{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T19:01:11Z","timestamp":1776193271199,"version":"3.50.1"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62366049"],"award-info":[{"award-number":["62366049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009110","name":"Xinjiang Uygur Autonomous Region Natural Science Foundation","doi-asserted-by":"publisher","award":["2024D01D04"],"award-info":[{"award-number":["2024D01D04"]}],"id":[{"id":"10.13039\/100009110","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009110","name":"Xinjiang Uygur Autonomous Region Natural Science Foundation","doi-asserted-by":"publisher","award":["2025D01C32"],"award-info":[{"award-number":["2025D01C32"]}],"id":[{"id":"10.13039\/100009110","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Communications in Nonlinear Science and Numerical Simulation"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.cnsns.2026.109983","type":"journal-article","created":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:44:02Z","timestamp":1774658642000},"page":"109983","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Secure synchronization of multi-layer networks with hybrid attacks via impulsive control"],"prefix":"10.1016","volume":"160","author":[{"given":"Lingna","family":"Shi","sequence":"first","affiliation":[]},{"given":"Jiarong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3002-4081","authenticated-orcid":false,"given":"Haijun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jinling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cnsns.2026.109983_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2024.106523","article-title":"A weighted prior tensor train decomposition method for community detection in multi-layer networks","volume":"179","author":"Peng","year":"2024","journal-title":"Neural Netw"},{"key":"10.1016\/j.cnsns.2026.109983_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.tra.2025.104465","article-title":"Assessing the resilience of multi-modal transportation networks with the integration of urban air mobility","volume":"195","author":"Ma","year":"2025","journal-title":"Transp Res Part A Policy Pract"},{"key":"10.1016\/j.cnsns.2026.109983_bib0003","series-title":"Complex social networks in online sharing of experiences: self- and other-positioning, discourse, context and media","first-page":"100913","volume":"vol. 66","author":"Chen","year":"2025"},{"key":"10.1016\/j.cnsns.2026.109983_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.114522","article-title":"The influence of different government policies on the co-evolution of information dissemination, vaccination behavior and disease transmission in multilayer networks","volume":"180","author":"Wu","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.cnsns.2026.109983_bib0005","doi-asserted-by":"crossref","first-page":"6009","DOI":"10.1109\/TASE.2024.3435443","article-title":"Social-learning coordination of collaborative multi-robot systems achieves resilient production in a smart factory","volume":"22","author":"Nie","year":"2025","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"12","key":"10.1016\/j.cnsns.2026.109983_bib0006","doi-asserted-by":"crossref","first-page":"5756","DOI":"10.1109\/TCSI.2024.3392754","article-title":"Synchronization for directed multi-level complex networks with multiple weights","volume":"71","author":"Xie","year":"2024","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"10.1016\/j.cnsns.2026.109983_bib0007","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.isatra.2023.10.015","article-title":"Bipartite synchronization of multilayer signed networks under aperiodic intermittent-based adaptive dynamic event-triggered control,","volume":"144","author":"Ren","year":"2024","journal-title":"ISA Trans"},{"key":"10.1016\/j.cnsns.2026.109983_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2025.109291","article-title":"Observer-based pinning control security synchronization of multi-weighted complex networks subject to DoS attacks","volume":"152","author":"Shi","year":"2026","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.113994","article-title":"Quasi-synchronization of multi-layer delayed neural networks with parameter mismatches via impulsive control","volume":"175","author":"Shi","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.cnsns.2026.109983_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2024.106124","article-title":"Event-triggered hybrid impulsive control for synchronization of fractional-order multilayer signed networks under cyber attacks","volume":"172","author":"Liu","year":"2024","journal-title":"Neural Netw"},{"key":"10.1016\/j.cnsns.2026.109983_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2025.112134","article-title":"Distributed optimization for uncertain nonlinear mass under event-triggered communication","volume":"177","author":"Fan","year":"2025","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109983_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.conengprac.2025.106470","article-title":"Integrated path planning and control for autonomous vehicle platooning","volume":"164","author":"Gil","year":"2025","journal-title":"Control Eng Pract"},{"key":"10.1016\/j.cnsns.2026.109983_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108421","article-title":"Secure multi-synchronization of heterogeneous dynamical networks with deception attacks via event-triggered impulsive control","volume":"140","author":"Guo","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0014","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.isatra.2024.07.017","article-title":"DoS Attacks resilience of heterogeneous complex networks via dynamic event-triggered impulsive scheme for secure quasi-synchronization,","volume":"153","author":"Zhou","year":"2024","journal-title":"ISA Trans"},{"key":"10.1016\/j.cnsns.2026.109983_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2025.108694","article-title":"Special function-based limited-time synchronization of multilayered coupled quaternion networks","volume":"145","author":"Xiong","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0016","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/TSMC.2023.3323352","article-title":"Abdel-Aty, finite\/fixed-Time controls of neural networks in a signed graph","volume":"54","author":"Sun","year":"2024","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0017","article-title":"Pinning passivity and bipartite synchronization of fractional signed networks without gauge transformation","volume":"486","author":"Sun","year":"2025","journal-title":"Appl Math Comput"},{"issue":"2","key":"10.1016\/j.cnsns.2026.109983_bib0018","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1307\/mmj\/1028989917","article-title":"On the notion of balance of a signed graph","volume":"2","author":"Harary","year":"1953","journal-title":"Michigan Math J"},{"issue":"4","key":"10.1016\/j.cnsns.2026.109983_bib0019","doi-asserted-by":"crossref","first-page":"2438","DOI":"10.1109\/TFUZZ.2024.3354241","article-title":"Observer-based adaptive event-triggered control for interval type-2 fuzzy systems under multiple cyber attacks","volume":"32","author":"Liu","year":"2024","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0020","doi-asserted-by":"crossref","first-page":"4591","DOI":"10.1109\/TCYB.2020.3001187","article-title":"Co-design of dynamic event-triggered communication scheme and resilient observer-based control under aperiodic DoS attacks","volume":"51","author":"Hu","year":"2020","journal-title":"IEEE Trans Cybern"},{"key":"10.1016\/j.cnsns.2026.109983_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2024.108856","article-title":"Resilient fixed-time synchronization of delayed fuzzy memristive reaction-diffusion neural networks under DoS attacks","volume":"479","author":"Xiao","year":"2024","journal-title":"Fuzzy Sets Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0022","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCNS.2023.3314578","article-title":"Observer-based resilient controller design for networked stochastic systems under coordinated DoS and FDI attacks","volume":"11","author":"Hu","year":"2023","journal-title":"IEEE Trans Control Netw Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.jfranklin.2024.106937","article-title":"Observer-based resilient dynamic event-triggering control for switched systems under DoS and FDI attacks","volume":"361","author":"Zhao","year":"2024","journal-title":"J Franklin Inst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2024.111947","article-title":"Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks","volume":"171","author":"Zhang","year":"2025","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109983_bib0025","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.isatra.2025.01.005","article-title":"Secure synchronization control for complex dynamic networks with event-triggered communication strategy under multi-channel denial-of-service attacks,","volume":"158","author":"Hu","year":"2025","journal-title":"ISA Trans"},{"key":"10.1016\/j.cnsns.2026.109983_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2024.109252","article-title":"Fuzzy-model-based bipartite synchronization for nonlinear cooperation-competition networks with semi-Markov switching topologies under FDI attacks","volume":"503","author":"Shi","year":"2025","journal-title":"Fuzzy Sets Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.nahs.2024.101547","article-title":"Cluster synchronization of complex dynamic networks under pinning control via a limited capacity communication channel","volume":"55","author":"Wu","year":"2025","journal-title":"Nonlinear Anal Hybrid Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0028","doi-asserted-by":"crossref","first-page":"13619","DOI":"10.1109\/TNNLS.2023.3270345","article-title":"Synchronization of delayed memristor-based neural networks via pinning control with local information","volume":"35","author":"Yang","year":"2024","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10.1016\/j.cnsns.2026.109983_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2024.112072","article-title":"Finite-gain based adaptive predefined-time control for a class of strict-feedback systems subject to output constraints","volume":"173","author":"Yang","year":"2025","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109983_bib0030","article-title":"Observer-based event-triggered control for h\u221e synchronization of complex networks","volume":"690","author":"Li","year":"2024","journal-title":"Inf Sci"},{"key":"10.1016\/j.cnsns.2026.109983_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2023.111493","article-title":"Stabilization of complex networks under asynchronously intermittent event-triggered control","volume":"161","author":"Wu","year":"2024","journal-title":"Automatica"},{"key":"10.1016\/j.cnsns.2026.109983_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2025.108922","article-title":"Secure impulsive synchronization control of multi-agent systems under switching deception attacks on dual channel","volume":"149","author":"He","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108540","article-title":"Quantized hybrid impulsive control for finite-time synchronization of fractional-order uncertain multiplex networks with multiple time-varying delays","volume":"142","author":"Peng","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.127046","article-title":"Finite-time quasi-synchronization of multi-layer heterogeneous networks with distributed hybrid control","volume":"566","author":"Sun","year":"2024","journal-title":"Neurocomputing"},{"key":"10.1016\/j.cnsns.2026.109983_bib0035","doi-asserted-by":"crossref","unstructured":"Kivel\u00e4 M., Arenas A., Barthelemy M., Gleeson J., Porter M., Networks M.. J Complex Netw2014; 2:203\u2013271.","DOI":"10.1093\/comnet\/cnu016"},{"key":"10.1016\/j.cnsns.2026.109983_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2025.108820","article-title":"Exponential bipartite synchronization of distributed-order multilayer neural networks with antagonistic interactions via aperiodic intermittent control","volume":"147","author":"Yang","year":"2025","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10.1016\/j.cnsns.2026.109983_bib0037","series-title":"Theory of impulsive differential equations, Aequationes mathematicae","author":"Lakshmikantham","year":"1989"},{"key":"10.1016\/j.cnsns.2026.109983_bib0038","doi-asserted-by":"crossref","first-page":"935","DOI":"10.1109\/TAC.2012.2224251","article-title":"Consensus problems on networks with antagonistic interactions","volume":"58","author":"Altafini","year":"2013","journal-title":"IEEE Trans Autom Control"},{"key":"10.1016\/j.cnsns.2026.109983_bib0039","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.neucom.2021.03.009","article-title":"Leader-following consensus of delayed neural networks under multi-layer signed graphs","volume":"450","author":"Ren","year":"2021","journal-title":"Neurocomputing"}],"container-title":["Communications in Nonlinear Science and Numerical Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426003424?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570426003424?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T18:02:34Z","timestamp":1776189754000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1007570426003424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":39,"alternative-id":["S1007570426003424"],"URL":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109983","relation":{},"ISSN":["1007-5704"],"issn-type":[{"value":"1007-5704","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure synchronization of multi-layer networks with hybrid attacks via impulsive control","name":"articletitle","label":"Article Title"},{"value":"Communications in Nonlinear Science and Numerical Simulation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cnsns.2026.109983","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"109983"}}