{"id":"https://openalex.org/W7116799164","doi":"https://doi.org/10.1109/jiot.2025.3647159","title":"Distributed Estimation Under DoS Attacks for Multisubsystems With Local Constraints","display_name":"Distributed Estimation Under DoS Attacks for Multisubsystems With Local Constraints","publication_year":2025,"publication_date":"2025-12-22","ids":{"openalex":"https://openalex.org/W7116799164","doi":"https://doi.org/10.1109/jiot.2025.3647159"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3647159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3647159","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120982294","display_name":"Yang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I198091727","display_name":"Tiangong University","ror":"https://ror.org/00xsr9m91","country_code":"CN","type":"education","lineage":["https://openalex.org/I198091727"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Xu","raw_affiliation_strings":["School of Aeronautics and Astronautics, Tiangong University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics and Astronautics, Tiangong University, Tianjin, China","institution_ids":["https://openalex.org/I198091727"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121021148","display_name":"Xiaohui Hao","orcid":null},"institutions":[{"id":"https://openalex.org/I198091727","display_name":"Tiangong University","ror":"https://ror.org/00xsr9m91","country_code":"CN","type":"education","lineage":["https://openalex.org/I198091727"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Hao","raw_affiliation_strings":["School of Artificial Intelligence, Tiangong University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Tiangong University, Tianjin, China","institution_ids":["https://openalex.org/I198091727"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108944685","display_name":"Shun Liu","orcid":"https://orcid.org/0009-0007-5240-9114"},"institutions":[{"id":"https://openalex.org/I135714990","display_name":"North University of China","ror":"https://ror.org/047bp1713","country_code":"CN","type":"education","lineage":["https://openalex.org/I135714990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shun Liu","raw_affiliation_strings":["School of Electrical and Control Engineering, North University of China, Taiyuan, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Control Engineering, North University of China, Taiyuan, China","institution_ids":["https://openalex.org/I135714990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120982294"],"corresponding_institution_ids":["https://openalex.org/I198091727"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67741566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"6","first_page":"11403","last_page":"11411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.30160000920295715,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.30160000920295715,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.2766000032424927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.1039000004529953,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.67330002784729},{"id":"https://openalex.org/keywords/iterative-method","display_name":"Iterative method","score":0.6180999875068665},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6014999747276306},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5877000093460083},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4535999894142151},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.4462999999523163},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.3962000012397766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7662000060081482},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.67330002784729},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.6180999875068665},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6014999747276306},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5877000093460083},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4535999894142151},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.4462999999523163},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4187999963760376},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.38510000705718994},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.37929999828338623},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.3635999858379364},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35510000586509705},{"id":"https://openalex.org/C117898588","wikidata":"https://www.wikidata.org/wiki/Q6664310","display_name":"Local convergence","level":3,"score":0.33500000834465027},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.3140999972820282},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26570001244544983},{"id":"https://openalex.org/C137471899","wikidata":"https://www.wikidata.org/wiki/Q11381","display_name":"Local area network","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3647159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3647159","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2277973662","https://openalex.org/W2920215781","https://openalex.org/W3009123393","https://openalex.org/W3086203063","https://openalex.org/W3086318900","https://openalex.org/W3109979584","https://openalex.org/W3163025752","https://openalex.org/W3166960559","https://openalex.org/W4226529642","https://openalex.org/W4285116354","https://openalex.org/W4312420621","https://openalex.org/W4312497719","https://openalex.org/W4317987750","https://openalex.org/W4384787858","https://openalex.org/W4385521789","https://openalex.org/W4386412366","https://openalex.org/W4386453523","https://openalex.org/W4388053012","https://openalex.org/W4388579716","https://openalex.org/W4388666519","https://openalex.org/W4400446922","https://openalex.org/W4402263370","https://openalex.org/W4405269789","https://openalex.org/W4405597823","https://openalex.org/W4405600361","https://openalex.org/W4408609260","https://openalex.org/W4409426205","https://openalex.org/W4410394440","https://openalex.org/W4410640220","https://openalex.org/W4411408937"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,36,51,62,65,88,99,103,111,119,124,127,131,134],"distributed":[4,30,77,120,135],"estimation":[5,79,112],"problem":[6],"is":[7,32,81,91,114],"addressed":[8],"for":[9,68],"multi-subsystem":[10],"with":[11],"DoS":[12,72,84],"attacks":[13,49],"and":[14,29,98,116,130],"local":[15,18,100],"constraints.":[16],"The":[17,41],"constraint":[19,37],"between":[20,54],"neighboring":[21,55],"modes":[22],"are":[23,106,138],"only":[24],"known":[25],"to":[26,34,60,108],"each":[27,39],"subsystem":[28],"iteration":[31,69],"performed":[33],"satisfy":[35],"of":[38,46,64,126,133],"node.":[40],"attacker":[42],"can":[43],"launch":[44],"denial":[45],"service":[47],"(DoS)":[48],"on":[50,94],"communication":[52],"channel":[53],"nodes,":[56],"making":[57],"it":[58],"impossible":[59],"receive":[61],"estimates":[63,97,129],"neighbor":[66],"node":[67],"when":[70],"a":[71,76,141],"attack":[73],"occurs.":[74],"Hence,":[75],"iterative":[78,121,136],"scheme":[80],"constructed":[82],"under":[83],"attacks,":[85],"in":[86,118],"which":[87],"compensation":[89,128],"estimate":[90],"designed":[92],"based":[93],"its":[95],"own":[96],"constraint.":[101],"Then":[102],"convergence":[104,132],"conditions":[105],"derived":[107],"ensure":[109],"that":[110],"error":[113],"monotonic":[115],"non-increasing":[117],"process.":[122],"Finally,":[123],"validity":[125],"updates":[137],"demonstrated":[139],"by":[140],"collaborative":[142],"navigation":[143],"example.":[144]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-12-22T00:00:00"}
