{"id":"https://openalex.org/W3011301446","doi":"https://doi.org/10.1109/cdc40024.2019.9028878","title":"Resilient Control Design for Hybrid Systems against Switching and Data Injection Attacks","display_name":"Resilient Control Design for Hybrid Systems against Switching and Data Injection Attacks","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3011301446","doi":"https://doi.org/10.1109/cdc40024.2019.9028878","mag":"3011301446"},"language":"en","primary_location":{"id":"doi:10.1109/cdc40024.2019.9028878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc40024.2019.9028878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 58th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101897478","display_name":"Dawei Sun","orcid":"https://orcid.org/0000-0002-5937-3093"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dawei Sun","raw_affiliation_strings":["School of Aeronautics and Astronautics, Purdue University, West Lafayette, Indiana"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics and Astronautics, Purdue University, West Lafayette, Indiana","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079117845","display_name":"Inseok Hwang","orcid":"https://orcid.org/0000-0001-7847-9865"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Inseok Hwang","raw_affiliation_strings":["School of Aeronautics and Astronautics, Purdue University, West Lafayette, Indiana"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics and Astronautics, Purdue University, West Lafayette, Indiana","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101897478"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.1663,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.53335752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"100","issue":null,"first_page":"3854","last_page":"3859"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9550999999046326,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6616855263710022},{"id":"https://openalex.org/keywords/hybrid-system","display_name":"Hybrid system","score":0.6152052283287048},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5904611945152283},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5267781019210815},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.44163113832473755},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43912622332572937},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4150836169719696},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3840080499649048},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3367697298526764},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1420440673828125},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12762054800987244}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6616855263710022},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.6152052283287048},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5904611945152283},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5267781019210815},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.44163113832473755},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43912622332572937},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4150836169719696},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3840080499649048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3367697298526764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1420440673828125},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12762054800987244},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc40024.2019.9028878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc40024.2019.9028878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 58th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1527862143","https://openalex.org/W1557652964","https://openalex.org/W1770527767","https://openalex.org/W2016617706","https://openalex.org/W2030018074","https://openalex.org/W2077099824","https://openalex.org/W2131220052","https://openalex.org/W2152728520","https://openalex.org/W2158914121","https://openalex.org/W2288955300","https://openalex.org/W2519228559","https://openalex.org/W2568233590","https://openalex.org/W2569754130","https://openalex.org/W2670040239","https://openalex.org/W6631678612","https://openalex.org/W6679536036"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W1987127708","https://openalex.org/W2968885840","https://openalex.org/W3017360834","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2086962923","https://openalex.org/W3094048663"],"abstract_inverted_index":{"A":[0,84],"hybrid":[1,41,86,105,130],"systems":[2,14,42,48],"approach":[3],"is":[4,89,99,108],"a":[5,38],"powerful":[6],"tool":[7],"for":[8,22,54],"modeling":[9],"and":[10,67,116,134],"analysis":[11],"of":[12,40,81,95,128],"cyber-physical":[13],"(CPSs),":[15],"but":[16],"it":[17,51],"has":[18],"been":[19],"rarely":[20],"used":[21],"CPS":[23,33],"security":[24],"related":[25],"problems.":[26],"In":[27],"this":[28],"paper,":[29],"we":[30],"model":[31],"the":[32,56,61,68,75,82,93,102,112,118,122,125,129,135,140],"subject":[34],"to":[35,91,110],"cyber-attacks":[36],"as":[37],"class":[39],"called":[43],"hidden":[44],"mode":[45],"switched":[46],"linear":[47],"so":[49],"that":[50,59,101,124],"can":[52],"account":[53],"both":[55],"switching":[57,113,136],"attack":[58,72,114,119,137],"tampers":[60],"discrete":[62,126],"state":[63,77],"dynamics":[64,78],"(logical":[65],"behavior)":[66,80],"bounded":[69],"data":[70],"injection":[71],"which":[73],"compromises":[74],"continuous":[76],"(physical":[79],"CPS.":[83],"resilient":[85,104],"control":[87,106],"scheme":[88,107],"proposed":[90,103],"mitigate":[92],"impact":[94],"these":[96],"cyber-attacks.":[97],"It":[98],"shown":[100],"able":[109],"estimate":[111],"signal":[115,138],"guarantee":[117],"mitigation":[120],"under":[121],"assumptions":[123],"states":[127],"system":[131],"are":[132],"distinguishable":[133],"satisfies":[139],"average":[141],"dwell-time":[142],"condition.":[143]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
