Xinlei Yi

Learn More
Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading " white " or " benign " worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this(More)
This paper mainly investigates consensus problem with a pull-based event-triggered feedback control. For each agent, the diffusion coupling feedbacks are based on the states of its in-neighbors at its latest triggering time, and the next triggering time of this agent is determined by its in-neighbors' information. The general directed topologies, including(More)
— The consensus problem for multi-agent systems with quantized communication or sensing is considered. Centralized and distributed self-triggered rules are proposed to reduce the overall need of communication and system updates. It is proved that these self-triggered rules realize consensus exponentially if the network topologies have a spanning tree and(More)
In this paper, event-triggered controllers and corresponding algorithms are proposed to establish formation with connectivity preservation for multi-agent systems. Each agent only needs to update its control input and broadcast this control input together with its state information to its neighbors at its own triggering times. Two types of system dynamics,(More)
In this paper, we investigate stability of a class of analytic neural networks with the synaptic feedback via event-triggered rules. This model is general and include Hopfield neural network as a special case. These event-trigger rules can efficiently reduces loads of computation and information transmission at synapses of the neurons. The synaptic feedback(More)
The development of sensing and communication technologies such as wireless sensor networks (WSNs) are making it possible to monitor our cities and living environments. Due to the small size of the sensor nodes, and their capabilities of transmitting data remotely, they can be deployed at locations that are not easy or impossible to access. For example, WSNs(More)
  • 1