Optimized Signal-Driven Learning-Based Control Strategy for Decentralized Agents in Adversarial Communication Environments
Abstract
The increasing deployment of decentralized multi-agent systems (MAS) in cyber-physical infrastructures has intensified concerns regarding robustness under adversarial communication environments. These environments, characterized by denial-of-service (DoS), false data injection (FDI), and coordinated cyber-attacks, significantly degrade system stability and cooperative performance. This study proposes an optimized signal-driven learning-based control strategy that integrates adaptive event-triggered mechanisms with reinforcement learning (RL) paradigms to enhance resilience and efficiency in decentralized agents. The proposed framework leverages signal-driven triggering conditions to minimize communication overhead while ensuring stability under adversarial disruptions. A hybrid architecture combining adaptive control, observer-based estimation, and actor–critic reinforcement learning is developed to dynamically compensate for uncertainties, disturbances, and malicious signal manipulations.
The theoretical foundation of the proposed strategy is established through Lyapunov stability analysis, ensuring boundedness and convergence properties despite intermittent communication failures. Additionally, the framework incorporates memory-based event-triggering and predictive estimation to mitigate the effects of DoS attacks and packet losses. The integration of learning-based optimization enables agents to adaptively refine control policies in real-time, improving performance in uncertain and adversarial environments. Comparative analysis with existing resilient and event-triggered control approaches demonstrates that the proposed method achieves superior communication efficiency, robustness, and convergence speed.
Simulation-based evaluation reveals that the optimized strategy maintains consensus and tracking performance even under severe attack scenarios, outperforming traditional model-based and purely adaptive approaches. The results indicate a significant reduction in communication load without compromising system stability. This work contributes to the advancement of resilient decentralized control by bridging signal-driven control mechanisms with learning-based optimization, offering a scalable and robust solution for next-generation intelligent networked systems.
Keywords
References
Similar Articles
- Dr. Chinedu Okafor, Dr. Amina Bello, Cyclic Signal-Initiated Coordination in Probabilistic Decentralized Systems Subject to Varying Network Configurations , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Yacine Benali, Amel Rahmani, Digital Abstraction and Framework Improvement of Ecosystem-Based Cooperative Observation Mechanisms , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Marcus T. Feldman, RECONSTRUCTING TRUST IN RFID INFRASTRUCTURES: A COMPREHENSIVE ANALYSIS OF SECURITY, PRIVACY, AND AUTHENTICATION IN CONTEMPORARY RADIO FREQUENCY IDENTIFICATION SYSTEMS , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Dr. Aris Thorne, Generating Dual-Identity Face Impersonations with Generative Adversarial Networks: An Adversarial Attack Methodology , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Nourhan F. Abdelrahman, Miguel Torres, CRAFTING DUAL-IDENTITY FACE IMPERSONATIONS USING GENERATIVE ADVERSARIAL NETWORKS: AN ADVERSARIAL ATTACK METHODOLOGY , International Journal of Advanced Artificial Intelligence Research: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Rizky Pratama, Dinda Maharani, Computational Representation and Structural Enhancement of Nature-Derived Collective Monitoring Behaviors , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Mateo Alvarez, Integrative Perspectives On Identity, Authentication, And Privacy: From RFID Security Protocols To Facial Biometric Representations , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Leila K. Moreno, Integrated Real-Time Fraud Detection and Response: A Streaming Analytics Framework for Financial Transaction Security , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Ronak Jani, Automated Monitoring and Self-Healing Mechanisms in High-Availability Cloud Databases , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Anjali Kale, FX Hedging Algorithms for Crypto-Native Companies , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 10 (2025): Volume 02 Issue 10
You may also start an advanced similarity search for this article.