{"id":"https://openalex.org/W4403183251","doi":"https://doi.org/10.1109/tac.2024.3476309","title":"Replay Attack Detection Based on Parity Space Method for Cyber-Physical Systems","display_name":"Replay Attack Detection Based on Parity Space Method for Cyber-Physical Systems","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4403183251","doi":"https://doi.org/10.1109/tac.2024.3476309"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2024.3476309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3476309","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058802953","display_name":"Dong Zhao","orcid":"https://orcid.org/0000-0002-2011-0579"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Zhao","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028730873","display_name":"Yang Shi","orcid":"https://orcid.org/0000-0003-1337-5322"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yang Shi","raw_affiliation_strings":["Department of Mechanical Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046071840","display_name":"Steven X. Ding","orcid":"https://orcid.org/0000-0002-5149-5918"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steven X. Ding","raw_affiliation_strings":["Institute for Automatic Control and Complex Systems, University of Duisburg-Essen, Duisburg, Germany"],"affiliations":[{"raw_affiliation_string":"Institute for Automatic Control and Complex Systems, University of Duisburg-Essen, Duisburg, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617027","display_name":"Yueyang Li","orcid":"https://orcid.org/0000-0002-1614-0302"},"institutions":[{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueyang Li","raw_affiliation_strings":["School of Electrical Engineering, University of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, University of Jinan, Jinan, China","institution_ids":["https://openalex.org/I34949971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058276153","display_name":"Fangzhou Fu","orcid":"https://orcid.org/0000-0001-7814-028X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangzhou Fu","raw_affiliation_strings":["School of Aeronautics and Astronautics, Sun Yat-sen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics and Astronautics, Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058802953"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":9.4228,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.98415643,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"70","issue":"4","first_page":"2390","last_page":"2405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9125000238418579,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6907709836959839},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.558883547782898},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4723607003688812},{"id":"https://openalex.org/keywords/parity","display_name":"Parity (physics)","score":0.4300103783607483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3619195818901062},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3330535292625427},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1343003213405609},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.10036826133728027},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0898531973361969}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6907709836959839},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.558883547782898},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4723607003688812},{"id":"https://openalex.org/C2777151079","wikidata":"https://www.wikidata.org/wiki/Q141160","display_name":"Parity (physics)","level":2,"score":0.4300103783607483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3619195818901062},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3330535292625427},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1343003213405609},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.10036826133728027},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0898531973361969},{"id":"https://openalex.org/C109214941","wikidata":"https://www.wikidata.org/wiki/Q18334","display_name":"Particle physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tac.2024.3476309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3476309","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},{"id":"pmh:oai:bibliographie.ub.uni-due.de:ubo_mods_00230431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/TAC.2024.3476309","pdf_url":null,"source":{"id":"https://openalex.org/S7407055102","display_name":"Universit\u00e4tsbibliographie, Universit\u00e4t Duisburg-Essen","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Artikel/Aufsatz"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3204108909","display_name":null,"funder_award_id":"62473173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G364470088","display_name":null,"funder_award_id":"62273021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3803916258","display_name":null,"funder_award_id":"62103450","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4924973332","display_name":null,"funder_award_id":"U22B6001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G647926191","display_name":null,"funder_award_id":"62473389","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7920016323","display_name":null,"funder_award_id":"61973135","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W23775767","https://openalex.org/W1493432090","https://openalex.org/W1607202247","https://openalex.org/W1972523481","https://openalex.org/W1977806565","https://openalex.org/W2013022992","https://openalex.org/W2042960896","https://openalex.org/W2064284013","https://openalex.org/W2098089028","https://openalex.org/W2135346934","https://openalex.org/W2158281641","https://openalex.org/W2494112937","https://openalex.org/W2555431798","https://openalex.org/W2603165544","https://openalex.org/W2762155482","https://openalex.org/W2907018391","https://openalex.org/W2913636944","https://openalex.org/W2921750014","https://openalex.org/W2962837023","https://openalex.org/W2963445270","https://openalex.org/W2969680757","https://openalex.org/W2971698210","https://openalex.org/W2971859948","https://openalex.org/W2972868794","https://openalex.org/W2973118259","https://openalex.org/W2990170928","https://openalex.org/W3047473664","https://openalex.org/W3084020177","https://openalex.org/W3107765100","https://openalex.org/W3109994442","https://openalex.org/W3120722576","https://openalex.org/W3133492944","https://openalex.org/W3135689018","https://openalex.org/W4229706427","https://openalex.org/W4296198685","https://openalex.org/W4394698877"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W2472109360","https://openalex.org/W2008822734","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2979539706","https://openalex.org/W3177248053"],"abstract_inverted_index":{"The":[0,20,60],"replay":[1,29,50,65,87,146],"attack":[2,51,66,88,147],"detection":[3,22,72,97],"problem":[4],"is":[5,56,67,81,129,134],"studied":[6],"from":[7],"a":[8,137],"new":[9],"perspective":[10],"based":[11,75,84],"on":[12,53,76,85,149],"the":[13,49,54,71,86,103,121,125,131,145,150,162,165],"parity":[14,117],"space":[15],"method":[16],"in":[17],"this":[18],"article.":[19],"proposed":[21,114,166],"methods":[23],"can":[24],"distinguish":[25],"system":[26],"fault":[27],"and":[28,34,42,46,58,70,93,120,155],"attack,":[30],"handle":[31],"both":[32],"input":[33],"output":[35],"data":[36],"replay,":[37],"maintain":[38],"certain":[39],"control":[40],"performance,":[41],"be":[43],"implemented":[44],"conveniently":[45],"efficiently.":[47],"First,":[48],"effect":[52,89,148],"residual":[55,61,151],"derived":[57],"analyzed.":[59],"change":[62],"induced":[63],"by":[64,136],"characterized":[68],"explicitly,":[69],"performance":[73,98],"analysis":[74],"two":[77],"different":[78,110],"test":[79],"statistics":[80],"given.":[82],"Second,":[83],"characterization,":[90],"targeted":[91],"passive":[92,104,126],"active":[94,132],"designs":[95],"for":[96,152],"enhancement":[99],"are":[100,113,158],"proposed.":[101],"Regarding":[102],"design,":[105],"four":[106],"optimization":[107,127],"schemes":[108,128],"regarding":[109],"cost":[111],"functions":[112],"with":[115],"optimal":[116],"matrix":[118],"solutions,":[119],"unified":[122],"solution":[123],"to":[124,143,160],"obtained;":[130],"design":[133],"enabled":[135],"marginally":[138],"stable":[139],"filter":[140],"so":[141],"as":[142],"enlarge":[144],"detection.":[153],"Simulations":[154],"comparison":[156],"studies":[157],"given":[159],"show":[161],"effectiveness":[163],"of":[164],"methods.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":25}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
