{"id":"https://openalex.org/W1931921331","doi":"https://doi.org/10.1109/etfa.2015.7301498","title":"LQG control under Denial-of-Service attacks: An experimental study","display_name":"LQG control under Denial-of-Service attacks: An experimental study","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W1931921331","doi":"https://doi.org/10.1109/etfa.2015.7301498","mag":"1931921331"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2015.7301498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2015.7301498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 20th Conference on Emerging Technologies &amp; Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030653833","display_name":"Haiding Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiding Tang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074902615","display_name":"Zhouzheng Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhouzheng Lu","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101597497","display_name":"Lifu Zhang","orcid":"https://orcid.org/0009-0007-1381-4790"},"institutions":[{"id":"https://openalex.org/I4210144709","display_name":"Wenzhou Polytechnic","ror":"https://ror.org/05h1ry383","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210144709"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lifu Zhang","raw_affiliation_strings":["Wenzhou Vocational & Technical College","Wenzhou Vocational & Technical College, China"],"affiliations":[{"raw_affiliation_string":"Wenzhou Vocational & Technical College","institution_ids":["https://openalex.org/I4210144709"]},{"raw_affiliation_string":"Wenzhou Vocational & Technical College, China","institution_ids":["https://openalex.org/I4210144709"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101771826","display_name":"Yang Chen","orcid":"https://orcid.org/0000-0001-9024-3900"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I4391767838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China 310027","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030653833"],"corresponding_institution_ids":["https://openalex.org/I4391767838","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.0098,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78994501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7326909899711609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6859350800514221},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6833771467208862},{"id":"https://openalex.org/keywords/linear-quadratic-gaussian-control","display_name":"Linear-quadratic-Gaussian control","score":0.5997791290283203},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5719786286354065},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5318205952644348},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5287280082702637},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5130206942558289},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.45788446068763733},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43798452615737915},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4208752512931824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4026884436607361},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.28635281324386597},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12032333016395569}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7326909899711609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6859350800514221},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6833771467208862},{"id":"https://openalex.org/C204495892","wikidata":"https://www.wikidata.org/wiki/Q1798304","display_name":"Linear-quadratic-Gaussian control","level":3,"score":0.5997791290283203},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5719786286354065},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5318205952644348},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5287280082702637},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5130206942558289},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.45788446068763733},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43798452615737915},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4208752512931824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4026884436607361},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.28635281324386597},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12032333016395569},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2015.7301498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2015.7301498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 20th Conference on Emerging Technologies &amp; Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1571323288","https://openalex.org/W1572298868","https://openalex.org/W1979193778","https://openalex.org/W1988084557","https://openalex.org/W1998960699","https://openalex.org/W2009062638","https://openalex.org/W2009257627","https://openalex.org/W2012005963","https://openalex.org/W2013295224","https://openalex.org/W2014586226","https://openalex.org/W2016617706","https://openalex.org/W2022406843","https://openalex.org/W2034878739","https://openalex.org/W2052912377","https://openalex.org/W2063688797","https://openalex.org/W2084549379","https://openalex.org/W2107043025","https://openalex.org/W2114456964","https://openalex.org/W2117450598","https://openalex.org/W2153517355","https://openalex.org/W2163318603","https://openalex.org/W2399578978","https://openalex.org/W2555431798","https://openalex.org/W6712931043"],"related_works":["https://openalex.org/W2801712179","https://openalex.org/W3045882672","https://openalex.org/W4313315695","https://openalex.org/W4211070069","https://openalex.org/W2560615025","https://openalex.org/W2995805091","https://openalex.org/W2064946300","https://openalex.org/W3198833577","https://openalex.org/W3010964467","https://openalex.org/W2082942584"],"abstract_inverted_index":{"Recently,":[0],"the":[1,10,13,18,21,25,40,47,61,77,130,140,148],"industrial":[2,73],"wireless":[3,26,72,125],"protocols":[4],"have":[5,35],"been":[6,36],"widely":[7],"used":[8],"around":[9],"world.":[11],"However,":[12],"unreliable":[14],"communication":[15,120],"media":[16],"between":[17],"sensors":[19],"and":[20,88,92,119,136],"central":[22],"controller":[23,118],"renders":[24],"signal":[27],"channel":[28],"vulnerable":[29],"to":[30,38],"many":[31],"attacks.":[32],"Various":[33],"efforts":[34],"devoted":[37],"study":[39],"influence":[41],"of":[42,49,71,79,114,142],"specific":[43],"malicious":[44],"attacks":[45,127],"from":[46,76],"aspect":[48],"theoretical":[50],"investigation":[51],"based":[52,101],"on":[53,59,68,102,147],"different":[54,143],"assumptions.":[55],"This":[56],"paper":[57],"focuses":[58],"verifying":[60],"optimal":[62,94],"Denial-of-Service":[63],"(DoS)":[64],"jamming":[65],"attack":[66,90,96,145],"strategy":[67],"a":[69,108],"class":[70],"control":[74,85,100,150],"system":[75,86,151],"view":[78],"experiments.":[80],"We":[81,122],"first":[82],"introduce":[83],"typical":[84],"model":[87],"DoS":[89,95,126,144],"model,":[91],"an":[93,153],"schedule":[97],"against":[98],"LQG":[99,149],"these":[103],"models.":[104],"Then,":[105],"we":[106,138],"establish":[107],"semi-physical":[109],"security":[110],"testbed":[111],"which":[112],"consists":[113],"virtual":[115],"plant,":[116],"physical":[117],"process.":[121],"also":[123],"realize":[124],"by":[128],"exploiting":[129],"USRP":[131],"device.":[132],"Through":[133],"extensive":[134],"experiments":[135],"analysis,":[137],"investigate":[139],"performance":[141],"strategies":[146],"over":[152],"inverted":[154],"pendulum.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
