{"id":"https://openalex.org/W3015283911","doi":"https://doi.org/10.1109/tac.2020.2971994","title":"An Online Approach to Physical Watermark Design","display_name":"An Online Approach to Physical Watermark Design","publication_year":2020,"publication_date":"2020-04-08","ids":{"openalex":"https://openalex.org/W3015283911","doi":"https://doi.org/10.1109/tac.2020.2971994","mag":"3015283911"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2020.2971994","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tac.2020.2971994","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tac.2020.2971994","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101981450","display_name":"Hanxiao Liu","orcid":"https://orcid.org/0000-0002-9340-5503"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE","SG"],"is_corresponding":true,"raw_author_name":"Hanxiao Liu","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore","School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018443722","display_name":"Yilin Mo","orcid":"https://orcid.org/0000-0001-7937-6737"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yilin Mo","raw_affiliation_strings":["Department of Automation and BNRist, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation and BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101988438","display_name":"Jiaqi Yan","orcid":"https://orcid.org/0000-0003-2054-8033"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jiaqi Yan","raw_affiliation_strings":["School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365448","display_name":"Lihua Xie","orcid":"https://orcid.org/0000-0002-7137-4136"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Lihua Xie","raw_affiliation_strings":["School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113899791","display_name":"Karl H. ohansson","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Karl H. Johansson","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden","Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101981450"],"corresponding_institution_ids":["https://openalex.org/I172675005","https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":4.7437,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.95355382,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"65","issue":"9","first_page":"3895","last_page":"3902"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9700999855995178,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9343502521514893},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8668465614318848},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7273557186126709},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6807366609573364},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5630192160606384},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4587749242782593},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.420535683631897},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.41169074177742004},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3822222948074341},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3362433910369873},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2826223373413086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23007351160049438},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.16405728459358215},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1300664246082306},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10871750116348267}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9343502521514893},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8668465614318848},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7273557186126709},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6807366609573364},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5630192160606384},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4587749242782593},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.420535683631897},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.41169074177742004},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3822222948074341},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3362433910369873},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2826223373413086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23007351160049438},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.16405728459358215},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1300664246082306},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10871750116348267},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tac.2020.2971994","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tac.2020.2971994","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tac.2020.2971994","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tac.2020.2971994","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7642202141","display_name":null,"funder_award_id":"2018AAA0101601","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320322327","display_name":"Knut och Alice Wallenbergs Stiftelse","ror":"https://ror.org/004hzzk67"},{"id":"https://openalex.org/F4320322581","display_name":"Vetenskapsr\u00e5det","ror":"https://ror.org/03zttf063"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W83533993","https://openalex.org/W1534096605","https://openalex.org/W1549644356","https://openalex.org/W1578953027","https://openalex.org/W2003530067","https://openalex.org/W2004064031","https://openalex.org/W2004186751","https://openalex.org/W2030140501","https://openalex.org/W2032732517","https://openalex.org/W2036033662","https://openalex.org/W2039427951","https://openalex.org/W2045933510","https://openalex.org/W2064284013","https://openalex.org/W2068545576","https://openalex.org/W2105773843","https://openalex.org/W2131263964","https://openalex.org/W2153752231","https://openalex.org/W2161630727","https://openalex.org/W2499821671","https://openalex.org/W2549564909","https://openalex.org/W2555431798","https://openalex.org/W2579603034","https://openalex.org/W2754542527","https://openalex.org/W2766498015","https://openalex.org/W2963441278","https://openalex.org/W2963445270","https://openalex.org/W3015283911","https://openalex.org/W4240681401","https://openalex.org/W6658382951","https://openalex.org/W6666735270","https://openalex.org/W6770375648"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"This":[0],"article":[1],"considers":[2],"the":[3,24,27,49,57,73,95,124,129,134,147,150],"problem":[4,84],"of":[5,149],"designing":[6],"physical":[7,60],"watermark":[8,70,81],"signals":[9],"in":[10,18,53],"order":[11,54],"to":[12,34,55,71,93,114,128,145],"optimally":[13],"detect":[14,72],"possible":[15],"replay":[16,42,74],"attack":[17,43],"a":[19,41,65,69],"linear":[20],"time-invariant":[21],"system,":[22],"under":[23],"assumption":[25],"that":[26,123],"system":[28,109],"parameters":[29],"are":[30],"unknown":[31,119],"and":[32,101,108,132],"need":[33],"be":[35],"identified":[36],"online.":[37],"We":[38,121],"first":[39],"provide":[40],"model,":[44],"where":[45],"an":[46,88],"adversary":[47],"replays":[48],"previous":[50],"sensor":[51],"data":[52],"fool":[56],"system.":[58],"A":[59],"watermarking":[61,106],"scheme,":[62],"which":[63,91],"leverages":[64],"random":[66],"input":[67],"as":[68,87],"attack,":[75],"is":[76,85,112,143],"then":[77],"introduced.":[78],"The":[79],"optimal":[80,96,130],"signal":[82],"design":[83,107],"cast":[86],"optimization":[89],"problem,":[90],"aims":[92],"achieve":[94],"trade-off":[97],"between":[98],"control":[99],"performance":[100],"intrusion":[102],"detection.":[103],"An":[104,139],"online":[105],"identification":[110],"algorithm":[111,126],"provided":[113,144],"deal":[115],"with":[116,118],"systems":[117],"parameters.":[120],"prove":[122],"proposed":[125,151],"converges":[127],"one":[131],"characterize":[133],"almost":[135],"sure":[136],"convergence":[137],"rate.":[138],"industrial":[140],"process":[141],"example":[142],"illustrate":[146],"effectiveness":[148],"strategy.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
