{"id":"https://openalex.org/W4293704343","doi":"https://doi.org/10.1109/tac.2022.3202981","title":"Deception Attacks on Remote Estimation with Disclosure and Disruption Resources","display_name":"Deception Attacks on Remote Estimation with Disclosure and Disruption Resources","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4293704343","doi":"https://doi.org/10.1109/tac.2022.3202981"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2022.3202981","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2022.3202981","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003724643","display_name":"Yuzhe Li","orcid":"https://orcid.org/0000-0001-8645-7201"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuzhe Li","raw_affiliation_strings":["State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021495563","display_name":"Yake Yang","orcid":"https://orcid.org/0000-0002-9674-3604"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yake Yang","raw_affiliation_strings":["State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020893567","display_name":"Zhengen Zhao","orcid":"https://orcid.org/0000-0003-2630-9690"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengen Zhao","raw_affiliation_strings":["College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101404280","display_name":"Jing Zhou","orcid":"https://orcid.org/0000-0001-6522-1662"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jing Zhou","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064495710","display_name":"Daniel E. Quevedo","orcid":"https://orcid.org/0000-0002-4804-5481"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Daniel E. Quevedo","raw_affiliation_strings":["Queensland University of Technology (QUT), Brisbane, Australia"],"affiliations":[{"raw_affiliation_string":"Queensland University of Technology (QUT), Brisbane, Australia","institution_ids":["https://openalex.org/I160993911"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003724643"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":4.3713,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.94910941,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6896041035652161},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.6521868705749512},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6265007257461548},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.574158787727356},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4793584942817688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45870932936668396},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.42361894249916077},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39202791452407837},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.33754870295524597},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2827875018119812},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2514153718948364},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1815485656261444},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.146109938621521},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12904536724090576},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09994173049926758}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6896041035652161},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.6521868705749512},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6265007257461548},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.574158787727356},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4793584942817688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45870932936668396},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.42361894249916077},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39202791452407837},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.33754870295524597},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2827875018119812},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2514153718948364},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1815485656261444},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.146109938621521},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12904536724090576},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09994173049926758},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tac.2022.3202981","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2022.3202981","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G3560416450","display_name":null,"funder_award_id":"XLYC1907087","funder_id":"https://openalex.org/F4320329895","funder_display_name":"Liaoning Revitalization Talents Program"},{"id":"https://openalex.org/G5846804139","display_name":null,"funder_award_id":"61890924","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5898287775","display_name":null,"funder_award_id":"61991404","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8485664366","display_name":null,"funder_award_id":"62003161","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329895","display_name":"Liaoning Revitalization Talents Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1571323288","https://openalex.org/W1676537883","https://openalex.org/W1972523481","https://openalex.org/W2062132646","https://openalex.org/W2076688207","https://openalex.org/W2107043025","https://openalex.org/W2146467316","https://openalex.org/W2402911760","https://openalex.org/W2555431798","https://openalex.org/W2568479698","https://openalex.org/W2784198128","https://openalex.org/W2901117815","https://openalex.org/W2921750014","https://openalex.org/W2921895982","https://openalex.org/W2943560396","https://openalex.org/W2961536906","https://openalex.org/W2962834492","https://openalex.org/W2963890529","https://openalex.org/W2963896562","https://openalex.org/W2979346274","https://openalex.org/W2982793363","https://openalex.org/W2984195658","https://openalex.org/W3031524275","https://openalex.org/W3038428857","https://openalex.org/W3084091524","https://openalex.org/W3096297167","https://openalex.org/W3107270903","https://openalex.org/W3118961736","https://openalex.org/W3138139098","https://openalex.org/W3150809681","https://openalex.org/W3155614243","https://openalex.org/W3216371148"],"related_works":["https://openalex.org/W4377226466","https://openalex.org/W2386317283","https://openalex.org/W3035021360","https://openalex.org/W2909062875","https://openalex.org/W2980461345","https://openalex.org/W2030140501","https://openalex.org/W2371820339","https://openalex.org/W769785222","https://openalex.org/W2293786371","https://openalex.org/W2091999583"],"abstract_inverted_index":{"The":[0,107],"problem":[1],"of":[2,15,29,59,64,67,73,109,126,168],"deception":[3,130],"attacks":[4,119],"utilizing":[5],"both":[6],"disclosure":[7,65],"and":[8,33,39,70,89,146,159],"disruption":[9,71],"resources":[10,66,72],"in":[11,24],"the":[12,56,86,91,114,118,127,142,166],"multiple":[13],"types":[14],"sensors":[16,69],"setting":[17],"against":[18],"remote":[19,44,115],"state":[20],"estimation":[21,92,110,133],"is":[22,81,120,136],"investigated":[23],"this":[25],"paper.":[26],"A":[27],"group":[28],"sensors,":[30],"including":[31],"reliable":[32,68],"unreliable":[34,60,74],"ones,":[35,75],"measure":[36],"system":[37],"states":[38],"transmit":[40],"innovations":[41],"to":[42,164],"a":[43,51,76,123],"fusion":[45],"center":[46],"via":[47],"wireless":[48],"channels,":[49],"wherein":[50],"malicious":[52],"attacker":[53],"can":[54,84,103],"modify":[55],"data":[57],"packets":[58],"sensors.":[61],"By":[62],"virtue":[63],"stealthy":[77],"linear":[78,129],"attack":[79,101,131,144],"strategy":[80],"given,":[82],"which":[83,99],"deceive":[85],"anomaly":[87],"detectors":[88],"degrade":[90],"performance.":[93],"We":[94],"obtain":[95],"feasible":[96],"criteria":[97],"under":[98,117],"such":[100],"policies":[102],"bypass":[104],"existing":[105],"detectors.":[106],"evolution":[108],"error":[111,134],"covariance":[112,135],"at":[113],"end":[116],"analyzed.":[121],"Then,":[122],"closed-form":[124],"expression":[125],"optimal":[128],"maximizing":[132],"derived.":[137],"Moreover,":[138],"extended":[139],"results":[140],"on":[141],"designed":[143],"strategies":[145],"attackers":[147],"with":[148,157],"extra":[149],"measurements":[150],"are":[151,162],"provided.":[152],"Finally,":[153],"two":[154],"illustrative":[155],"examples":[156],"stable":[158],"unstable":[160],"processes":[161],"given":[163],"verify":[165],"effectiveness":[167],"proposed":[169],"methods.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":9}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
