{"id":"https://openalex.org/W4402448709","doi":"https://doi.org/10.1109/lcsys.2024.3457851","title":"Byzantine Attack Resilient Bounded Consensus","display_name":"Byzantine Attack Resilient Bounded Consensus","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4402448709","doi":"https://doi.org/10.1109/lcsys.2024.3457851"},"language":"en","primary_location":{"id":"doi:10.1109/lcsys.2024.3457851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcsys.2024.3457851","pdf_url":null,"source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108983673","display_name":"Jinxin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinxin Miao","raw_affiliation_strings":["School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101756099","display_name":"Zhenqian Wang","orcid":"https://orcid.org/0000-0002-0037-2635"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenqian Wang","raw_affiliation_strings":["School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078316510","display_name":"Xiwang Dong","orcid":"https://orcid.org/0000-0002-4778-248X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiwang Dong","raw_affiliation_strings":["School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037713727","display_name":"Zhiqiang Zuo","orcid":"https://orcid.org/0000-0002-4566-7488"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Zuo","raw_affiliation_strings":["Tianjin Key Laboratory of Process Measurement and Control, School of Electrical and Information Engineering, Tianjin University, Tianjin, China","School of Electrical and Information Engineering, Tianjin Key Laboratory of Process Measurement and Control, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Process Measurement and Control, School of Electrical and Information Engineering, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"School of Electrical and Information Engineering, Tianjin Key Laboratory of Process Measurement and Control, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027725400","display_name":"Jinhu L\u00fc","orcid":"https://orcid.org/0000-0003-0275-8387"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhu L\u00fc","raw_affiliation_strings":["National Key Laboratory of Multi-perch Vehicle Driving Systems, Beijing, China","School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Multi-perch Vehicle Driving Systems, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108983673"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.698,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7206121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"8","issue":null,"first_page":"2211","last_page":"2216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.6304363012313843},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.6118241548538208},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5724937915802002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41620680689811707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.370061993598938},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2662367522716522},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.13906541466712952},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.12278097867965698},{"id":"https://openalex.org/keywords/ancient-history","display_name":"Ancient history","score":0.11731216311454773},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.04810535907745361}],"concepts":[{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.6304363012313843},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6118241548538208},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5724937915802002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41620680689811707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.370061993598938},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2662367522716522},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.13906541466712952},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.12278097867965698},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.11731216311454773},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.04810535907745361},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcsys.2024.3457851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcsys.2024.3457851","pdf_url":null,"source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.8399999737739563,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1421732175","display_name":null,"funder_award_id":"62103029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1973184571","https://openalex.org/W2010107859","https://openalex.org/W2014772227","https://openalex.org/W2025375132","https://openalex.org/W2027741263","https://openalex.org/W2100953052","https://openalex.org/W2126906505","https://openalex.org/W2146890818","https://openalex.org/W2156938767","https://openalex.org/W2266148951","https://openalex.org/W2559853601","https://openalex.org/W2899962524","https://openalex.org/W2912784757","https://openalex.org/W2962851675","https://openalex.org/W3006548771","https://openalex.org/W3045690307","https://openalex.org/W3141776272","https://openalex.org/W3158723136","https://openalex.org/W3181996048","https://openalex.org/W4294690762","https://openalex.org/W4365790401"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W635625959","https://openalex.org/W1548189724","https://openalex.org/W4242769984","https://openalex.org/W2034320198","https://openalex.org/W4252331942","https://openalex.org/W4386477301","https://openalex.org/W4220997590","https://openalex.org/W2763042189"],"abstract_inverted_index":{"Average":[0],"consensus":[1,25,48,55,80,97,102,116,153],"is":[2,26,82,119,146],"a":[3,94,106],"cornerstone":[4],"of":[5,73,126,130,158],"distributed":[6,13],"systems,":[7],"facilitating":[8],"essential":[9],"functionalities":[10],"such":[11],"as":[12,35],"information":[14],"fusion,":[15],"decision-making,":[16],"and":[17,33,68,118],"decentralized":[18],"control.":[19],"However,":[20],"achieving":[21],"the":[22,54,62,66,79,101,113,123,131,136,144,147,156,162,175],"exact":[23,114],"average":[24,115],"challenging":[27],"when":[28,85,155],"partial":[29],"nodes":[30],"are":[31,171],"compromised":[32],"act":[34],"Byzantine":[36,58,137,159],"attackers":[37,160],"by":[38,65,122,135],"transmitting":[39],"malicious":[40],"messages":[41],"using":[42],"judiciously":[43],"crafted":[44],"patterns.":[45],"Existing":[46],"resilient":[47,96,152],"results":[49],"can":[50,167],"only":[51],"guarantee":[52],"that":[53,99,143],"value":[56,81,103,117],"under":[57,150],"attacks":[59],"remains":[60],"within":[61,105],"range":[63],"defined":[64],"maximum":[67,163],"minimum":[69],"initial":[70,124],"state":[71],"values":[72],"all":[74],"legitimate":[75,127],"nodes.":[76],"In":[77,89],"addition,":[78],"highly":[83],"uncertain":[84],"attack":[86,132],"strategies":[87,133],"change.":[88],"this":[90],"letter,":[91],"we":[92,141],"propose":[93],"new":[95],"algorithm":[98,154,166],"ensures":[100],"falls":[104],"much":[107],"tighter":[108],"bound.":[109],"The":[110],"bound":[111,145],"contains":[112],"solely":[120],"determined":[121],"states":[125],"nodes,":[128],"regardless":[129],"employed":[134],"attackers.":[138],"More":[139],"interestingly,":[140],"demonstrate":[142],"tightest":[148],"achievable":[149],"our":[151,165],"number":[157],"reaches":[161],"threshold":[164],"handle.":[168],"Numerical":[169],"simulations":[170],"given":[172],"to":[173],"validate":[174],"theoretical":[176],"results.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
