{"id":"https://openalex.org/W4408017076","doi":"https://doi.org/10.1109/tase.2025.3546583","title":"Resilient Tracking Control of Cyber-Physical Systems Against False Data Injection Attacks and Obstacle Avoidance","display_name":"Resilient Tracking Control of Cyber-Physical Systems Against False Data Injection Attacks and Obstacle Avoidance","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408017076","doi":"https://doi.org/10.1109/tase.2025.3546583"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2025.3546583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3546583","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058202858","display_name":"Daotong Zhang","orcid":"https://orcid.org/0000-0003-1848-7518"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Daotong Zhang","raw_affiliation_strings":["School of Electrical and Mechanical Engineering, The University of Adelaide, Adelaide, SA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Mechanical Engineering, The University of Adelaide, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739668","display_name":"Peng Shi","orcid":"https://orcid.org/0000-0001-8218-586X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Peng Shi","raw_affiliation_strings":["School of Electrical and Mechanical Engineering, The University of Adelaide, Adelaide, SA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Mechanical Engineering, The University of Adelaide, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072923302","display_name":"Chee Peng Lim","orcid":"https://orcid.org/0000-0003-4191-9083"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chee Peng Lim","raw_affiliation_strings":["Department of Computing Technologies, Swinburne University of Technology, Hawthorn, Australia","Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010869153","display_name":"Imre J. Rudas","orcid":"https://orcid.org/0000-0002-2067-8578"},"institutions":[{"id":"https://openalex.org/I103356709","display_name":"Obuda University","ror":"https://ror.org/00ax71d21","country_code":"HU","type":"education","lineage":["https://openalex.org/I103356709"]},{"id":"https://openalex.org/I4210164922","display_name":"Innova (Hungary)","ror":"https://ror.org/05h443j18","country_code":"HU","type":"company","lineage":["https://openalex.org/I4210164922"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Imre Rudas","raw_affiliation_strings":["Research and Innovation Center, Obuda University, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Research and Innovation Center, Obuda University, Budapest, Hungary","institution_ids":["https://openalex.org/I103356709","https://openalex.org/I4210164922"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058202858"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":9.2935,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.97968479,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"22","issue":null,"first_page":"12596","last_page":"12605"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obstacle-avoidance","display_name":"Obstacle avoidance","score":0.7225178480148315},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5340090990066528},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.5208102464675903},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.47591930627822876},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.47384244203567505},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.43809887766838074},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.43247342109680176},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4155057668685913},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.371580570936203},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3618425130844116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34808096289634705},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.25571414828300476},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23359724879264832},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.1832890808582306}],"concepts":[{"id":"https://openalex.org/C6683253","wikidata":"https://www.wikidata.org/wiki/Q7075535","display_name":"Obstacle avoidance","level":4,"score":0.7225178480148315},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5340090990066528},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.5208102464675903},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.47591930627822876},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.47384244203567505},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.43809887766838074},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.43247342109680176},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4155057668685913},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.371580570936203},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3618425130844116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34808096289634705},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.25571414828300476},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23359724879264832},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.1832890808582306},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tase.2025.3546583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3546583","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G1266064720","display_name":null,"funder_award_id":"DP240101140","funder_id":"https://openalex.org/F4320338184","funder_display_name":"Australian Research Council Centre of Excellence for Mathematical and Statistical Frontiers"},{"id":"https://openalex.org/G6862166440","display_name":null,"funder_award_id":"DP240101140","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"},{"id":"https://openalex.org/F4320338184","display_name":"Australian Research Council Centre of Excellence for Mathematical and Statistical Frontiers","ror":"https://ror.org/02vcqg248"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2588802774","https://openalex.org/W2765203865","https://openalex.org/W2968945909","https://openalex.org/W3111349927","https://openalex.org/W3153450208","https://openalex.org/W3202846927","https://openalex.org/W4221098525","https://openalex.org/W4249919931","https://openalex.org/W4281259402","https://openalex.org/W4285215458","https://openalex.org/W4291653326","https://openalex.org/W4294310839","https://openalex.org/W4319068583","https://openalex.org/W4323338545","https://openalex.org/W4361030036","https://openalex.org/W4366351200","https://openalex.org/W4380839101","https://openalex.org/W4382280901","https://openalex.org/W4384028541","https://openalex.org/W4387790145","https://openalex.org/W4389161420","https://openalex.org/W4390970132","https://openalex.org/W4391248895","https://openalex.org/W4391640293","https://openalex.org/W4391952420","https://openalex.org/W4393161818","https://openalex.org/W4399058649","https://openalex.org/W4399168445","https://openalex.org/W4400975503","https://openalex.org/W4401607407","https://openalex.org/W4403022248","https://openalex.org/W6855215650"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2897743049","https://openalex.org/W3019776739","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W4226140413","https://openalex.org/W2968885840","https://openalex.org/W4321511613","https://openalex.org/W3115036371","https://openalex.org/W4205653412"],"abstract_inverted_index":{"In":[0],"this":[1,107,281],"paper,":[2],"the":[3,28,121,137,153,185,202,231,255,268],"reliable":[4,72],"tracking":[5,114,179,207],"control":[6,36,115,139,196,208,240],"and":[7,30,37,50,65,97,126,143,160,173,181,209,226,246,263,276,292,302],"collision":[8],"avoidance":[9,74],"problems":[10],"for":[11,308],"cyber-physical":[12],"systems":[13,288],"(CPSs)":[14],"with":[15,192,218],"false":[16],"data":[17,96],"injection":[18],"(FDI)":[19],"attacks":[20,24,125,159,189],"are":[21,53,86],"investigated.":[22],"FDI":[23,124,158,188,216,234],"can":[25,118,151,278],"significantly":[26],"compromise":[27],"safety":[29,64,291],"performance":[31],"of":[32,45,56,61,106,123,155,165,187,194,204,233,257,270],"CPSs":[33,89,156,213],"by":[34,283],"corrupting":[35],"navigation":[38],"data.":[39],"Safety":[40],"is":[41,109,168,297],"an":[42,247],"important":[43,54],"aspect":[44],"CPSs.":[46,57],"Unmanned":[47],"ground":[48],"vehicles":[49,52],"aerial":[51],"applications":[55,219],"The":[58,103,163,294],"dual":[59],"challenge":[60],"maintaining":[62,205],"system":[63,182,261],"stability":[66,183],"under":[67],"deliberate":[68],"cyberattacks,":[69],"while":[70],"ensuring":[71],"obstacle":[73,128,161],"in":[75,80,88,184,212,220,267,273],"dynamic":[76],"environments,":[77],"remains":[78],"unresolved":[79],"many":[81],"current":[82],"methodologies.":[83],"These":[84],"challenges":[85],"amplified":[87],"owing":[90],"to":[91,100,110,198,215,289],"their":[92,98],"reliance":[93],"on":[94,136],"real-time":[95],"susceptibility":[99],"adversarial":[101],"manipulation.":[102],"main":[104],"objective":[105],"study":[108],"develop":[111],"a":[112,132,144,238],"resilient":[113,239],"strategy":[116,241],"that":[117,150,242],"effectively":[119],"mitigate":[120,230],"impact":[122,232,256],"achieve":[127],"avoidance.":[129,162],"We":[130],"propose":[131,237],"novel":[133,145],"framework":[134,253],"based":[135],"exponential":[138,244],"barrier":[140],"function":[141],"(ECBF)":[142],"observer-based":[146,248],"auxiliary":[147,249],"signal":[148,250],"approach":[149,282],"ensure":[152],"resilience":[154],"against":[157],"effectiveness":[164],"our":[166],"methods":[167],"shown":[169],"through":[170,299],"extensive":[171],"simulations":[172,301],"physical":[174,303],"experiments,":[175,304],"which":[176],"depict":[177],"improved":[178],"accuracy":[180],"presence":[186,269],"as":[190,223],"compared":[191],"those":[193],"traditional":[195],"methods.Note":[197],"Practitioners\u2014This":[199],"research":[200],"tackles":[201],"problem":[203],"dependable":[206],"avoiding":[210],"collisions":[211],"vulnerable":[214],"attacks,":[217,235],"fields":[221],"such":[222],"smart":[224,227],"transportation":[225],"city.":[228],"To":[229],"we":[236],"uses":[243],"ECBF":[245],"approach.":[251],"This":[252],"mitigates":[254],"corrupted":[258],"data,":[259],"maintains":[260],"stability,":[262],"avoids":[264],"collisions,":[265],"even":[266],"cyberattacks.":[271],"Practitioners":[272],"CPS":[274],"design":[275],"deployment":[277],"benefit":[279],"from":[280],"integrating":[284],"it":[285],"into":[286],"existing":[287],"improve":[290],"security.":[293],"proposed":[295],"method":[296],"validated":[298],"both":[300],"demonstrating":[305],"its":[306],"practicality":[307],"real-world":[309],"applications.":[310]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
