{"id":"https://openalex.org/W4399907633","doi":"https://doi.org/10.1109/tac.2024.3417110","title":"Attack Detection From the Perspectives of Control Center and Controlled Systems","display_name":"Attack Detection From the Perspectives of Control Center and Controlled Systems","publication_year":2024,"publication_date":"2024-06-20","ids":{"openalex":"https://openalex.org/W4399907633","doi":"https://doi.org/10.1109/tac.2024.3417110"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2024.3417110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3417110","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005253490","display_name":"An\u2010Yang Lu","orcid":"https://orcid.org/0000-0002-9132-3483"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"An-Yang Lu","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005253490"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":1.0302,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76934801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"69","issue":"12","first_page":"8662","last_page":"8673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6111000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6111000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.6083999872207642,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/center","display_name":"Center (category theory)","score":0.5358947515487671},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4924822747707367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47533750534057617},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47145137190818787},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.34138521552085876},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.29105842113494873},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1397884488105774},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11206367611885071}],"concepts":[{"id":"https://openalex.org/C2779463800","wikidata":"https://www.wikidata.org/wiki/Q5062222","display_name":"Center (category theory)","level":2,"score":0.5358947515487671},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4924822747707367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47533750534057617},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47145137190818787},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.34138521552085876},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.29105842113494873},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1397884488105774},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11206367611885071},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C8010536","wikidata":"https://www.wikidata.org/wiki/Q160398","display_name":"Crystallography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tac.2024.3417110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3417110","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1225639138","display_name":null,"funder_award_id":"2023A1515140007","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G5180302675","display_name":null,"funder_award_id":"N2304023","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1489912570","https://openalex.org/W1557652964","https://openalex.org/W1972757409","https://openalex.org/W1999272358","https://openalex.org/W2001951724","https://openalex.org/W2023230804","https://openalex.org/W2062132646","https://openalex.org/W2105773843","https://openalex.org/W2123990969","https://openalex.org/W2151301943","https://openalex.org/W2314304624","https://openalex.org/W2437958156","https://openalex.org/W2470910638","https://openalex.org/W2484577372","https://openalex.org/W2555431798","https://openalex.org/W2766003054","https://openalex.org/W2766498015","https://openalex.org/W2804002131","https://openalex.org/W2892484405","https://openalex.org/W2913636944","https://openalex.org/W2916745039","https://openalex.org/W2921584596","https://openalex.org/W2943560396","https://openalex.org/W2943852008","https://openalex.org/W2948566387","https://openalex.org/W2963209376","https://openalex.org/W2963639842","https://openalex.org/W2963890529","https://openalex.org/W2968148435","https://openalex.org/W3016270591","https://openalex.org/W3037922012","https://openalex.org/W3039187353","https://openalex.org/W3040180050","https://openalex.org/W3045844943","https://openalex.org/W3083294452","https://openalex.org/W3111584772","https://openalex.org/W3161260464","https://openalex.org/W3196711749","https://openalex.org/W4210531868","https://openalex.org/W4220716320","https://openalex.org/W4224324677","https://openalex.org/W4280567962","https://openalex.org/W4306946147","https://openalex.org/W4308025049","https://openalex.org/W4312559803","https://openalex.org/W4387831891","https://openalex.org/W4389331452"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2355865573","https://openalex.org/W2155981143","https://openalex.org/W2155245395"],"abstract_inverted_index":{"This":[0],"article":[1],"investigates":[2],"the":[3,15,37,42,49,52,82,86,89,97,106,109,131,136,158,163,168],"problem":[4],"of":[5,17,27,51,108,162],"attack":[6,30,63,94],"detection":[7,31],"for":[8,80],"cyber-physical":[9],"systems":[10],"with":[11,172],"input":[12],"constraints":[13],"in":[14,88,96],"presence":[16],"command":[18,117],"and":[19,41,58,76,160],"sensor":[20],"attacks.":[21,179],"For":[22],"detecting":[23,81],"a":[24,61,116,151],"wider":[25],"range":[26],"attacks,":[28],"two":[29,133],"strategies":[32],"are":[33],"designed,":[34],"corresponding":[35],"to":[36,67,120,156],"control":[38,53,90],"center":[39,91],"side":[40,100],"controlled":[43,98],"system":[44,99],"side,":[45,92],"respectively.":[46],"First,":[47],"from":[48],"perspective":[50],"center,":[54],"which":[55,112],"sends":[56],"commands":[57],"collects":[59],"measurements,":[60],"novel":[62],"detector":[64,87,95],"is":[65,101,113,127,139,154],"designed":[66,132],"detect":[68,177],"irregularities":[69],"by":[70,104,115],"analyzing":[71,105],"residual":[72,124],"signals,":[73,125],"tracking":[74],"performance,":[75],"prediction":[77],"performance.":[78],"Second,":[79],"stealthy":[83],"attacks":[84,146],"bypassing":[85],"an":[93],"also":[102],"constructed":[103],"reliability":[107],"received":[110],"command,":[111],"generated":[114],"governor.":[118],"Compared":[119],"solely":[121],"relying":[122],"on":[123],"it":[126],"shown":[128],"that":[129,143,167],"combining":[130],"detectors":[134,170],"where":[135],"collected":[137],"information":[138],"fully":[140],"utilized":[141],"ensures":[142],"more":[144],"general":[145],"can":[147,176],"be":[148],"detected.":[149],"Finally,":[150],"numerical":[152],"simulation":[153],"provided":[155],"demonstrate":[157],"correctness":[159],"effectiveness":[161],"proposed":[164,169],"methods,":[165],"showing":[166],"equipped":[171],"multiple":[173],"defense":[174],"mechanisms":[175],"various":[178]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
