{"id":"https://openalex.org/W4404809264","doi":"https://doi.org/10.1109/tase.2024.3492727","title":"Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks","display_name":"Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks","publication_year":2024,"publication_date":"2024-11-28","ids":{"openalex":"https://openalex.org/W4404809264","doi":"https://doi.org/10.1109/tase.2024.3492727"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2024.3492727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2024.3492727","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kangkang Sun","orcid":"https://orcid.org/0000-0003-3507-4571"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kangkang Sun","raw_affiliation_strings":["Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiaochun Zhang","orcid":"https://orcid.org/0009-0004-4148-6120"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Zhang","raw_affiliation_strings":["School of Future Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Future Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":3.2283,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92507109,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"22","issue":null,"first_page":"8925","last_page":"8936"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13935","display_name":"Mathematical Control Systems and Analysis","score":0.9336000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9264000058174133,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.8661402463912964},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.7337573766708374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5771199464797974},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.5415724515914917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.534599244594574},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.5269659161567688},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46730709075927734},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.39809632301330566},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3675123453140259},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2725958228111267},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11607736349105835},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.08568075299263}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.8661402463912964},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.7337573766708374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5771199464797974},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.5415724515914917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.534599244594574},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.5269659161567688},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46730709075927734},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.39809632301330566},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3675123453140259},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2725958228111267},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11607736349105835},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.08568075299263},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tase.2024.3492727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2024.3492727","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1080246989","display_name":null,"funder_award_id":"HIT","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2021104284","display_name":null,"funder_award_id":"62203144","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G352083367","display_name":null,"funder_award_id":"2024T171145","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G5715585768","display_name":null,"funder_award_id":"HIT.NSRIF202342","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7595203548","display_name":null,"funder_award_id":"2022M720961","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1589786325","https://openalex.org/W1651728063","https://openalex.org/W1954500303","https://openalex.org/W1965654928","https://openalex.org/W2036033662","https://openalex.org/W2037470097","https://openalex.org/W2052631265","https://openalex.org/W2061402725","https://openalex.org/W2091231427","https://openalex.org/W2109156380","https://openalex.org/W2133150655","https://openalex.org/W2343541124","https://openalex.org/W2383630506","https://openalex.org/W2603406422","https://openalex.org/W2734736890","https://openalex.org/W2771390176","https://openalex.org/W2798894945","https://openalex.org/W2811475107","https://openalex.org/W2893568750","https://openalex.org/W2904025397","https://openalex.org/W2941700173","https://openalex.org/W2946643411","https://openalex.org/W2948566387","https://openalex.org/W2982304490","https://openalex.org/W3004608899","https://openalex.org/W3005469329","https://openalex.org/W3039187353","https://openalex.org/W3046031113","https://openalex.org/W3080641399","https://openalex.org/W3156554580","https://openalex.org/W3168041186","https://openalex.org/W3200780444","https://openalex.org/W3210839039","https://openalex.org/W4210597872","https://openalex.org/W4289821441","https://openalex.org/W4296871656","https://openalex.org/W4298059176","https://openalex.org/W4319459206","https://openalex.org/W4319989951","https://openalex.org/W4320002656","https://openalex.org/W4320519381","https://openalex.org/W4365131748","https://openalex.org/W6754136426"],"related_works":["https://openalex.org/W4234906596","https://openalex.org/W4229591372","https://openalex.org/W2071544734","https://openalex.org/W2366309551","https://openalex.org/W2615607975","https://openalex.org/W3147872107","https://openalex.org/W3005047842","https://openalex.org/W3123953333","https://openalex.org/W2063542885","https://openalex.org/W2192101006"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,35,45,53,59,77,84,89,94,99,110,122,129,132,161,171,189],"security":[4,139],"control":[5,134,140,156,190],"problem":[6,141,162,191],"for":[7,144],"a":[8],"class":[9],"of":[10,48,93,101,131,163,174,192],"cyber-physical":[11,146,194],"systems":[12,147,195],"with":[13,196],"optimal":[14,164],"dynamic":[15,165,197],"stealthy":[16,49,175,198],"actuator":[17,26,50,166],"attacks.":[18,51,176],"The":[19,37,154],"minimum":[20],"principle":[21],"is":[22,41,56,106,125,142],"used":[23],"to":[24,43,82,127,137],"design":[25],"attacks":[27,199],"which":[28,96],"satisfy":[29],"an":[30,72,150],"objective":[31],"function":[32],"presented":[33,126],"in":[34],"paper.":[36],"ellipsoidal":[38,103,151],"outer":[39,104,152],"approximation":[40,105],"adopted":[42],"quantify":[44],"potential":[46,172],"impact":[47,173],"Meanwhile,":[52],"attack-free":[54],"performance":[55,67,118],"guaranteed":[57],"through":[58],"L<inline-formula":[60,111],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[61,112],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[62,113],"<tex-math":[63,114],"notation=\"LaTeX\">$\\infty":[64,115],"$":[65,116],"</tex-math></inline-formula>":[66,117],"index":[68,119],"function.":[69,120],"It":[70],"provides":[71],"analysis":[73],"tool":[74],"based":[75],"on":[76],"linear":[78],"matrix":[79,87,92],"inequality":[80],"technique":[81],"redesign":[83],"state":[85],"feedback":[86],"and":[88,200],"observer":[90],"gain":[91],"plant,":[95],"ensures":[97],"that":[98],"volume":[100],"its":[102,201],"minimal":[107],"while":[108],"meeting":[109],"Eventually,":[121],"simulation":[123,179],"example":[124],"demonstrate":[128],"effectiveness":[130],"proposed":[133,155],"algorithm.":[135],"Note":[136],"Practitioners\u2014The":[138],"considered":[143],"discrete-time":[145],"by":[148],"using":[149],"approximation.":[153],"scheme":[157],"not":[158],"only":[159],"solves":[160],"attacks,":[167],"but":[168],"also":[169],"quantifies":[170],"In":[177,183],"addition,":[178],"results":[180],"are":[181],"given.":[182],"future":[184],"research,":[185],"we":[186],"will":[187],"address":[188],"continuous-time":[193],"practical":[202],"application.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
