2025 An Improved Topology Identification Methodof Complex Dynamical Networksonline
2025 An Improved Topology Identification Methodof Complex Dynamical Networksonline
net/publication/389989399
CITATIONS READS
0 91
5 authors, including:
Yi Zheng Xiaoqun Wu
Shenzhen University Shenzhen University
4 PUBLICATIONS 32 CITATIONS 176 PUBLICATIONS 5,540 CITATIONS
All content following this page was uploaded by Yi Zheng on 26 April 2025.
Abstract—Over the past decade, numerous synchronization- been made in the study of complex networks. Synchronization
based identification methods have been proposed to address the has yielded significant advances in multiple research direc-
challenge of identifying unknown network topologies. The linear tions, as a focal research topic in complex networks, including
independence condition (LIC) is an essential requirement in these
methods, however, there are issues with this condition. In this consensus [4], [5], [6], [7], [8], network synchronization [9],
article, we propose an improved LIC-free synchronization-based [10], [11], [12], [13], and finite- or fixed-time synchro-
identification method to address above issues. Specifically, a drive nization [14], [15], [16], [17] superdiffusion [18]. Network
network consisting of isolated nodes that satisfy specific condi- topology has a significant impact on the dynamic behavior of
tions is constructed, and the network containing an unknown complex networks [19], leading to the topology identification
topology is defined as the response network. Through the design
of appropriate controllers and update laws, the drive network of complex networks becoming a research hotspot [20], [21],
and the response network achieve synchronization, while the [22], [23], [24], [25], [26], [27].
estimation matrix accurately identifies the unknown topology A variety of methods have been proposed to identify
matrix. Our method is proven to be a generalized form of network topology, with the synchronization-based identifica-
the existing LIC-free identification methods. Furthermore, we tion method being the focus of this article. In 2008, Wu [28]
introduce a novel proof framework to theoretically demonstrate
the effectiveness of our method. Finally, two simulation examples presented a synchronization-based identification method to
demonstrate the effectiveness of the proposed method. obtain the network topology. Subsequently, several identifi-
cation methods based on generalized synchronization have
Index Terms—Complex networks, linear independence
condition (LIC), synchronization, topology identification. been proposed. In 2014, Zhang et al. [29] proposed an
identification method based on generalized synchronization.
In 2020, Wang et al. [30] identified the topology of complex
networks by constructing an auxiliary network to achieve
I. I NTRODUCTION generalized synchronization. Extensive literature has also been
OMPLEX networks are widely present in nature, such published on the topology identification of various types
C as epidemic networks [1], information networks [2], and
brain neural networks [3]. In recent years, advancements have
of networks, including fractional-order networks [31], [32],
multiplex networks [33], and networks with random perturba-
tions [34], [35].
Received 29 September 2024; revised 27 February 2025; accepted 28 The above methods share one similarity: the linear inde-
February 2025. Date of publication 19 March 2025; date of current version pendence condition (LIC) serves as an important condition
24 April 2025. This work was supported in part by the National Natural
Science Foundation of China under Grant 92267101 and Grant 62141604; to ensure successful identification. In recent years, several
in part by the Shenzhen Science and Technology Program under Grant methods that do not require the LIC have been proposed.
KJZD20240903100022028; and in part by the Startup Grant from Shenzhen In 2021, Zhu et al. [36] presented a LIC-free identifica-
University. This article was recommended by Associate Editor G. Zhu.
(Corresponding author: Xiaoqun Wu.) tion method based on a regulation mechanism. In 2022,
Yi Zheng is with the College of Computer Science and Software Liu et al. [33] proposed a LIC-free identification method
Engineering, Shenzhen University, Shenzhen 518060, China, and also with the for multilink complex networks via chaotic exosignals. In
College of Information and Communication, National University of Defense
Technology, Wuhan 430019, China (e-mail: [email protected]). 2022, Fan and Wu [37] focused on identifying the partial
Xiaoqun Wu is with the College of Computer Science and Software topology of simplicial complexes and provided a rigorous
Engineering, Shenzhen University, Shenzhen 518060, China (e-mail: xqwu@ definition for the first time. In 2024, Li and Shi [38] proposed a
whu.edu.cn).
Ziye Fan is with the College of Computer Science and Software synchronization-based topology identification method for mul-
Engineering, Shenzhen University, Shenzhen 518060, China, and also with tilink hypergraphs, along with a verifiable linear independence
the School of Mathematics and Statistics, Wuhan University, Wuhan 430072, definition.
China (e-mail: [email protected]).
Kebin Chen is with the College of Information and Communication, Most of the aforementioned studies rely on the LIC. Three
National University of Defense Technology, Wuhan 430019, China (e-mail: issues with the LIC need to be highlighted. First, the LIC
[email protected]). is an essential condition to ensure the success of most
Jinhu Lü is with the School of Automation Science and Electrical
Engineering, Beihang University, Beijing 100191, China, and also synchronization-based identification methods. However, the
with Zhongguancun Laboratory, Beijing 100094, China (e-mail: jhlu@ detailed explanation of the LIC is omitted. Second, although
iss.ac.cn). it has been previously observed that the LIC may be satisfied
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TCYB.2025.3547772. if nodes in a network exhibit distinct dynamics or the network
Digital Object Identifier 10.1109/TCYB.2025.3547772 is subject to random perturbations, there is still a lack of an
2168-2267
c 2025 IEEE. All rights reserved, including rights for text and data mining, and training of artificial intelligence
and similar technologies. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
2166 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 55, NO. 5, MAY 2025
effective approach to confirm whether a network satisfies the LIC-free methods have been proposed for identifying the
LIC. Third, global or partial synchronization of nodes in a topology of complex networks [33], [36]. The equations of
network has been reported to cause identification failure [39], an n-dimensional complex network, as described in [28], are
since the LIC does not hold. Therefore, the application scope represented as
of the synchronization-based identification method is limited
N
by the LIC. ẏi (t) = f i t, yi (t) + cij Hyj (t − τ (t)) (1)
Based on the aforementioned discussion, this article presents j=1
an improved identification method that addresses the above
three issues. In our method, the drive network consists of iso- where yi (t) ∈ Rn is the state vector, i = 1, 2, . . . , N. f i : R+ ×
lated nodes, and the network with unknown topology is used Rn → Rn represents the self-dynamics function. ∈ R+
as the response network. Synchronization between the two describes the coupling strength as a constant. C ∈ RN×N is the
networks is achieved by employing the proposed controllers unknown coupling matrix representing the network topology.
and update laws. Our method avoids the identification failure When i = j, if there is an edge connecting nodei to node j,
caused by network synchronization and does not require the then cij > 0, otherwise, cij = 0. Define cii = − N j=1 cij , i =
LIC. The main contributions are as follows. 1, 2, . . . , N. H ∈ RN×N represents the inner coupling matrix.
1) Our method does not require the LIC and its effec- τ (t) represents the transmission delay.
tiveness is guaranteed by a condition that is convenient In most synchronization-based identification meth-
to check. When the drive network satisfies a spe- ods [28], [29], [30], a network is constructed as follows:
cific assumption, the unknown topology matrix of
N
the response network will be successfully identified. ˙ŷ (t) = f t, ŷ (t) + ĉij (t)H ŷj (t − τ (t)) + ūi (t). (2)
i i i
Furthermore, this assumption explicitly states the con- j=1
ditions that the drive network should satisfy to ensure
successful identification. This aspect is not addressed in ŷi (t) ∈Rn is the state vector, ĉij (t) is the estimated value of
the synchronization-based identification methods based cij , ūi (t) = −di (t)ēi (t) is the controller used to synchronize
on LIC. network (1) and network (2), and ēi (t) = ŷi (t) − yi (t),
2) Our method exhibits a broader scope of effectiveness i = 1, 2, . . . , N. The update laws are designed as ĉ˙ ij (t) =
compared to existing synchronization-based identifica- −δij ē i (t)H ŷj (t − τ (t)), and ḋi (t) = ki ēi , i = 1, 2, . . . , N.
2
tion methods based on LIC. When existing identification Then, one has
methods fail, our method can still achieve successful
N
identification, as demonstrated in the provided numerical lim c̃ij (t)Hyj (t − τ (t)) = 0 (3)
examples. t→+∞
j=1
3) In [36], the condition for ensuring successful iden-
tification requires the functions to be periodic. Our where c̃ij (t) = ĉij (t)−cij , i, j = 1, 2, . . . , N. One indispensable
method extends the requirement of periodic functions condition to ensure successful identification is the LIC, as
to nonperiodic ones, which significantly broadens the described as follows.
applicability. Moreover, our method is demonstrated to Assumption 1 [33, Assumption 2]: (Linear Independence
be more general compared to existing LIC-free methods. Condition) Suppose that {Hyi (t − τ (t))}N i=1 are linearly inde-
This article is organized as follows. In Section II, some pendent on the outer synchronization manifold {yi (t) =
useful preliminaries are proposed. In Section III, the improved ŷi (t)}N
i=1 .
identification method is introduced. In Section IV, two simula- Based on Assumption 1, it can be concluded that
tion examples are presented. Section V concludes this article. lim ĉij (t) = cij , i, j = 1, 2, . . . , N. (4)
Appendix provides proofs of lemmas. t→+∞
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: IMPROVED TOPOLOGY IDENTIFICATION METHOD OF COMPLEX DYNAMICAL NETWORKS 2167
In addition, we add controllers to network (1) to obtain the If lim a(t) exists, ḣ2 (t) is bounded, and lim h1 (t) = 0,
t→+∞ t→+∞
following response network: then
N
lim ȧ(t) = 0.
ẏi (t) = f i t, yi (t) + cij Hyj (t − τ (t)) + ui (t) (6) t→+∞
j=1
Lemma 2: Suppose a(t) : R → R is a differentiable
where ui (t) is the controller to be designed, i = 1, 2, . . . , N. In function such that
the remainder of this article, network (5) is referred to as the
lim ȧ(t) = 0.
drive network, and network (6) is referred to as the response t→+∞
network. The main objective of this article is to identify the
unknown topology matrix C = (cij )N×N of network (6) by Then, for ∀ tn , tn ∈ [Tn , Tn+1 )
designing appropriate controllers and update laws.
lim a tn − a tn = 0
n→+∞
N, and matrix Bn ∈ RN×N , such that where gk (t) is defined in (5), and gk (t) satisfies |gk (t)| ≤ M,
M > 0, t ∈ [0, +∞), k = 1, 2, . . . , N. Then, for ∀ tn , tn ∈
|det(Bn )| > [Tn , Tn+1 )
where
N
⎛ ⎞ lim ak tn gk tn = 0
g1 tn1 g2 tn1 · · · gN tn1 n→+∞
k=1
⎜ g1 tn2 g2 tn2 · · · gN tn2 ⎟
⎜ ⎟
⎜ .. .. .. .. ⎟ with {Tn } defined in Assumption 2.
⎜ . . ⎟
⎜ . . ⎟ Lemma 4: Suppose Assumption 2 holds. Let ak (t) : R → R
Gn = ⎜ g1 tN g2 tN · · · gN tN ⎟ (7)
⎜ n n n ⎟ be a differentiable function such that
⎜ .. .. .. .. ⎟
⎜ . . . . ⎟
⎝ ⎠ lim ȧk (t) = 0
g1 tnN1 g2 tnN1 · · · gN tnN1 t→+∞
and
with gk (t) defined in (5), k = 1, 2, . . . , N, and is a positive
constant. The matrix Bn consists of N row vectors from Gn or
N
lim ak (t)gk (t) = 0
N row vectors of the matrix resulting from several row sum t→+∞
k=1
transformations over Gn .
Assumption 3 [36, Assumption 2]: Let τ (t) be a differen- where gk is defined in (5), k = 1, 2, . . . , N. Then
tiable function satisfying lim τ̇ (t) ≤ ξ < 1, where ξ is a
t→+∞ lim ak (t) = 0, k = 1, 2, . . . , N. (9)
constant. t→+∞
Assumption 4: Nonlinear functions f i satisfy
Lemma 5: Suppose Assumptions 2–3 hold. Let ak (t) : R →
f i (t, y(t)) − f i (t, x(t)) ≤ Ly(t) − x(t). R be a differentiable function such that
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
2168 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 55, NO. 5, MAY 2025
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: IMPROVED TOPOLOGY IDENTIFICATION METHOD OF COMPLEX DYNAMICAL NETWORKS 2169
Considering (24), (25) and c̃ij (t) is bounded, one gets Remark 1: In 2021, Zhu et al. [36, Assumption 3] proposed
that gk (t) in network (5) satisfies the following condi-
N (p) (p)
tion. Suppose that there exist t1 , . . . , tp ∈ [0, T), p =
lim c̃ij (t)Hyj (t − τ (t)) 1, 2, . . . , N, satisfying
t→+∞
j=1
p
N
(p) δp = 0, k = p
= lim c̃ij (t)H xj (t − τ (t)) − ej (t − τ (t)) gk tl =
t→+∞ 0, 1≤k<p
j=1 l=1
N
where T is the common period of gk (t). Note that the
= lim c̃ij (t)Hvgj (t − τ (t)) = 0. (p) (p)
t→+∞ number of time points t1 , . . . , tp ∈ [0, T), p = 1, 2, . . . , N,
j=1
is [N(N + 1)/2]. Set Tn = nT, and based on the above
Notice that Hv = 0, then assumption, one obtains the following matrix:
⎛ ⎞
N
g1 t1(1) g2 t1(1) g3 t1(1) · · · gN t1(1)
lim c̃ij (t)gj (t − τ (t)) = 0. (26) ⎜ ⎟
t→+∞ ⎜ g t(2) g t(2) g t(2) · · · g t(2) ⎟
j=1 ⎜ 1 1 2 1 3 1 N 1 ⎟
⎜ ⎟
⎜ g t(2) g t(2) g t(2) · · · g t(2) ⎟
Since c̃ij (t) = ĉij (t) − cij , (21) indicates ⎜ 1 2 2 2 3 2 N 2 ⎟
⎜ ⎟
⎜ g t(3) g t(3) g t(3) · · · g t(3) ⎟
⎜ 1 1 2 1 3 1 N 1 ⎟
lim c̃˙ ij (t) = 0. (27) ⎜
⎜ .. .. .. .
⎟
⎟
t→+∞ ⎜ . . . ⎟.
⎜ . . . . . ⎟
⎜ (N) (N) (N) (N) ⎟
According to Assumption 2, Assumption 3, (26), (27), and ⎜ g1 t1 g2 t1 g3 t1 · · · gN t1 ⎟
Lemma 5, one has ⎜ ⎟
⎜ (N) (N) (N) (N) ⎟
⎜ g1 t2 g2 t2 g3 t2 · · · gN t2 ⎟
⎜ ⎟
lim c̃ij (t) = lim ĉij (t) − cij = 0. (28) ⎜ . . . . ⎟
t→+∞ t→+∞ ⎜ .. .. .. .. ⎟
⎝ ⎠
(N) (N) (N) (N)
Therefore, (28) indicates that the unknown topology matrix C g1 tN g2 tN g3 tN · · · gN tN
is successfully identified by the estimation matrix Ĉ(t).
Theorem 2: Suppose Assumptions 3 and 4 hold, and For the above matrix, add the rows after the (i(i − 1) + 2)/2th
row to the (i(i − 1) + 2)/2th row, i = 1, 2, . . . , N. Then, one
gk (t) = sin 2k−1 t , k = 1, 2, . . . , N. obtains
⎛ ⎞
δ1 ∗ ∗ ··· ∗
Then, the estimation matrix Ĉ(t) = (ĉij (t))N×N will asymptot- ⎜ 0 δ2 ∗ ··· ∗ ⎟
⎜ ⎟
ically approach the unknown topology matrix of the response ⎜ g t(2) g t(2) g t(2) · · · g t(2) ⎟
⎜ 1 2 2 2 3 2 N 2 ⎟
network (6) under the action of the drive network (5), con- ⎜ ⎟
⎜ 0 0 δ · · · ∗ ⎟
trollers (13), and update laws (16). ⎜ 3 ⎟
Proof: There exist time points ti = π/2i ∈ [0, 2π ), i = ⎜ .. .. .. . .. .
.. ⎟
⎜ . . . ⎟
1, 2, . . . , N, such that | det(G) |> 1/2, where GN = ⎜ ⎟
⎜ 0 0 0 · · · δ ⎟
⎜ N ⎟
⎛ ⎞ ⎜ (N) (N) (N) (N) ⎟
g1 (t1 ) g2 (t1 ) g3 (t1 ) · · · gN (t1 ) ⎜ g1 t2 g2 t2 g3 t2 · · · gN t2 ⎟
⎜ g1 (t2 ) g2 (t2 ) g3 (t2 ) · · · gN (t2 ) ⎟ ⎜ ⎟
⎜ ⎟ ⎜ . . . . ⎟
⎜ .. .. .. .. ⎟
⎜ ⎟ ⎝ ⎠
G = ⎜ g1 (t3 ) g2 (t3 ) g3 (t3 ) · · · gN (t3 ) ⎟ (N) (N) (N) (N)
⎜ .. .. .. . .. .. ⎟
. g1 tN g2 tN g3 tN · · · gN tN
⎝ . . . ⎠
g1 (tN ) g2 (tN ) g3 (tN ) · · · gN (tN ) where ∗ represents a constant that does not affect the sub-
⎛ ⎞
1 0 0 ··· 0 sequent derivations. Notice that the N rows of matrix GN
⎜∗ 1 0 ··· 0⎟ containing δi = 0, i = 1, 2, . . . , N, can form the matrix
⎜ ⎟
⎜ ⎟
= ⎜∗ ∗ 1 ··· 0⎟ ⎛ ⎞
⎜ .. .. .. . . .. ⎟ δ1 ∗ ∗ · · · ∗
⎝. . . . .⎠ ⎜ 0 δ2 ∗ · · · ∗ ⎟
∗ ∗ ∗ ··· 1 ⎜ ⎟
BN = ⎜ . . . . .. ⎟
. .
⎝ . . . . . ⎠. .
where ∗ represents a constant that does not affect the sub- 0 0 0 · · · δN
sequent derivations. Notice that 2π is the common period of
gk (t), k = 1, 2, . . . , N. Set Tn = 2nπ , tni = π/2i + Tn ∈ such that |det(BN )| > , where is a positive constant.
(p) (p)
[Tn , Tn+1 ), i = 1, 2, . . . , N, and then Assumption 2 holds. This indicates that there exist time points t1 , . . . , tp ∈
From Theorem 1, one gets [Tn , Tn+1 ), p = 1, 2, . . . , N, satisfying |det(BN )| > , where
BN is composed of N row vectors of matrix GN . Therefore,
lim ĉij (t) = cij , i, j = 1, 2, . . . , N. [36, Assumption 3] is a special case of Assumption 2.
t→+∞
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
2170 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 55, NO. 5, MAY 2025
-1
-2
-3
-4
0 1 2 3 4 5 6 7 8 9 10
t
Fig. 1. Identification result of network (29) based on Theorem 2: The Fig. 3. Identification result of network (29) based on the method in [28]: Time
evolution of the off-diagonal elements ĉij (t), i = 1, 2, . . . , 6, i = j. Fig. 1 evolution of first-row elements ĉ1i (t), i = 1, 2, . . . , 6. Fig. 3 indicates that the
indicates that the estimated values tend to be the true values. This indicates estimated values do not tend to the true values, which means identification
that the estimated values tend to be the true values. failure.
1
1
0
0
-1
-1
-2
-2
-3
-4 -3
-5 -4
-6
0 5 10 15 20 -5
0 1 2 3 4 5 6 7 8 9 10
t
t
Fig. 2. Identification result of network (29) based on Theorem 2: The Fig. 4. Identification result of network (29) based on the method in [28]: Time
evolution of diagonal elements ĉii (t), i = 1, 2, . . . , 6. Fig. 2 indicates that the evolution of diagonal elements ĉii (t), i = 1, 2, . . . , 6. Fig. 4 indicates that the
estimated values tend to be the true values. This indicates that the estimated estimated values do not tend to the true values, which means identification
values tend to be the true values. failure.
IV. N UMERICAL S IMULATIONS The initial states are set as yi (0) = (1 + 0.2i, 2 + 0.3i, 3 +
In the following two examples, consider the following 0.4i) , di (0) = 10, and ĉij (0) = 0, i, j = 1, 2, . . . , 6. Other
network: parameters are taken as ki = 10, = 100, and δij = 0.01,
6 i, j = 1, 2, . . . , 6.
ẏi (t) = f i t, yi (t) + cij Hyj (t − τ (t)) (29) Example 2: Based on the method in [28], the following
j=1 network is obtained:
where i = 1, 2, . . . , 6, H = I3 , τ (t) = 0.2, and
6
⎛ ⎞ ˙ŷ (t) = f t, ŷ (t) + ĉij (t)H ŷj (t − τ (t)) − di (t)ei (t)
−5 1 1 1 1 1 i i i
⎜ 1 −5 1 1 1 1 ⎟ j=1
⎜ ⎟
⎜ 1 1 −5 1 1 1 ⎟
C=⎜ ⎟ with ei (t) = ŷi (t) − yi (t), ĉ˙ ij (t) = −δij ei (t)H ŷj (t − τ (t)),
⎜ 1 1 1 −5 1 1 ⎟.
⎜ ⎟ and ḋi (t) = ki ei 2 , i = 1, 2, . . . , 6. The same node dynamics
⎝ 1 1 1 1 −5 1 ⎠
and fully connected mode might lead to identification failure.
1 1 1 1 1 −5
Figs. 3 and 4 show that the estimated value curves do not
The dynamics of all nodes are defined as f i (t, w) = −w, where converge to the true values, indicating that the identification
w ∈ R3 . It is certain that Assumptions 3 and 4 hold. method in [28] has failed. Therefore, the identification method
Example 1: Based on Theorem 2, C will be identified, and presented in this article is demonstrated to be superior.
the numerical results are shown in Figs. 1 and 2. Example 1 The initial states are set as yi (0) = (1 + 0.2i, 2 + 0.3i, 3 +
verifies the validity of our method. 0.4i) , ŷi (0) = (3 + 0.1i, 2 + 0.4i, 1 + 0.6i) , di (0) = 10, and
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: IMPROVED TOPOLOGY IDENTIFICATION METHOD OF COMPLEX DYNAMICAL NETWORKS 2171
ĉij (0) = 1, i, j = 1, 2, . . . , 6. Other parameters are taken as when Tn > T 2 , tn ∈ [Tn , Tn+1 ). Since
ki = 1, = 1, and δij = 1, i, j = 1, 2, . . . , 6.
lim ȧk (t) = 0
t→+∞
V. C ONCLUSION and ak (t) is a differentiable function, k = 1, 2, . . . , N, from
We propose an improved identification method, based on Lemma 2, one obtains
existing identification methods, that does not require the linear
lim ak tn − ak tn = 0, k = 1, 2, . . . , N
independence condition (LIC). In this article, we introduce an n→+∞
assumption satisfied by the drive network to ensure successful
for ∀ tn , tn ∈ [Tn , Tn+1 ). For ε/2MN > 0, ∃ T 3 > 0 ∀ Tn > T 3
identification and prove that our method is a generalized
such that
form of existing methods. Discovering additional function ε
sequences that satisfy Assumption 2 is an open and chal- ak tn − ak tn < , k = 1, 2, . . . , N. (32)
lenging problem. Numerical examples show that our method 2MN
can accurately identify the unknown topology matrix of com- For the ε/2 in (31) and ε/2MN in (32), ∃ T 4 = max{T 2 , T 3 }
plex networks, even the identification method based on LIC such that
fails. This work provides a theoretical method for identifying
N
unknown parameters in networks, including power grids, a t g t
k n k n
circuit systems, neural networks, and other systems. Existing k=1
synchronization-based identification methods primarily use
N
analog signals, whereas digital signals are more commonly
= ak tn − ak tn + ak tn gk tn
used in real-world applications. Therefore, extending this k=1
N
method to discrete systems is a significant work. N
≤
ak tn − ak tn gk tn + ak tn gk tn
A PPENDIX k=1 k=1
ε ε
Proof of Lemma 2: When tn = tn , one has < MN +
2MN 2
= ε.
a tn − a tn = 0.
∀ Tn > T 4 , ∀ tn , tn ∈ [Tn , Tn+1 ). Then one has
When tn = tn , without loss of generality, let tn < tn ∈
[Tn , Tn+1 ), one has
N
lim ak tn gk tn = 0
n→+∞
|a tn − a tn | = |ȧ(ξ ) tn − tn | < |ȧ(ξ )|Tmax k=1
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
2172 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 55, NO. 5, MAY 2025
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: IMPROVED TOPOLOGY IDENTIFICATION METHOD OF COMPLEX DYNAMICAL NETWORKS 2173
[25] H. J. Van Waarde, P. Tesi, and M. K. Camlibel, “Topology reconstruction Xiaoqun Wu (Member, IEEE) received the B.Sc.
of dynamical networks via constrained Lyapunov equations,” IEEE degree in applied mathematics and the Ph.D.
Trans. Autom. Control, vol. 64, no. 10, pp. 4300–4306, Oct. 2019. degree in computational mathematics from Wuhan
[26] Z. Fan, X. Wu, B. Mao, and J. Lü, “Output discernibility of topological University, Wuhan, China, in 2000 and 2005,
variations in linear dynamical networks,” IEEE Trans. Autom. Control, respectively.
vol. 69, no. 8, pp. 5524–5530, Aug. 2024. She currently serves as a Distinguished Professor
[27] Y. Zang, Z. Fan, Z. Wang, Y. Zheng, L. Ding, and X. Wu, “Stepwise with the College of Computer Science and Software
reconstruction of higher-order networks from dynamics,” Chaos, Engineering, Shenzhen University, Shenzhen, China.
Interdiscip. J. Nonlin. Sci., vol. 34, no. 7, 2024, Art. no. 73156. Prior to this, she was a Professor with the School
[28] X. Wu, “Synchronization-based topology identification of weighted of Mathematics and Statistics, Wuhan University,
general complex dynamical networks with time-varying coupling and held several visiting positions in Hong Kong,
delay,” Physica A, Stat. Mech. Appl., vol. 387, no. 4, pp. 997–1008, Australia, and USA. Her current research interests include parameter identi-
2008. fication and control of networked systems. She has published over 140 SCI
[29] S. Zhang, X. Wu, J.-A. Lu, H. Feng, and J. Lü, “Recovering structures journal papers in these areas.
of complex dynamical networks based on generalized outer synchro- Prof. Wu was a recipient of the Second Prize of the Natural Science Award
nization,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 61, no. 11, from the Hubei Province, China, in 2006, the First Prize of the Natural
pp. 3216–3224, Nov. 2014. Science Award from the Ministry of Education of China in 2007, and the
[30] Y. Wang, X. Wu, J. Lü, J.-A. Lu, and R. M. D’Souza, “Topology First Prize of the Natural Science Award from the Hubei Province, China, in
identification in two-layer complex dynamical networks,” IEEE Trans. 2013. In 2017, she was awarded the 14th Chinese Young Women Scientists
Netw. Sci. Eng., vol. 7, no. 1, pp. 538–548, Jan.–Mar. 2020. Fellowship and the Natural Science Fund for Distinguished Young Scholars
[31] Y. Zheng, X. Wu, G. He, and W. Wang, “Topology identification of of Hubei Province. She has been serving as an Associate Editor for IEEE
fractional-order complex dynamical networks based on auxiliary-system T RANSACTIONS ON C IRCUITS AND S YSTEMS II: E XPRESS B RIEFS since
approach,” Chaos, Interdiscip. J. Nonlin. Sci., vol. 31, no. 4, 2021, 2018.
Art. no. 43125.
[32] Y. Zheng, X. Wu, Z. Fan, and W. Wang, “Identifying topol-
ogy and system parameters of fractional-order complex dynamical
networks,” Appl. Math. Comput., vol. 414, Feb. 2022, Art. no. 126666. Ziye Fan received the B.Sc. degree in applied
[33] H. Liu, Y. Li, Z. Li, J. Lü, and J.-A. Lu, “Topology identification of mul- mathematics from Wuhan University, Wuhan, China,
tilink complex dynamical networks via adaptive observers incorporating in 2021, where she is currently pursuing the Ph.D.
chaotic exosignals,” IEEE Trans. Cybern., vol. 52, no. 7, pp. 6255–6268, degree in applied mathematics with the School of
Jul. 2022. Mathematics and Statistics.
[34] X. Wu, X. Zhao, J. Lü, L. Tang, and J.-A. Lu, “Identifying topologies Her current research interests include complex
of complex dynamical networks with stochastic perturbations,” IEEE networks and nonlinear systems.
Trans. Control Netw. Syst., vol. 3, no. 4, pp. 379–389, Dec. 2016.
[35] X. Wei, S. Chen, J.-A. Lu, and D. Ning, “Reconstruction of complex
networks with delays and noise perturbation based on generalized outer
synchronization,” J. Phys. A, Math. Theor., vol. 49, no. 22, 2016,
Art. no. 225101.
[36] S. Zhu, J. Zhou, G. Chen, and J.-A. Lu, “A new method for topology Kebin Chen was born in Turpan, Xinjiang, China,
identification of complex dynamical networks,” IEEE Trans. Cybern., in 1987. He received the B.S. and M.S. degrees from
vol. 51, no. 4, pp. 2224–2231, Apr. 2021. Xi’an Jiaotong University, Xi’an, China, in 2011 and
[37] Z. Fan and X. Wu, “Identifying partial topology of simplicial com- 2013, respectively, and the Ph.D. degree from the
plexes,” Chaos, Interdiscip. J. Nonlin. Sci., vol. 32, no. 11, 2022, National University of Defense Technology, Wuhan,
Art. no. 113128. China, in 2022.
[38] K. Li and C. Shi, “Synchronization-based topology identification of He is currently a Lecturer with the National
multilink hypergraphs: A verifiable linear independence,” Nonlin. Dyn., University of Defense Technology. His research
vol. 112, no. 4, pp. 2781–2794, 2024. interests include combat system-of-systems,
[39] L. Tang, J.-A. Lu, X. Wu, and J. Lü, “Impact of node dynamics parame- complex networks and systems engineering.
ters on topology identification of complex dynamical networks,” Nonlin.
Dyn., vol. 73, no. 1, pp. 1081–1097, 2013.
[40] G. Tao, “A simple alternative to the barbalat lemma,” IEEE Trans.
Autom. Control, vol. 42, no. 5, p. 698, May 1997.
Jinhu Lü (Fellow, IEEE) received the Ph.D.
degree in applied mathematics from the Academy
of Mathematics and Systems Science, Chinese
Academy of Sciences, Beijing, China, in 2002.
He was a Professor with RMIT University,
Melbourne, VIC, Australia, and a Visiting Fellow
with Princeton University, Princeton, NJ, USA. He
is currently a Vice President of Scientific Research
with Beihang University, Beijing. He is/was the
Yi Zheng received the B.Sc. degree in mathemat- Chief Scientist of the National Key Research and
ics and applied mathematics and the M.Sc. degree Development Program of China and the Leading
in quantitative ecology from the Department of Scientist of the Innovative Research Groups, National Natural Science
Mathematics, Shihezi University, Shihezi, China, Foundation of China. His current research interests include cooperation
in 2013 and 2018, respectively, and the Ph.D. control, industrial Internet, complex networks, and big data.
degree in applied mathematics from the School Prof. Lü was a recipient of the prestigious Ho Leung Ho Lee Foundation
of Mathematics and Statistics, Wuhan University, Award in 2015, the National Innovation Competition Award in 2020, the
Wuhan, China, in 2022. State Natural Science Award three times from the Chinese Government
From October 2022 to May 2024, he served as in 2008, 2012, and 2016, respectively, the Australian Research Council
a Lecturer with the College of Information and Future Fellowships Award in 2009, the National Natural Science Fund for
Communication, National University of Defense Distinguished Young Scholars Award, and the Highly Cited Researcher Award
Technology, Wuhan. Since July 2024, he serves as a Postdoctoral Researcher in engineering from 2014 to 2020, and 2022 to 2024. He was the General
with the College of Computer Science and Software Engineering, Shenzhen Co-Chair of the 43rd Annual Conference of the IEEE Industrial Electronics
University, Shenzhen, China. He received the China National Scholarship for Society in 2017. He is/was an Editor in various ranks for 16 SCI journals,
graduate students in 2021. His current research interests include complex including the Co-Editor-in-Chief of IEEE T RANSACTIONS ON I NDUSTRIAL
networks and nonlinear systems. I NFORMATICS. He is the Fellow of CAA/ORSC/CICC/CSIAM.
Authorized licensed use limited to: SHENZHEN UNIVERSITY. Downloaded on April 25,2025 at 03:09:16 UTC from IEEE Xplore. Restrictions apply.