{"id":"https://openalex.org/W4388516492","doi":"https://doi.org/10.1109/fuzz52849.2023.10309687","title":"A Control and Attack Detection Scheme for Fuzzy Systems Against Cyber-Attacks","display_name":"A Control and Attack Detection Scheme for Fuzzy Systems Against Cyber-Attacks","publication_year":2023,"publication_date":"2023-08-13","ids":{"openalex":"https://openalex.org/W4388516492","doi":"https://doi.org/10.1109/fuzz52849.2023.10309687"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz52849.2023.10309687","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/fuzz52849.2023.10309687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Fuzzy Systems (FUZZ)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101949481","display_name":"Haili Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haili Zhang","raw_affiliation_strings":["School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083"],"affiliations":[{"raw_affiliation_string":"School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100318915","display_name":"Linlin Li","orcid":"https://orcid.org/0000-0002-6387-6013"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linlin Li","raw_affiliation_strings":["School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083"],"affiliations":[{"raw_affiliation_string":"School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051341757","display_name":"Liang Qiao","orcid":"https://orcid.org/0000-0001-6595-8330"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Qiao","raw_affiliation_strings":["School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083","Shunde Graduate School of University of Science and Technology, Beijing, Foshan, China"],"affiliations":[{"raw_affiliation_string":"School of Automation and Electrical Engineering, University of Science and Technology Beijing,Beijing,P. R. China,100083","institution_ids":["https://openalex.org/I92403157"]},{"raw_affiliation_string":"Shunde Graduate School of University of Science and Technology, Beijing, Foshan, China","institution_ids":["https://openalex.org/I92403157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101949481"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":0.3763,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60585606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7352243661880493},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7070571780204773},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6987788677215576},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6212234497070312},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.6109103560447693},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.5873813033103943},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5478595495223999},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5055756568908691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4743151366710663},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4640921950340271},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4441830813884735},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33144089579582214},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2122194468975067},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1761641800403595},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10924869775772095},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07714954018592834}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7352243661880493},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7070571780204773},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6987788677215576},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6212234497070312},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.6109103560447693},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.5873813033103943},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5478595495223999},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5055756568908691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4743151366710663},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4640921950340271},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4441830813884735},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33144089579582214},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2122194468975067},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1761641800403595},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10924869775772095},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07714954018592834},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz52849.2023.10309687","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/fuzz52849.2023.10309687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Fuzzy Systems (FUZZ)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[{"id":"https://openalex.org/G3964296626","display_name":null,"funder_award_id":"62073029,U21A20483","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W108857541","https://openalex.org/W1972523481","https://openalex.org/W2030366021","https://openalex.org/W2034288387","https://openalex.org/W2036033662","https://openalex.org/W2048099096","https://openalex.org/W2079325629","https://openalex.org/W2105773843","https://openalex.org/W2112094106","https://openalex.org/W2344474403","https://openalex.org/W2555431798","https://openalex.org/W2561007209","https://openalex.org/W2568479698","https://openalex.org/W2762155482","https://openalex.org/W2907299225","https://openalex.org/W2912709719","https://openalex.org/W2967073369","https://openalex.org/W2984987324","https://openalex.org/W3011506053","https://openalex.org/W3095090516","https://openalex.org/W3113030340","https://openalex.org/W3135689018","https://openalex.org/W3145170335"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W4385452087","https://openalex.org/W4321484089","https://openalex.org/W2296060994","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045","https://openalex.org/W3123953333"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,15,25,33,58,64,69,95,112],"detection":[4,47,83,113],"of":[5,18,36,89,114],"cyber-attacks":[6,65],"on":[7,86],"fuzzy":[8,26,50],"systems":[9,13,27,31,51],"in":[10,62,94],"cyber":[11,29],"physical":[12,30],"under":[14,28],"unified":[16],"framework":[17],"control":[19,44,90,97],"and":[20,32,45,76,91,110],"detection.":[21],"To":[22],"this":[23],"end,":[24],"different":[34],"types":[35],"spoofing":[37],"attacks":[38],"are":[39],"first":[40],"introduced.":[41],"Then,":[42],"a":[43,82],"attack":[46],"scheme":[48,84],"for":[49],"is":[52,99],"presented.":[53],"The":[54],"essential":[55],"idea":[56],"behind":[57],"proposed":[59],"approach":[60],"lies":[61],"detecting":[63],"structurally":[66],"by":[67],"expanding":[68],"residual":[70,74,78],"space":[71],"using":[72],"observer-based":[73],"signals":[75,93],"control-based":[77],"signals.":[79],"In":[80],"addition,":[81],"based":[85],"encrypted":[87],"transmissions":[88],"monitoring":[92],"feedback":[96],"system":[98,108],"proposed,":[100],"which":[101],"can":[102],"effectively":[103],"prevent":[104],"attackers":[105],"from":[106],"stealing":[107],"information":[109],"achieve":[111],"cyber-attacks.":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
