{"id":"https://openalex.org/W4376456760","doi":"https://doi.org/10.1109/tac.2023.3274792","title":"Trust-Based Distributed Secure State Estimation Against Malicious Agents via Two-Hop Communication","display_name":"Trust-Based Distributed Secure State Estimation Against Malicious Agents via Two-Hop Communication","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4376456760","doi":"https://doi.org/10.1109/tac.2023.3274792"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2023.3274792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2023.3274792","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100775763","display_name":"Rui Gao","orcid":"https://orcid.org/0000-0003-4020-7631"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui Gao","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]},{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["CN","SA"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","Department of Electrical and Computer Engineering Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering Faculty of Engineering, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100775763"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":3.8801,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.93887501,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"69","issue":"2","first_page":"1006","last_page":"1013"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7887745499610901},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7671281099319458},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6122283935546875},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5187295079231262},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.4726366400718689},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.46092861890792847},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43497103452682495},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43202945590019226},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4316829442977905},{"id":"https://openalex.org/keywords/state-information","display_name":"State information","score":0.4178151488304138},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12799102067947388}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7887745499610901},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7671281099319458},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6122283935546875},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5187295079231262},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.4726366400718689},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.46092861890792847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43497103452682495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43202945590019226},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4316829442977905},{"id":"https://openalex.org/C2985963534","wikidata":"https://www.wikidata.org/wiki/Q7603704","display_name":"State information","level":3,"score":0.4178151488304138},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12799102067947388},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tac.2023.3274792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2023.3274792","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5053323464","display_name":null,"funder_award_id":"U1908213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8086002158","display_name":null,"funder_award_id":"61621004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W4193965","https://openalex.org/W1522844330","https://openalex.org/W1972523481","https://openalex.org/W1973184571","https://openalex.org/W2003530067","https://openalex.org/W2009062222","https://openalex.org/W2030133006","https://openalex.org/W2067849424","https://openalex.org/W2157078218","https://openalex.org/W2588287814","https://openalex.org/W2744543204","https://openalex.org/W2748115135","https://openalex.org/W2783683139","https://openalex.org/W2802088725","https://openalex.org/W2895798135","https://openalex.org/W2962520377","https://openalex.org/W2964188246","https://openalex.org/W2972591797","https://openalex.org/W2985221364","https://openalex.org/W2986088584","https://openalex.org/W2996936259","https://openalex.org/W3103584849","https://openalex.org/W3165063585","https://openalex.org/W3174405995","https://openalex.org/W6631270716"],"related_works":["https://openalex.org/W2123681352","https://openalex.org/W2999599390","https://openalex.org/W4315472290","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W2918039754","https://openalex.org/W3112099530","https://openalex.org/W2088745056","https://openalex.org/W2085319386","https://openalex.org/W1658340114"],"abstract_inverted_index":{"This":[0],"article":[1],"studies":[2],"the":[3,21,32,40,53,56,63,70,73,103,115,120,133,136],"distributed":[4,80],"secure":[5,81],"state":[6,33,82],"estimation":[7,83],"problem":[8],"in":[9,39],"unreliable":[10],"multiagent":[11],"networks":[12],"through":[13],"adversary":[14,86,96],"detection.":[15],"The":[16],"agents":[17,117],"are":[18,89,109],"endowed":[19],"with":[20,85],"capacity":[22],"for":[23],"detecting":[24],"malicious":[25,43,121],"neighbors":[26],"and":[27,61,76,95,99,106,123],"aim":[28],"to":[29,51,111,131],"collaboratively":[30],"estimate":[31],"variables":[34],"of":[35,42,55,66,72,135],"a":[36],"dynamic":[37],"system":[38],"presence":[41],"agents.":[44],"A":[45],"trust":[46,74],"mechanism":[47,75],"is":[48,129],"first":[49],"introduced":[50],"characterize":[52],"reliability":[54],"information":[57,65],"received":[58],"from":[59],"in-neighbors":[60,122],"identify":[62],"reliable":[64],"two-hop":[67,77],"in-neighbors.":[68],"With":[69],"help":[71],"communication,":[78],"two":[79],"schemes":[84],"detection":[87],"algorithms":[88],"developed":[90],"under":[91],"different":[92],"resource":[93],"requirements":[94],"models.":[97],"Necessary":[98],"sufficient":[100],"conditions":[101],"on":[102],"graph":[104],"connectivity":[105],"joint":[107],"detectability":[108],"established":[110],"guarantee":[112],"that":[113],"all":[114],"regular":[116],"can":[118],"detect":[119],"generate":[124],"accurate":[125],"estimates.":[126],"An":[127],"example":[128],"given":[130],"show":[132],"effectiveness":[134],"proposed":[137],"methods.":[138]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
