{"id":"https://openalex.org/W4414198595","doi":"https://doi.org/10.1109/dac63849.2025.11133183","title":"Query-Based Black-Box Stealthy Sensor Attacks on Cyber-Physical Systems","display_name":"Query-Based Black-Box Stealthy Sensor Attacks on Cyber-Physical Systems","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4414198595","doi":"https://doi.org/10.1109/dac63849.2025.11133183"},"language":"en","primary_location":{"id":"doi:10.1109/dac63849.2025.11133183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11133183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108999535","display_name":"Shixiong Jiang","orcid":"https://orcid.org/0009-0004-9137-2359"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shixiong Jiang","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109000033","display_name":"Weizhe Xu","orcid":"https://orcid.org/0000-0003-2466-0241"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weizhe Xu","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100761835","display_name":"Mengyu Liu","orcid":"https://orcid.org/0000-0002-3532-9506"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengyu Liu","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108999536","display_name":"Fanxin Kong","orcid":"https://orcid.org/0000-0001-6488-3488"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fanxin Kong","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108999535"],"corresponding_institution_ids":["https://openalex.org/I107639228"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30032526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.95169997215271,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9355999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6144000291824341},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.40939998626708984},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.40630000829696655},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.37529999017715454},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.2784000039100647}],"concepts":[{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6144000291824341},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5608000159263611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45329999923706055},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.45320001244544983},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.40939998626708984},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.40630000829696655},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.37529999017715454},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2793999910354614},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac63849.2025.11133183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11133183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1995810576","https://openalex.org/W2010973666","https://openalex.org/W2044725736","https://openalex.org/W2146694142","https://openalex.org/W2155589794","https://openalex.org/W2554640547","https://openalex.org/W2555431798","https://openalex.org/W2963516826","https://openalex.org/W2963896562","https://openalex.org/W2970672945","https://openalex.org/W3046285926","https://openalex.org/W3091226474","https://openalex.org/W3134772926","https://openalex.org/W3181836960","https://openalex.org/W3200969900","https://openalex.org/W4242738563","https://openalex.org/W4249116379","https://openalex.org/W4312199044"],"related_works":[],"abstract_inverted_index":{"We":[0],"study":[1],"the":[2,20,26,48,51,62,68,77,82,85,90,95,108,111,127,155,158],"vulnerability":[3],"of":[4,25,50,110,157],"Cyber-physical":[5],"systems":[6],"(CPS)":[7],"under":[8,35],"stealthy":[9,31,103,136],"sensor":[10,32,52,64],"attacks":[11],"in":[12,46],"black-box":[13,102],"scenarios.":[14],"\u201cBlack-box\u201d":[15],"refers":[16],"to":[17,67,106,125,130],"scenarios":[18],"where":[19],"attacker":[21],"has":[22,38,122],"minimal":[23],"knowledge":[24],"target":[27],"system.":[28],"Designing":[29],"a":[30,100,131,151],"attack":[33,65,78,91,104,137],"sequence":[34,66,138],"this":[36],"scenario":[37],"two":[39],"main":[40],"challenges.":[41],"The":[42,70,135],"first":[43],"one":[44,72],"lies":[45],"ensuring":[47],"stealthiness":[49,75,115],"attack,":[53],"meaning":[54],"does":[55],"not":[56],"trigger":[57],"an":[58,118],"alert":[59],"when":[60,88],"applying":[61],"generated":[63,141],"CPS.":[69,112],"second":[71],"is":[73,139],"maintaining":[74],"throughout":[76],"generation":[79],"process,":[80],"indicating":[81],"limitation":[83],"on":[84,146],"alarm":[86],"frequency":[87],"generating":[89],"sequence.":[92],"To":[93,113],"address":[94],"above":[96],"challenges,":[97],"we":[98],"develop":[99],"querybased":[101],"framework":[105],"violate":[107],"safety":[109],"maintain":[114],"during":[116],"training,":[117],"active":[119],"learning":[120],"method":[121],"been":[123],"introduced":[124],"extract":[126],"detector\u2019s":[128],"information":[129],"time":[132],"series":[133],"model.":[134,144],"then":[140],"from":[142],"that":[143],"Experiments":[145],"four":[147],"numerical":[148],"simulations":[149],"and":[150],"high-fidelity":[152],"simulator":[153],"demonstrate":[154],"effectiveness":[156],"proposed":[159],"framework.":[160]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
