{"id":"https://openalex.org/W2395946885","doi":"https://doi.org/10.1109/tcns.2016.2573039","title":"Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks","display_name":"Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks","publication_year":2016,"publication_date":"2016-05-25","ids":{"openalex":"https://openalex.org/W2395946885","doi":"https://doi.org/10.1109/tcns.2016.2573039","mag":"2395946885"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2016.2573039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2016.2573039","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1605.08962","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Fei Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fei Miao","raw_affiliation_strings":["Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Quanyan Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quanyan Zhu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Miroslav Pajic","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Miroslav Pajic","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":null,"display_name":"George J. Pappas","orcid":null},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George J. Pappas","raw_affiliation_strings":["Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I79576946"],"apc_list":null,"apc_paid":null,"fwci":12.6842,"has_fulltext":false,"cited_by_count":210,"citation_normalized_percentile":{"value":0.98879392,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"4","issue":"1","first_page":"106","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.6880999803543091,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.6880999803543091,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.10540000349283218,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.06920000165700912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.6172999739646912},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.5001000165939331},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.4318999946117401},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4187999963760376},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.37459999322891235},{"id":"https://openalex.org/keywords/shannon\u2013fano-coding","display_name":"Shannon\u2013Fano coding","score":0.3700999915599823},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.36730000376701355},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.31679999828338623}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6565999984741211},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.6172999739646912},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5393999814987183},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.4318999946117401},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4187999963760376},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4115999937057495},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.37459999322891235},{"id":"https://openalex.org/C130811719","wikidata":"https://www.wikidata.org/wiki/Q2645","display_name":"Shannon\u2013Fano coding","level":4,"score":0.3700999915599823},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.36730000376701355},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.31369999051094055},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C190750250","wikidata":"https://www.wikidata.org/wiki/Q13533439","display_name":"Coding tree unit","level":3,"score":0.3059999942779541},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28119999170303345},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.272599995136261},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2680000066757202},{"id":"https://openalex.org/C77637269","wikidata":"https://www.wikidata.org/wiki/Q7002051","display_name":"Neural coding","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C57890076","wikidata":"https://www.wikidata.org/wiki/Q4680725","display_name":"Adaptive coding","level":4,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcns.2016.2573039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2016.2573039","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1605.08962","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1605.08962","pdf_url":"https://arxiv.org/pdf/1605.08962","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1605.08962","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1605.08962","pdf_url":"https://arxiv.org/pdf/1605.08962","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1927191872","display_name":null,"funder_award_id":"CNS-1505701","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2192838842","display_name":null,"funder_award_id":"CNS-1505799","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1977218919","https://openalex.org/W1984240524","https://openalex.org/W1992488456","https://openalex.org/W1995810576","https://openalex.org/W2003530067","https://openalex.org/W2005028112","https://openalex.org/W2005725110","https://openalex.org/W2022271272","https://openalex.org/W2024673847","https://openalex.org/W2039984414","https://openalex.org/W2062132646","https://openalex.org/W2066300569","https://openalex.org/W2073290103","https://openalex.org/W2074851925","https://openalex.org/W2102832680","https://openalex.org/W2106833918","https://openalex.org/W2115656617","https://openalex.org/W2123990969","https://openalex.org/W2151863014","https://openalex.org/W2158914121","https://openalex.org/W2166196498","https://openalex.org/W2233233025","https://openalex.org/W2555431798","https://openalex.org/W6658382951","https://openalex.org/W6666735270"],"related_works":[],"abstract_inverted_index":{"This":[0,88],"paper":[1],"considers":[2],"a":[3,24,69,90,109,134,183],"method":[4,92],"of":[5,26,45,108,123,181],"coding":[6,70,111,126,136,146,156,164,184],"the":[7,35,46,52,57,63,74,80,106,114,117,124,155,170,178],"sensor":[8,76,99,159],"outputs":[9,77],"in":[10,101,142],"order":[11],"to":[12,29,72,78,132,169,176],"detect":[13],"stealthy":[14],"false":[15],"data":[16,27,54,85],"injection":[17,28,86],"attacks.":[18,87],"An":[19,128],"intelligent":[20,84],"attacker":[21,118],"can":[22],"design":[23],"sequence":[25],"sensors":[30],"and":[31,38,160],"actuators":[32],"that":[33,116,141],"pass":[34],"state":[36,58],"estimator":[37],"statistical":[39],"fault":[40],"detector,":[41],"based":[42],"on":[43],"knowledge":[44,122],"system":[47],"parameters.":[48],"To":[49,149],"stay":[50],"undetected,":[51],"injected":[53],"should":[55],"increase":[56,79],"estimation":[59,64,81],"errors":[60],"while":[61],"keep":[62],"residues":[65,82],"small.":[66],"We":[67,104],"employ":[68],"matrix":[71,112,157,185],"change":[73],"original":[75],"under":[83,113],"is":[89,130,186],"low-cost":[91],"compared":[93],"with":[94],"encryption":[95],"schemes":[96],"over":[97],"all":[98],"measurements":[100],"communication":[102],"networks.":[103],"show":[105,140],"conditions":[107],"feasible":[110,135,145],"assumption":[115],"does":[119],"not":[120],"have":[121],"exact":[125],"matrix.":[127],"algorithm":[129,175],"developed":[131],"compute":[133],"matrix,":[137],"and,":[138],"we":[139],"general,":[143],"multiple":[144],"matrices":[147,165],"exist.":[148],"defend":[150],"against":[151],"attackers":[152],"who":[153],"estimates":[154],"via":[158],"actuator":[161],"measurements,":[162],"time-varying":[163],"are":[166],"designed":[167],"according":[168],"detection":[171],"requirements.":[172],"A":[173],"heuristic":[174],"decide":[177],"time":[179],"length":[180],"updating":[182],"then":[187],"proposed.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":29},{"year":2021,"cited_by_count":24},{"year":2020,"cited_by_count":29},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":18},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2016-06-24T00:00:00"}
