","author":"KH Tan","year":"2020","unstructured":"Tan KH, Lin FJ, Shih CM, Kuo CN (2020) Intelligent control of microgrid with virtual inertia using recurrent probabilistic wavelet fuzzy neural network. IEEE Trans Power Electron 35(7):7451\u20137464","journal-title":"IEEE Trans Power Electron"},{"key":"8419_CR9","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.fss.2018.01.017","volume":"356","author":"H Shen","year":"2019","unstructured":"Shen H, Xing M, Huo S, Wu ZG, Park JH (2019) Finite-time $$H_{\\infty }$$ asynchronous state estimation for discrete-time fuzzy Markov jump neural networks with uncertain measurements. Fuzzy Sets Syst 356:113\u2013128","journal-title":"Fuzzy Sets Syst"},{"issue":"16","key":"8419_CR10","doi-asserted-by":"crossref","first-page":"3351","DOI":"10.1080\/00207721.2021.1995528","volume":"52","author":"J Hu","year":"2021","unstructured":"Hu J, Jia C, Liu H, Yi X, Liu Y (2021) A survey on state estimation of complex dynamical networks. Int J Syst Sci 52(16):3351\u20133367","journal-title":"Int J Syst Sci"},{"issue":"16","key":"8419_CR11","doi-asserted-by":"crossref","first-page":"3368","DOI":"10.1080\/00207721.2021.1998843","volume":"52","author":"X-C Jia","year":"2021","unstructured":"Jia X-C (2021) Resource-efficient and secure distributed state estimation over wireless sensor networks: a survey. Int J Syst Sci 52(16):3368\u20133389","journal-title":"Int J Syst Sci"},{"issue":"1","key":"8419_CR12","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/TCYB.2017.2769722","volume":"49","author":"X Ge","year":"2019","unstructured":"Ge X, Han Q-L, Wang Z (2019) A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks. IEEE Trans Cybern 49(1):171\u2013183","journal-title":"IEEE Trans Cybern"},{"key":"8419_CR13","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.neunet.2019.12.008","volume":"123","author":"J He","year":"2020","unstructured":"He J, Liang Y, Yang F, Yang F (2020) New $$H_{\\infty }$$ state estimation criteria of delayed static neural networks via the Lyapunov\u2013Krasovskii functional with negative definite terms. Neural Netw 123:236\u2013247","journal-title":"Neural Netw"},{"issue":"7","key":"8419_CR14","first-page":"2757","volume":"29","author":"H Dong","year":"2018","unstructured":"Dong H, Hou N, Wang Z, Ren W (2018) Variance-constrained state estimation for complex networks with randomly varying topologies. IEEE Trans Neural Netw Learn Syst 29(7):2757\u20132768","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"8419_CR15","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1186\/s13662-019-2298-7","volume":"1","author":"Y Gao","year":"2019","unstructured":"Gao Y, Hu J, Chen D, Du J (2019) Variance-constrained resilient $$H_{\\infty }$$ state estimation for time-varying neural networks with randomly varying nonlinearities and missing measurements. Adv Differ Equ 1:380","journal-title":"Adv Differ Equ"},{"issue":"6","key":"8419_CR16","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1080\/00207721.2021.1872118","volume":"52","author":"L Liu","year":"2021","unstructured":"Liu L, Ma L, Zhang J, Bo Y (2021) Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks. Int J Syst Sci 52(6):1192\u20131205","journal-title":"Int J Syst Sci"},{"issue":"5","key":"8419_CR17","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","volume":"15","author":"D Ding","year":"2019","unstructured":"Ding D, Han Q-L, Wang Z, Ge X (2019) A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans Ind Inf 15(5):2483\u20132499","journal-title":"IEEE Trans Ind Inf"},{"issue":"10","key":"8419_CR18","doi-asserted-by":"crossref","first-page":"3788","DOI":"10.1109\/TNNLS.2019.2946290","volume":"31","author":"B Shen","year":"2020","unstructured":"Shen B, Wang Z, Wang D, Li Q (2020) State-saturated recursive filter design for stochastic time-varying nonlinear complex networks under deception attacks. IEEE Trans Neural Netw Learn Syst 31(10):3788\u20133800","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"8419_CR19","first-page":"149","volume":"69","author":"Z-H Pang","year":"2022","unstructured":"Pang Z-H, Fan L-Z, Dong Z, Han Q-L, Liu G-P (2022) False data injection attacks against partial sensor measurements of networked control systems. IEEE Trans Circuits Syst II Express Br 69(1):149\u2013153","journal-title":"IEEE Trans Circuits Syst II Express Br"},{"key":"8419_CR20","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.ins.2020.06.074","volume":"546","author":"Z-H Pang","year":"2021","unstructured":"Pang Z-H, Fan L-Z, Sun J, Liu K, Liu G-P (2021) Detection of stealthy false data injection attacks against networked control systems via active data modification. Inf Sci 546:192\u2013205","journal-title":"Inf Sci"},{"issue":"6","key":"8419_CR21","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1080\/00207721.2021.1884917","volume":"52","author":"J Zhang","year":"2021","unstructured":"Zhang J, Song J, Li J, Han F, Zhang H (2021) Observer-based non-fragile $$H_{\\infty }$$-consensus control for multi-agent systems under deception attacks. Int J Syst Sci 52(6):1223\u20131236","journal-title":"Int J Syst Sci"},{"key":"8419_CR22","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"Ding D, Han Q-L, Xiang Y, Ge X, Zhang X (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674\u20131683","journal-title":"Neurocomputing"},{"key":"8419_CR23","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.automatica.2016.12.026","volume":"78","author":"D Ding","year":"2017","unstructured":"Ding D, Wang Z, Ho DWC, Wei G (2017) Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica 78:231\u2013240","journal-title":"Automatica"},{"issue":"5","key":"8419_CR24","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TCYB.2016.2544062","volume":"47","author":"Z Feng","year":"2017","unstructured":"Feng Z, Wen G, Hu G (2017) Distributed secure coordinated control for multiagent systems under strategic attacks. IEEE Trans Cybern 47(5):1273\u20131284","journal-title":"IEEE Trans Cybern"},{"issue":"10","key":"8419_CR25","doi-asserted-by":"crossref","first-page":"4341","DOI":"10.1109\/TNNLS.2019.2955132","volume":"31","author":"SJ Yoo","year":"2020","unstructured":"Yoo SJ (2020) Neural-network-based adaptive resilient dynamic surface control against unknown deception attacks of uncertain nonlinear time-delay cyberphysical systems. IEEE Trans Neural Netw Learn Syst 31(10):4341\u20134353","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"8419_CR26","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.amc.2017.09.007","volume":"320","author":"J Liu","year":"2018","unstructured":"Liu J, Xia J, Tian E, Fei S (2018) Hybrid-driven-based $$H_{\\infty }$$ filter design for neural networks subject to deception attacks. Appl Math Comput 320:158\u2013174","journal-title":"Appl Math Comput"},{"issue":"3","key":"8419_CR27","first-page":"3969","volume":"37","author":"FO Catak","year":"2019","unstructured":"Catak FO, Mustacoglu AF (2019) Distributed denial of service attack detection using autoencoder and deep neural networks. J Intell Syst 37(3):3969\u20133979","journal-title":"J Intell Syst"},{"issue":"5","key":"8419_CR28","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.1002\/rnc.5831","volume":"32","author":"X Wang","year":"2022","unstructured":"Wang X, Ding D, Ge X, Han Q-L (2022) Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: the adaptive event-triggered case. Int J Robust Nonlinear Control 32(5):2760\u20132779","journal-title":"Int J Robust Nonlinear Control"},{"issue":"4","key":"8419_CR29","doi-asserted-by":"crossref","first-page":"2869","DOI":"10.1007\/s00521-021-06565-8","volume":"34","author":"NGB Amma","year":"2022","unstructured":"Amma NGB, Selvakumar S (2022) Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks. Neural Comput Appl 34(4):2869\u20132882","journal-title":"Neural Comput Appl"},{"issue":"5","key":"8419_CR30","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1080\/03081079.2015.1106739","volume":"45","author":"D Ding","year":"2016","unstructured":"Ding D, Shen Y, Song Y, Wang Y (2016) Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks, sensor saturation and denial-of-service attacks. Int J Gen Syst 45(5):548\u2013560","journal-title":"Int J Gen Syst"},{"issue":"1","key":"8419_CR31","first-page":"159","volume":"69","author":"W Qi","year":"2022","unstructured":"Qi W, Lv C, Park JH, Zong G, Cheng J, Shi K (2022) SMC for semi-Markov jump cyber-physical systems subject to randomly occurring deception attacks. IEEE Trans Circuits Syst II-Express Br 69(1):159\u2013163","journal-title":"IEEE Trans Circuits Syst II-Express Br"},{"key":"8419_CR32","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.ins.2020.07.047","volume":"544","author":"W Song","year":"2021","unstructured":"Song W, Wang Z, Wang J, Shan J (2021) Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks. Inf Sci 544:298\u2013307","journal-title":"Inf Sci"},{"issue":"6","key":"8419_CR33","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1109\/TCYB.2019.2918760","volume":"50","author":"N Hou","year":"2020","unstructured":"Hou N, Wang Z, Ho DWC, Dong H (2020) Robust partial-nodes-based state estimation for complex networks under deception attacks. IEEE Trans Cybern 50(6):2793\u20132802","journal-title":"IEEE Trans Cybern"},{"key":"8419_CR34","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2022.2056772","author":"C Gao","year":"2022","unstructured":"Gao C, He X, Dong H, Liu H, Lyu G (2022) A survey on fault-tolerant consensus control of multi-agent systems: trends, methodologies and prospects. Int J Syst Sci. https:\/\/doi.org\/10.1080\/00207721.2022.2056772","journal-title":"Int J Syst Sci"},{"issue":"5","key":"8419_CR35","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1109\/TAC.2021.3079407","volume":"67","author":"C Gao","year":"2022","unstructured":"Gao C, Wang Z, He X, Dong H (2022) Fault-tolerant consensus control for multiagent systems: an encryption-decryption scheme. IEEE Trans Autom Control 67(5):2560\u20132567","journal-title":"IEEE Trans Autom Control"},{"issue":"10","key":"8419_CR36","doi-asserted-by":"crossref","first-page":"4897","DOI":"10.1109\/TCYB.2020.3021194","volume":"51","author":"Y Shen","year":"2021","unstructured":"Shen Y, Wang Z, Shen B, Dong H (2021) Outlier-resistant recursive filtering for multisensor multirate networked systems under weighted try-once-discard protocol. IEEE Trans Cybern 51(10):4897\u20134908","journal-title":"IEEE Trans Cybern"},{"issue":"5","key":"8419_CR37","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TNNLS.2020.2991151","volume":"32","author":"J Li","year":"2021","unstructured":"Li J, Wang Z, Dong H, Ghinea G (2021) Outlier-resistant remote state estimation for recurrent neural networks with mixed time-delays. IEEE Trans Neural Netw Learn Syst 32(5):2266\u20132273","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"8419_CR38","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.neucom.2020.04.058","volume":"403","author":"H Fu","year":"2020","unstructured":"Fu H, Dong H, Han F, Shen Y, Hou N (2020) Outlier-resistant $$H_{\\infty }$$ filtering for a class of networked systems under round-robin protocol. Neurocomputing 403:133\u2013142","journal-title":"Neurocomputing"},{"key":"8419_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.automatica.2017.10.022","volume":"88","author":"A Alessandri","year":"2018","unstructured":"Alessandri A, Zaccarian L (2018) Stubborn state observers for linear time-invariant systems. Automatica 88:1\u20139","journal-title":"Automatica"},{"issue":"5","key":"8419_CR40","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1109\/TNNLS.2016.2516030","volume":"28","author":"B Shen","year":"2017","unstructured":"Shen B, Wang Z, Qiao H (2017) Event-triggered state estimation for discrete-time multidelayed neural networks with stochastic parameters and incomplete measurements. IEEE Trans Neural Netw Learn Syst 28(5):1152\u20131163","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"14","key":"8419_CR41","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1002\/rnc.1662","volume":"21","author":"B Shen","year":"2011","unstructured":"Shen B, Wang Z, Shu H, Wei G (2011) $$H_{\\infty }$$ filtering for uncertain time-varying systems with multiple randomly occurred nonlinearities and successive packet dropouts. Int J Robust Nonlinear Control 21(14):1693\u20131709","journal-title":"Int J Robust Nonlinear Control"},{"key":"8419_CR42","doi-asserted-by":"publisher","unstructured":"Dehghani A, Seyyedsalehi SA (2022) Time-frequency localization using deep convolutional maxout neural network in Persian speech recognition. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-022-11006-1","DOI":"10.1007\/s11063-022-11006-1"},{"issue":"18","key":"8419_CR43","doi-asserted-by":"crossref","first-page":"15603","DOI":"10.1007\/s00521-022-07249-7","volume":"34","author":"R Shashidhar","year":"2022","unstructured":"Shashidhar R, Patilkulkarni S (2022) Audiovisual speech recognition for Kannada language using feed forward neural network. Neural Comput Appl 34(18):15603\u201315615","journal-title":"Neural Comput Appl"},{"issue":"4","key":"8419_CR44","doi-asserted-by":"crossref","first-page":"1571","DOI":"10.1109\/TCSI.2021.3134271","volume":"69","author":"B Liu","year":"2022","unstructured":"Liu B, Cai H, Zhang Z, Ding X, Wang Z, Gong Y, Liu W, Yang J, Wang Z, Yang J (2022) More is less: domain-specific speech recognition microprocessor using one-dimensional convolutional recurrent neural network. IEEE Trans Circuits Syst I-Regul Pap 69(4):1571\u20131582","journal-title":"IEEE Trans Circuits Syst I-Regul Pap"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08419-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08419-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08419-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T17:05:33Z","timestamp":1702141533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08419-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,12]]},"references-count":44,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["8419"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08419-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2023,3,12]]},"assertion":[{"value":"2 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}