{"id":"https://openalex.org/W4405179102","doi":"https://doi.org/10.1109/tac.2024.3512413","title":"Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method","display_name":"Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method","publication_year":2024,"publication_date":"2024-12-09","ids":{"openalex":"https://openalex.org/W4405179102","doi":"https://doi.org/10.1109/tac.2024.3512413"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2024.3512413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3512413","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023709529","display_name":"Lei Zou","orcid":"https://orcid.org/0000-0002-0409-7941"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Zou","raw_affiliation_strings":["College of Information Science and Technology, Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100699858","display_name":"Zidong Wang","orcid":"https://orcid.org/0000-0002-9576-7401"},"institutions":[{"id":"https://openalex.org/I59433898","display_name":"Brunel University of London","ror":"https://ror.org/00dn4t376","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I59433898"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zidong Wang","raw_affiliation_strings":["Department of Computer Science, Brunel University London, Uxbridge, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Brunel University London, Uxbridge, U.K","institution_ids":["https://openalex.org/I59433898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056603533","display_name":"Bo Shen","orcid":"https://orcid.org/0000-0003-3482-5783"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Shen","raw_affiliation_strings":["College of Information Science and Technology, Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064660687","display_name":"Hongli Dong","orcid":"https://orcid.org/0000-0001-8531-6757"},"institutions":[{"id":"https://openalex.org/I921716337","display_name":"Northeast Petroleum University","ror":"https://ror.org/03net5943","country_code":"CN","type":"education","lineage":["https://openalex.org/I921716337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongli Dong","raw_affiliation_strings":["Artificial Intelligence Energy Research Institute, Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Energy Research Institute, Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing, China","institution_ids":["https://openalex.org/I921716337"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023709529"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":6.6309,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.97425664,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"70","issue":"6","first_page":"3681","last_page":"3694"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9607999920845032,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9607999920845032,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9567000269889832,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8946329951286316},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.724276065826416},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7144302129745483},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6381310820579529},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49569904804229736},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46311676502227783},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3566770553588867},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.286467969417572}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8946329951286316},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.724276065826416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7144302129745483},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6381310820579529},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49569904804229736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46311676502227783},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3566770553588867},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.286467969417572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tac.2024.3512413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2024.3512413","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},{"id":"pmh:oai:bura.brunel.ac.uk:2438/30950","is_oa":false,"landing_page_url":"https://orcid.org/0000-0002-0409-7941","pdf_url":null,"source":{"id":"https://openalex.org/S4306401473","display_name":"Brunel University Research Archive (BURA) (Brunel University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I59433898","host_organization_name":"Brunel University of London","host_organization_lineage":["https://openalex.org/I59433898"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3066835647","display_name":null,"funder_award_id":"U21A2019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4716552693","display_name":null,"funder_award_id":"62273087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6326848705","display_name":null,"funder_award_id":"62273088","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7520588270","display_name":null,"funder_award_id":"61933007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1979038695","https://openalex.org/W1989770234","https://openalex.org/W2146554256","https://openalex.org/W2164522996","https://openalex.org/W2344965122","https://openalex.org/W2627024038","https://openalex.org/W2739507209","https://openalex.org/W2802121951","https://openalex.org/W2892862852","https://openalex.org/W2901117815","https://openalex.org/W2961719015","https://openalex.org/W2962834492","https://openalex.org/W2963301385","https://openalex.org/W2964172224","https://openalex.org/W2971723304","https://openalex.org/W2999434607","https://openalex.org/W3012541498","https://openalex.org/W3013138950","https://openalex.org/W3038428857","https://openalex.org/W3048667249","https://openalex.org/W3087878582","https://openalex.org/W3115892855","https://openalex.org/W3125988814","https://openalex.org/W3133525776","https://openalex.org/W3163025752","https://openalex.org/W3212781456","https://openalex.org/W4205657322","https://openalex.org/W4214746925","https://openalex.org/W4224038970","https://openalex.org/W4236076921","https://openalex.org/W4295046730","https://openalex.org/W4315646692","https://openalex.org/W4319787432","https://openalex.org/W4321486725","https://openalex.org/W4361292557","https://openalex.org/W4367549634","https://openalex.org/W4376254831","https://openalex.org/W4376891688","https://openalex.org/W4378219617","https://openalex.org/W4380202858","https://openalex.org/W4380264107","https://openalex.org/W4380876657","https://openalex.org/W4383224205","https://openalex.org/W4386097946","https://openalex.org/W4387149786","https://openalex.org/W4390630070"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2786267942","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"This":[0],"article":[1],"addresses":[2],"the":[3,42,78,85,92,101,105,112,119,132,136,142],"problem":[4],"of":[5,21,77,121,135],"secure":[6],"recursive":[7,109,145],"state":[8,113,146],"estimation":[9,137,147],"for":[10,104,111],"a":[11,57],"networked":[12],"linear":[13],"system,":[14],"which":[15],"may":[16],"be":[17,37],"vulnerable":[18],"to":[19,63,91,99,130,155],"interception":[20],"transmitted":[22,79,89],"measurement":[23,43,80],"data":[24,44],"by":[25],"eavesdroppers.":[26],"To":[27,53],"effectively":[28],"protect":[29],"information":[30,65],"security,":[31],"an":[32],"encryption-decryption-based":[33],"communication":[34],"scheme":[35,148],"can":[36,47],"used,":[38],"but":[39],"encrypting":[40],"all":[41],"from":[45],"sensors":[46],"result":[48],"in":[49],"significant":[50],"computational":[51,70],"costs.":[52,71],"address":[54],"this":[55,73],"issue,":[56],"partial-encryption-decryption":[58],"(PED)":[59],"mechanism":[60],"is":[61,97,149],"proposed":[62,143],"enhance":[64],"security":[66],"with":[67],"relatively":[68],"low":[69],"In":[72],"mechanism,":[74,107],"only":[75],"part":[76],"signals":[81,87],"are":[82,88,115,128],"encrypted,":[83],"and":[84,108],"remaining":[86],"directly":[90],"estimator.":[93],"A":[94],"Jordan-canonical-form-based":[95],"approach":[96],"developed":[98],"select":[100],"appropriate":[102],"parameter":[103],"PED":[106],"formulas":[110],"estimator":[114],"designed":[116],"based":[117],"on":[118],"principle":[120],"minimum":[122],"mean":[123],"squared":[124],"error.":[125],"Sufficient":[126],"conditions":[127],"derived":[129],"guarantee":[131],"ultimate":[133],"boundedness":[134],"error":[138],"variance":[139],"matrix.":[140],"Finally,":[141],"PED-based":[144],"evaluated":[150],"through":[151],"two":[152],"simulation":[153],"examples":[154],"demonstrate":[156],"its":[157],"effectiveness.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16}],"updated_date":"2026-03-26T15:22:09.906841","created_date":"2025-10-10T00:00:00"}
