Visible to the public International Conferences: Chinese Control and Decision Conference (CCDC), Qingdao, China, 2015

SoS Newsletter- Advanced Book Block


SoS Logo

International Conferences:

Chinese Control and Decision Conference (CCDC) 

Qingdao, China, 2015 

The 27th Chinese Control and Decision Conference (CCDC) was held in Qingdao, China on 23-25 May 2015. This is a very large conference focused on trends in control, decision, automation, robotics, and emerging technologies. More than 1200 papers were selected for presentation. The ones cited here are relevant to the Science of Security. They have implications for cyber-physical systems, resilience, and compositionality.

Lin Pan; Voos, H.; Yumei Li; Darouach, M.; Shujun Hu, “Uncertainty Quantification of Exponential Synchronization for a Novel Class of Complex Dynamical Networks with Hybrid TVD Using PIPC,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 125-130, 23-25 May 2015. doi:10.1109/CCDC.2015.7161678
Abstract: This paper investigates the Uncertainty Quantification (UQ) of Exponential Synchronization (ES) problems for a new class of Complex Dynamical Networks (CDNs) with hybrid Time-Varying Delay (TVD) and Non-Time-Varying Delay (NTVD) nodes by using coupling Periodically Intermittent Pinning Control (PIPC) which has three switched intervals in every period. Based on Kronecker product rules, Lyapunov Stability Theory (LST), Cumulative Distribution Function (CDF), and PIPC method, the robustness of the control algorithm with respect to the value of the final time is studied. Moreover, we assume a normal distribution for the time and used the Stochastic Collocation (SC) method [1] with different values of nodes and collocation points to quantify the sensitivity. For different numbers of nodes, the results show that the ES errors converge to zero with a high probability. Finally, to verify the effectiveness of our theoretical results, Nearest-Neighbor Network (NNN) and Barabási-Albert Network (BAN) consisting of coupled non-delayed and delay Chen oscillators are studied and to demonstrate that the accuracies of the ES and PIPC are robust to variations of time.
Keywords: Lyapunov methods; complex networks; convergence; delays; large-scale systems; normal distribution; periodic control; robust control; stochastic processes; switching systems (control); synchronisation; BAN; Barabási-Albert Network; CDF; CDN; Kronecker product rule; LST; Lyapunov stability theory; NNN; NTVD node; PIPC method; collocation points; complex dynamical network; control algorithm robustness; cumulative distribution function; delay Chen oscillator; error convergence; exponential synchronization problem; hybrid TVD; hybrid time-varying delay; nearest-neighbor network; nondelayed Chen oscillator; nontime-varying delay; normal distribution; periodically intermittent pinning control; probability; sensitivity quantification; stochastic collocation method; switched interval; time variation; uncertainty quantification; Artificial neural networks; Chaos; Couplings; Delays; Switches; Synchronization; Complex Dynamical Networks (CDNs); Exponential Synchronization (ES); Periodically Intermittent Pinning Control (PIPC);Time-varying Delay (TVD) (ID#: 15-7148)


Bin Liu; Feng Liu; Shengwei Mei, “Modeling and Analysis of Stochastic AC-OPF Based on SDP Relaxation Technique,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 5471-5475, 23-25 May 2015. doi:10.1109/CCDC.2015.7161772
Abstract: Optimal power flow (OPF) is the foundation for many power system optimization problems, of which the modeling and solution methodology has always been a hot topic in this research area. Recently, convex relaxation technique to solve AC constrained OPF (AC-OPF) has attracted wide attention as its ability to find global optima and polynomial-time computation complexity. However, existing models in this research area are mostly formulated as deterministic problem without considering wind power generation uncertainty which has brought great challenges to power systems' operation, especially scheduling. Based on the semidefinite (SDP) relaxation technique to solve AC-OPF problem, we built a stochastic AC-OPF model and proposed its solution methodology to cope with wind power generation uncertainty in this paper. The case study based on the modified IEEE 14 bus system showed the proposed method's rationality and effectiveness to improve the system's security, reliability and capability to integrate wind power generation.
Keywords: IEEE standards; computational complexity; convex programming; load flow; power generation reliability; power generation scheduling; power system security; stochastic programming; wind power; AC constrained OPF; IEEE 14 bus system security improvement; SDP relaxation technique; convex relaxation technique; optimal power flow; polynomial-time computation complexity; power generation scheduling; power generation uncertainty; power system optimization problem; power system reliability; semidefinite relaxation technique; stochastic AC-OPF analysis; wind power generation uncertainty; Generators; Load flow; Reactive power; Stochastic processes; Uncertainty; Wind power generation; AC constrained; OPF; SDP optimization; stochastic optimization; uncertainty (ID#: 15-7149)


Yumei Li; Voos, H.; Lin Pan; Darouach, M.; Changchun Hua, “Stochastic Cyber-Attacks Estimation for Nonlinear Control Systems Based on Robust H∞ Filtering Technique,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 5590-5595, 23-25 May 2015. doi:10.1109/CCDC.2015.7161795
Abstract: Based on robust H∞ filtering technique, this paper presents the cyber-attacks estimation problem for nonlinear control systems under stochastic cyber-attacks and disturbances. A nonlinear H∞ filter that maximize the sensitivity of the cyber-attacks and minimize the effect of the disturbances is designed. The nonlinear filter is required to be robust to the disturbances and the residual need to remain the sensitivity of the attacks as much as possible. Applying linear matrix inequality (LMI), the sufficient conditions guaranteeing the H∞ filtering performance are obtained. Simulation results demonstrate that the designed nonlinear filter efficiently solve the robust estimation problem of the stochastic cyber-attacks.
Keywords: H∞ filters; estimation theory; linear matrix inequalities; nonlinear control systems; nonlinear filters; robust control; security of data; stochastic processes; LMI; linear matrix inequality; nonlinear control system; nonlinear filter design; robust H∞ filtering technique; stochastic cyber-attack estimation; Actuators; Estimation; Noise; Robustness; Sensitivity; Stochastic processes; H∞ filter; stochastic cyber-attacks; stochastic nonlinear system (ID#: 15-7150)


Guibin Lei; Shuqing Wang; Wenfang Wang; Canping Li, “Robot Monitoring System of Ocean Remote Sensing Satellite Receiving Station,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 5757-5761, 23-25 May 2015. doi:10.1109/CCDC.2015.7161832
Abstract: Security is a basic need of system and it is one of core technology of remote controlled system. Robot monitoring system of ocean remote sensing satellite receiving station includes robot, cloud computing system and remote terminals. Robot acquires real-time image of controlled system and operates it; cloud computing system build visual decision subsystem to identify the target using wavelet transform algorithm, neural network algorithm and knowledge database of features video of specific environmental; using remote terminal administrator observes the controlled system through its scene simulator and control robot to operate it remotely. Using technology of the pseudo-random number password, technology of mutual authentication to prevent cloning site, technology of conversion between the image of controlled system and its status code and technology of conversion between operation codes and operation instructions, the security strength of the robot monitoring system is improved greatly.
Keywords: cloud computing; computerised monitoring; control engineering computing; geophysical image processing; neural nets; oceanographic techniques; remote sensing; robot vision; security of data; telerobotics; wavelet transforms; cloud computing system; knowledge database; mutual authentication; neural network algorithm; ocean remote sensing satellite receiving station; pseudorandom number password; real-time image; remote controlled system; robot monitoring system; security; visual decision subsystem; wavelet transform algorithm; Control systems; Feature extraction; Monitoring; Remote sensing; Robot sensing systems; Satellites; monitoring system; robot; security strength; visual decision subsystem (ID#: 15-7151)


Shao-Ting Ge; Zhimin Liu; Aiying Mao; Lijuan Kang; Chunhua He, “Mathematical Model of Discrete Logic Bomb with Time-Delay in the Computer Networks,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 705-710, 23-25 May 2015. doi:10.1109/CCDC.2015.7162011
Abstract: In order to describe the dynamic characteristic of logic bomb virus in computer networks, the mathematical model of discrete logic bomb viruses is established. Firstly the disease-free equilibrium and the disease equilibrium are derived from the mathematical model. Then the asymptotic stability of the disease-free equilibrium is proved. And then the asymptotically stable conditions of the disease equilibrium is given by using the disc theorem. And the stable conditions are effective.
Keywords: computer network security; computer viruses; delays; asymptotically stable conditions; computer networks; disc theorem; discrete logic bomb viruses; disease equilibrium; disease-free equilibrium; mathematical model; time-delay; Analytical models; Asymptotic stability; Computational modeling; Computers; Diseases; Mathematical model; Weapons; discrete systems; logic bomb virus; stability (ID#: 15-7152)


Jianzhi Liu; Cailian Chen; Shichao Mi; Xinping Guan, “Secure Distributed Estimation of Radio Environment Map in Hierarchical Wireless Cognitive Radio Networks,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 1476-1481, 23-25 May 2015. doi:10.1109/CCDC.2015.7162152
Abstract: Radio Environment Map (REM) is a map which indicates the radio signal strength (RSS) over a geographical region. With the help of REM, Cognitive Radio (CR) users can opportunistically access the licensed spectrum. Distributed cooperative REM estimation is vulnerable to malicious sensors that submits false sensing reports. In this paper, we develop a secure distributed scheme to estimate the REM in hierarchical wireless CR networks. We formulate the estimation process as a LS problem with two ii-norm constraints using the basis pursuit approach. Reputation factors are introduced to further improve the estimation accuracy. Our scheme enables joint valid estimation result and malicious sensor identification. The performance of the proposed scheme is confirmed by extensive simulation studies.
Keywords: cognitive radio; signal processing; telecommunication security; CR users; REM; RSS; distributed cooperative REM estimation; estimation accuracy; geographical region; hierarchical wireless CR networks; hierarchical wireless cognitive radio networks; joint valid estimation; licensed spectrum; malicious sensor identification; malicious sensors; radio environment map; radio signal strength; reputation factors; secure distributed estimation; Conferences; Basis pursuit; Cognitive radio; Secure distributed estimation (ID#: 15-7153)


Linbo Tao; Jianjing Shen; Peng Hu; Zhenyu Zhou, “Researches on Process Algebra Based Rootkits-Immune Mechanism,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 2730-2735, 23-25 May 2015. doi:10.1109/CCDC.2015.7162393
Abstract: We present a novel mechanism for detecting unknown rootkits and immunizing known rootkit for the purposes of protecting the computer from being infected by rootkits. Inspired by the immune system of human beings, our mechanism adopts the humoral immunity mechanism to detect and defense tough rootkits. First, the features of the processes are analyzed, the known rootkit features are extracted, and the process algebra are applied to formally represent object such as the self-antigens, pathogene, antibody, etc. Then, the known rootkit are used to train to generate relevant antibody which can recognize antigens of non-self. Meanwhile, the rejection reaction of humoral immunity is used to detect unknown rootkit and generate specific antibody. Last, both known and unknown rootkits can be killed once detected. Based on this mechanism, a prototype system is implemented. And experimental results indicate that this mechanism possesses higher detection ratio and lower false ratio.
Keywords: computer viruses; feature extraction; process algebra; antibody; detection ratio; human being; humoral immunity mechanism; lower false ratio; pathogene; process algebra based rootkits-immune mechanism; prototype system; rejection reaction; rootkit feature extraction; self-antigens; tough rootkit; Algebra; Feature extraction; Generators; Immune system; Monitoring; Real-time systems; Viruses (medical); Kernel Security; Process Algebra; Rootkit-immune; Rootkits (ID#: 15-7154)


Yi Lu; Qiang Yang; Wenyuan Xu; Zhiyun Lin; Wenjun Yan, “Cyber Security Assessment in PMU-Based State Estimation of Smart Electric Transmission Networks,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 3302-3307, 23-25 May 2015. doi:10.1109/CCDC.2015.7162490
Abstract: The adoption of a massive number of synchronized phasor measurement units (PMUs) supporting the wide-area measurement system (WAMS) in current electric transmission networks brings direct benefit in provision of accurate and timely network measurements, but also exposes a set of outstanding technical challenges in security aspect. This paper looks into the security problem of state estimation in WAMS in the context of cyber-physical system (CPS) which often exhibits complex structural characteristics and dynamic operational phenomenon. Typical attacks on PMUs and adverse impact on network state estimation are explored and studied through carrying out a set of simulation experiments using the IEEE 14-bus transmission network model. The preliminary numerical result quantifies the impact of PMU measurement data tampering on the state estimation accuracy and confirms that the PMU-based state estimation potentially can be significantly affected by various forms of cyber attacks.
Keywords: phasor measurement; power system security; power system state estimation; power transmission; CPS; IEEE 14-bus transmission network; PMU-based state estimation; WAMS; cyber security assessment; cyber-physical system; network state estimation; security problem; smart electric transmission networks; synchronized phasor measurement units; wide area measurement system; Current measurement; Monitoring; Phasor measurement units; State estimation; Transmission line measurements; Voltage measurement; PMU; Smart transmission network; State Estimation; WAMS (ID#: 15-7155)


Fangyuan Hou; Zhonghua Pang; Yuguo Zhou; Dehui Sun, “False Data Injection Attacks for a Class of Output Tracking Control Systems,” in Control and Decision Conference (CCDC), 2015 27th Chinese,  vol., no., pp.3319-3323, 23-25 May 2015. doi:10.1109/CCDC.2015.7162493
Abstract: With the development of cyber-physical systems (CPSs), the security becomes an important and challenging problem. Attackers can launch various attacks to destroy the control system performance. In this paper, a class of linear discrete-time time-invariant control systems is considered, which is open-loop critically stable and only has one critical eigenvalue. By including the output tracking error as an additional state, a Kalman filter-based augmented state feedback control strategy is designed to solve its output tracking problem. Then a stealthy false data attack is injected into the measurement output, which can completely destroy the output tracking control systems without being detected. Simulation results on a numerical example show that the proposed false data injection attack is effective.
Keywords: discrete time systems; linear systems; open loop systems; stability; state feedback; CPS development; Kalman filter-based augmented state feedback control strategy; control system performance; cyber-physical systems; eigenvalue; false data injection attacks; linear discrete-time time-invariant control system; open-loop stability; output tracking control systems; Computer security; Detectors; Kalman filters; Simulation; State feedback; Wireless sensor networks; Critically Stable; False Data Injection Attacks; Output Tracking Control (ID#: 15-7156)


Xuan Li; Qiaozhu Zhai; Wei Yuan; Jiebing Liu, “Improved Method of Quantitative Steady-State Security Assessment Based on Fast Elimination of Redundant Transmission Capacity Constraints,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 4242-4246, 23-25 May 2015. doi:10.1109/CCDC.2015.7162675
Abstract: Steady-state security analysis is of great importance to power systems. Steady-state security region (SSR) is a region-wise method that could improve the efficiency of steady-state security analysis. Based on SSR, steady-state security distance (SSD) was proposed in literature and SSD provides a quantitative tool for security assessment on a current operation point (OP) or operational state. However, a large scale optimization problem with many constraints must be solved when calculating SSD. In this paper, an improved method for calculating SSD is presented based on fast elimination of redundant transmission capacity constraints. The main idea is to use an analytic method instead of solving an optimization problem to get an over estimation on the maximal power flow on each transmission line, and then compare the result with the line capacity to identify whether the constraint is redundant. By using this method, the problem for calculating SSD is greatly simplified. Numerical tests are performed and the results are satisfactory.
Keywords: linear programming; power system security; fast elimination; maximal power flow; quantitative steady-state security assessment; redundant transmission capacity constraints; steady-state security distance; Generators; Load flow; Optimization; Power transmission lines; Security; Steady-state; Linear Programming; Redundant Constraints; Steady-State Security Distance; Steady-State Security Region (ID#: 15-7157)


Xiaoxia Wang; Naxin Cui; Hai Huang; Chenghui Zhang, “Vehicle Active Security Based on Driver Modeling,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 4984-4987, 23-25 May 2015. doi:10.1109/CCDC.2015.7162816
Abstract: The vehicle passive safety technology can only solve the problems caused by traffic accidents. The active safety technology, which can prevent and reduce accidents, would suffice for more far-reaching applications. In this paper Elman neural network is adopted to predict driver's behavior ahead of time. The “people oriented” driver-vehicle-road closed loop model is set up. The system would record the habits of the driver and warn in time when the behaviors of the driver deviate from the forecasted trajectory to a certain extent. Real time simulation is carried out, which is based on 3D urban road that acquired by GPS equipment. The results indicate that Elman algorithm can be used to establish the warning system of driver's improper operation and provide the reliable and valuable information for safe driving.
Keywords: Global Positioning System; alarm systems; computer graphics; driver information systems; neural nets; road accidents; road safety; road vehicles; trajectory control; 3D urban road; Elman algorithm; Elman neural network; GPS equipment; driver behavior prediction; driver modeling; far-reaching applications; forecasted trajectory; people oriented driver-vehicle-road closed loop model; real time simulation; traffic accidents; vehicle active safety technology; vehicle passive safety technology; Accidents; Real-time systems; Roads; Safety; Security; Three-dimensional displays; Vehicles; 3D Urban Road; Elman Network; Vehicle Active Security (ID#: 15-7158)


Wang Junwei; Fang Xiaoyi, “Improved TEEN Based Trust Routing Algorithm in WSNs,” in Control and Decision Conference (CCDC), 2015 27th Chinese, vol., no., pp. 4379-4382, 23-25 May 2015. doi:10.1109/CCDC.2015.7162699
Abstract: Deployed in harsh environment of wireless sensor network node is physically captured or damage easily, and its wireless communication pattern may lead network vulnerable by all kinds of interference and attacks. Therefore, the routing security is particularly important. Based on the in-depth analysis of wireless sensor networks protocol - TEEN protocol, combined with the trustworthy evaluation mechanism, an improved TEEN based trust routing algorithm in wireless sensor networks is put forward. A dynamic trust management mode is designed to ensure the credibility of node. The cluster head selection strategy and routing strategy of TEEN are improved to ensure the energy efficiency of the network, and the periodic data collection mechanism is introduced to determine the survival state of node. The simulation and performance evaluation show that the proposed algorithm has better performance.
Keywords: radiofrequency interference; routing protocols; telecommunication network management; telecommunication security; wireless sensor networks; TEEN protocol; WSN; attacks; dynamic trust management mode; harsh environment; head selection strategy; improved TEEN; interference; routing security; routing strategy; trust routing algorithm; trustworthy evaluation mechanism; wireless communication pattern; wireless sensor network node; wireless sensor networks protocol; Algorithm design and analysis; Clustering algorithms; Heuristic algorithms; Routing; Routing protocols; Wireless sensor networks; TEEN protocol; dynamic trust management; energy efficiency; trustworthy routing (ID#: 15-7159)


Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.