{"id":"https://openalex.org/W2012005963","doi":"https://doi.org/10.1109/cdc.2013.6760746","title":"Optimal DoS attack policy against remote state estimation","display_name":"Optimal DoS attack policy against remote state estimation","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2012005963","doi":"https://doi.org/10.1109/cdc.2013.6760746","mag":"2012005963"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2013.6760746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2013.6760746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"52nd IEEE Conference on Decision and Control","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100373129","display_name":"Heng Zhang","orcid":"https://orcid.org/0000-0002-4201-3892"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Heng Zhang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101614359","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0001-9862-6391"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007329669","display_name":"Ling Shi","orcid":"https://orcid.org/0000-0002-6771-8258"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ling Shi","raw_affiliation_strings":["Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China","[Dept. of Electron. & Comput. Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong, China]"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]},{"raw_affiliation_string":"[Dept. of Electron. & Comput. Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong, China]","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, , China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100373129"],"corresponding_institution_ids":["https://openalex.org/I4391767838","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":12.719,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.98665321,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5444","last_page":"5449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7961845993995667},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.704211950302124},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5738535523414612},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5304222702980042},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4988372325897217},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4967806935310364},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.49305006861686707},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.48490720987319946},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4523247182369232},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.44353145360946655},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41962963342666626},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3629978895187378},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2009945809841156},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.18951085209846497},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14839890599250793},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11402767896652222},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09360611438751221}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7961845993995667},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.704211950302124},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5738535523414612},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5304222702980042},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4988372325897217},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4967806935310364},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.49305006861686707},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.48490720987319946},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4523247182369232},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.44353145360946655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41962963342666626},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3629978895187378},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2009945809841156},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.18951085209846497},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14839890599250793},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11402767896652222},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09360611438751221},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cdc.2013.6760746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2013.6760746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"52nd IEEE Conference on Decision and Control","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-61144","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-61144","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W207267598","https://openalex.org/W1571323288","https://openalex.org/W1972757409","https://openalex.org/W1976691309","https://openalex.org/W2002218489","https://openalex.org/W2007630898","https://openalex.org/W2009062638","https://openalex.org/W2011216472","https://openalex.org/W2012645343","https://openalex.org/W2034878739","https://openalex.org/W2043347416","https://openalex.org/W2065358316","https://openalex.org/W2076688207","https://openalex.org/W2105404622","https://openalex.org/W2107043025","https://openalex.org/W2107267079","https://openalex.org/W2117004652","https://openalex.org/W2124280970","https://openalex.org/W2124952412","https://openalex.org/W2146467316","https://openalex.org/W2158469273","https://openalex.org/W2555431798","https://openalex.org/W6608408474","https://openalex.org/W6644617990","https://openalex.org/W6678747588"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W1976205134","https://openalex.org/W4248336175","https://openalex.org/W3009369890","https://openalex.org/W2031260042","https://openalex.org/W2391445434","https://openalex.org/W3004173571","https://openalex.org/W4312490297"],"abstract_inverted_index":{"Security":[0],"of":[1,132],"Cyber-Physical":[2],"System":[3],"(CPS)":[4],"has":[5],"gained":[6],"increasing":[7],"attention":[8],"in":[9],"recent":[10],"years.":[11],"Most":[12],"existing":[13],"works":[14],"mainly":[15],"investigate":[16,28],"the":[17,21,30,40,53,79,92,98,113,119,130],"system":[18,41,88],"performance":[19,42,89],"given":[20,120],"attacking":[22,36],"patterns.":[23],"In":[24],"this":[25],"paper,":[26],"we":[27,51,103],"how":[29],"attacker":[31,74],"should":[32],"design":[33],"its":[34,59],"DoS":[35],"policy":[37],"so":[38],"that":[39],"can":[43],"be":[44],"deteriorated":[45],"as":[46,48],"much":[47],"possible.":[49],"Specifically,":[50],"consider":[52],"scenario":[54],"where":[55],"a":[56,62,66],"sensor":[57],"sends":[58],"data":[60],"to":[61,77,117,128],"remote":[63],"estimator":[64],"through":[65],"wireless":[67],"channel":[68,80],"for":[69],"state":[70],"estimation,":[71],"while":[72],"an":[73],"decides":[75],"whether":[76],"jam":[78],"at":[81],"each":[82],"sampling":[83],"time.":[84],"For":[85],"two":[86],"typical":[87],"indexes,":[90],"i.e.,":[91],"expected":[93,99],"average":[94],"estimation":[95,101],"error":[96],"and":[97],"terminal":[100],"error,":[102],"construct":[104],"optimal":[105,114],"attack":[106,115],"scheduling":[107],"schemes,":[108],"respectively.":[109],"We":[110],"also":[111],"propose":[112],"schedules":[116],"avoid":[118],"intruder":[121],"detection":[122],"mechanism.":[123],"Numerical":[124],"examples":[125],"are":[126],"presented":[127],"demonstrate":[129],"effectiveness":[131],"our":[133],"results.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
