{"id":"https://openalex.org/W2292194201","doi":"https://doi.org/10.1109/cdc.2015.7403297","title":"Event-based attack against remote state estimation","display_name":"Event-based attack against remote state estimation","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2292194201","doi":"https://doi.org/10.1109/cdc.2015.7403297","mag":"2292194201"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2015.7403297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2015.7403297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 54th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021161169","display_name":"Yifei Qi","orcid":"https://orcid.org/0000-0001-9524-1306"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifei Qi","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007329669","display_name":"Ling Shi","orcid":"https://orcid.org/0000-0002-6771-8258"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ling Shi","raw_affiliation_strings":["Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021161169"],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":3.0293,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.91983712,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"6844","last_page":"6849"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7483707666397095},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6199194192886353},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5339651703834534},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5177509188652039},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5153626799583435},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5049732327461243},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.49629074335098267},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.48315852880477905},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4618171155452728},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.46153080463409424},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.455191045999527},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29136431217193604},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.19989854097366333},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10402581095695496},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10006022453308105}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7483707666397095},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6199194192886353},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5339651703834534},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5177509188652039},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5153626799583435},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5049732327461243},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.49629074335098267},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.48315852880477905},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4618171155452728},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.46153080463409424},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.455191045999527},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29136431217193604},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.19989854097366333},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10402581095695496},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10006022453308105},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cdc.2015.7403297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2015.7403297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 54th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-77013","is_oa":false,"landing_page_url":"http://www.scopus.com/record/display.url?eid=2-s2.0-84961999151&origin=inward","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1651728063","https://openalex.org/W1832495378","https://openalex.org/W1967617924","https://openalex.org/W1967900990","https://openalex.org/W1992200270","https://openalex.org/W1995810576","https://openalex.org/W2003530067","https://openalex.org/W2036033662","https://openalex.org/W2063688797","https://openalex.org/W2087186321","https://openalex.org/W2115656617","https://openalex.org/W2117450598","https://openalex.org/W2125794835","https://openalex.org/W2127949150","https://openalex.org/W2142126316","https://openalex.org/W2164522996","https://openalex.org/W2340384825","https://openalex.org/W2399578978","https://openalex.org/W4230516584","https://openalex.org/W6712931043"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W3017360834","https://openalex.org/W2008822734","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2086962923","https://openalex.org/W3094048663"],"abstract_inverted_index":{"Security":[0],"issues":[1],"in":[2,10,100],"Cyber-Physical":[3],"Systems":[4],"(CPS)":[5],"have":[6],"gained":[7],"increasing":[8],"attention":[9],"recent":[11],"years":[12],"due":[13],"to":[14,19,60,108],"the":[15,49,52,62,78,84,88,91,95,110],"vulnerability":[16],"of":[17,51],"CPS":[18],"cyber":[20],"attack.":[21],"This":[22],"paper":[23],"focuses":[24],"on":[25],"designing":[26],"an":[27,56],"intelligent":[28],"online":[29],"attack,":[30],"which":[31],"can":[32],"compromise":[33],"a":[34,101],"sensor,":[35],"eavesdrop":[36],"measurements":[37],"and":[38,94],"inject":[39],"false":[40],"feedback":[41],"in-":[42],"formation,":[43],"against":[44],"remote":[45],"state":[46],"estimation.":[47],"From":[48],"viewpoint":[50],"attacker,":[53],"we":[54],"design":[55],"event-based":[57],"attack":[58,92],"strategy":[59],"degrade":[61],"estimation":[63,75],"quality":[64],"with":[65],"arbitrary":[66],"communication":[67],"rate":[68],"constraint.":[69],"The":[70],"approximate":[71],"minimum":[72],"mean-squared":[73],"error":[74],"algorithm":[76],"at":[77],"attacker":[79],"side":[80],"is":[81,98],"derived":[82],"under":[83],"Gaussian":[85],"assumption.":[86],"Furthermore,":[87],"relation":[89],"between":[90],"threshold":[93,97],"scheduling":[96],"obtained":[99],"closed":[102],"form.":[103],"Two":[104],"examples":[105],"are":[106],"provided":[107],"demonstrate":[109],"main":[111],"results.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
