iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.AUTOMATICA.2019.108545
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T05:10:45Z","timestamp":1723266645175},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61603331","61773131","61673351","U1509217"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP170102644"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Automatica"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/j.automatica.2019.108545","type":"journal-article","created":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T05:44:07Z","timestamp":1566798247000},"page":"108545","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":27,"special_numbering":"C","title":["Attack and estimator design for multi-sensor systems with undetectable adversary"],"prefix":"10.1016","volume":"109","author":[{"given":"Haiyu","family":"Song","sequence":"first","affiliation":[]},{"given":"Peng","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Cheng-Chew","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Wen-An","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.automatica.2019.108545_b1","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1109\/TAC.2017.2766759","article-title":"Secure state estimation against sparse sensor attacks with adaptive switching mechanism","volume":"63","author":"An","year":"2018","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"12","key":"10.1016\/j.automatica.2019.108545_b2","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.1109\/TAC.2017.2714903","article-title":"On Kalman filtering with compromised sensors: Attack stealthiness and performance bounds","volume":"62","author":"Bai","year":"2017","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.1016\/j.automatica.2019.108545_b3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.automatica.2017.04.047","article-title":"Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs","volume":"82","author":"Bai","year":"2017","journal-title":"Automatica"},{"key":"10.1016\/j.automatica.2019.108545_b4","series-title":"Linear matrix inequalities in system and control theory, Vol. 15","author":"Boyd","year":"1994"},{"key":"10.1016\/j.automatica.2019.108545_b5","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.automatica.2018.10.025","article-title":"Distributed kalman filtering for time-varying discrete sequential systems","volume":"99","author":"Chen","year":"2019","journal-title":"Automatica"},{"key":"10.1016\/j.automatica.2019.108545_b6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.automatica.2016.12.026","article-title":"Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks","volume":"78","author":"Ding","year":"2017","journal-title":"Automatica"},{"issue":"5","key":"10.1016\/j.automatica.2019.108545_b7","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TCYB.2016.2544062","article-title":"Distributed secure coordinated control for multiagent systems under strategic attacks","volume":"47","author":"Feng","year":"2017","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"4","key":"10.1016\/j.automatica.2019.108545_b8","first-page":"1511","article-title":"Fault detection for time-delayed networked control systems with sensor saturation and randomly occurring faults","volume":"14","author":"Gao","year":"2018","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"1","key":"10.1016\/j.automatica.2019.108545_b9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCNS.2016.2570003","article-title":"Optimal linear cyber-attack on remote state estimation","volume":"4","author":"Guo","year":"2017","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"10.1016\/j.automatica.2019.108545_b10","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.automatica.2017.11.018","article-title":"Worst-case stealthy innovation-based linear attack on remote state estimation","volume":"89","author":"Guo","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.automatica.2019.108545_b11","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.inffus.2016.01.001","article-title":"Estimation, filtering and fusion for networked systems with network-induced phenomena: New progress and prospects","volume":"31","author":"Hu","year":"2016","journal-title":"Information Fusion"},{"key":"10.1016\/j.automatica.2019.108545_b12","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.automatica.2017.09.028","article-title":"State estimation under false data injection attacks: Security analysis and system protection","volume":"87","author":"Hu","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.automatica.2019.108545_b13","series-title":"Linear estimation","author":"Kailath","year":"2000"},{"issue":"1","key":"10.1016\/j.automatica.2019.108545_b14","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1464420.1464426","article-title":"Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols","volume":"5","author":"Law","year":"2009","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"1","key":"10.1016\/j.automatica.2019.108545_b15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber\u2013physical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/j.automatica.2019.108545_b16","series-title":"SCS 2010 : First workshop on secure control systems","article-title":"False data injection attacks in control systems","author":"Mo","year":"2010"},{"issue":"11","key":"10.1016\/j.automatica.2019.108545_b17","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","article-title":"Attack detection and identification in cyber-physical systems","volume":"58","author":"Pasqualetti","year":"2013","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"10.1016\/j.automatica.2019.108545_b18","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCS.2009.935569","article-title":"Kalman filtering in wireless sensor networks","volume":"30","author":"Ribeiro","year":"2010","journal-title":"IEEE Control Systems"},{"key":"10.1016\/j.automatica.2019.108545_b19","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2018.2865238","article-title":"Distributed H\u221e estimation in sensor networks with two-channel stochastic attacks","author":"Song","year":"2018","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.automatica.2019.108545_b20","series-title":"Proceedings of the 1st international conference on high confidence networked systems","first-page":"55","article-title":"Attack models and scenarios for networked control systems","author":"Teixeira","year":"2012"},{"issue":"2","key":"10.1016\/j.automatica.2019.108545_b21","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/78.485915","article-title":"Robust discrete-time minimum-variance filtering","volume":"44","author":"Theodor","year":"1996","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1","key":"10.1016\/j.automatica.2019.108545_b22","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1080\/002071799221370","article-title":"Robust filter design with time-varying parameter uncertainty and error variance constraints","volume":"72","author":"Wang","year":"1999","journal-title":"International Journal of Control"},{"issue":"6","key":"10.1016\/j.automatica.2019.108545_b23","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/0005-1098(76)90041-8","article-title":"A survey of design methods for failure detection in dynamic systems","volume":"12","author":"Willsky","year":"1976","journal-title":"Automatica"},{"issue":"11","key":"10.1016\/j.automatica.2019.108545_b24","doi-asserted-by":"crossref","first-page":"3023","DOI":"10.1109\/TAC.2015.2409905","article-title":"Optimal denial-of-service attack scheduling with energy constraint","volume":"60","author":"Zhang","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"4","key":"10.1016\/j.automatica.2019.108545_b25","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/TCYB.2018.2806387","article-title":"Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack","volume":"49","author":"Zhang","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.automatica.2019.108545_b26","first-page":"1","article-title":"Dissipative filtering for switched fuzzy systems with missing measurements","author":"Zhang","year":"2019","journal-title":"IEEE Transactions on Cybernetics"}],"container-title":["Automatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109819304066?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0005109819304066?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T03:41:49Z","timestamp":1569296509000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0005109819304066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":26,"alternative-id":["S0005109819304066"],"URL":"https:\/\/doi.org\/10.1016\/j.automatica.2019.108545","relation":{},"ISSN":["0005-1098"],"issn-type":[{"value":"0005-1098","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Attack and estimator design for multi-sensor systems with undetectable adversary","name":"articletitle","label":"Article Title"},{"value":"Automatica","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.automatica.2019.108545","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108545"}}