{"id":"https://openalex.org/W4321483954","doi":"https://doi.org/10.1109/tcns.2023.3247562","title":"Secure State Estimation Under Sparse Sensor Attacks Via Saturating Adaptive Technique","display_name":"Secure State Estimation Under Sparse Sensor Attacks Via Saturating Adaptive Technique","publication_year":2023,"publication_date":"2023-02-22","ids":{"openalex":"https://openalex.org/W4321483954","doi":"https://doi.org/10.1109/tcns.2023.3247562"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2023.3247562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2023.3247562","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005253490","display_name":"An\u2010Yang Lu","orcid":"https://orcid.org/0000-0002-9132-3483"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"An-Yang Lu","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]},{"id":"https://openalex.org/I4391767858","display_name":"State Key Laboratory of Synthetical Automation for Process Industries","ror":"https://ror.org/0380ng272","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767858","https://openalex.org/I9224756"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN","SA"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah, Saudi Arabia","State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756","https://openalex.org/I4391767858"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005253490"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":3.2977,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.92186309,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"10","issue":"4","first_page":"1890","last_page":"1898"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.6802788376808167},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.604364275932312},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.604044497013092},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5804992914199829},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4328632056713104},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.402299702167511},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.394004225730896},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25649356842041016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20453360676765442},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.15618544816970825},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15347689390182495}],"concepts":[{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.6802788376808167},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.604364275932312},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.604044497013092},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5804992914199829},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4328632056713104},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.402299702167511},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.394004225730896},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25649356842041016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20453360676765442},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.15618544816970825},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15347689390182495},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2023.3247562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2023.3247562","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1981518949","https://openalex.org/W2003530067","https://openalex.org/W2016617706","https://openalex.org/W2039427951","https://openalex.org/W2062132646","https://openalex.org/W2125079402","https://openalex.org/W2516521254","https://openalex.org/W2572224102","https://openalex.org/W2728389370","https://openalex.org/W2792111770","https://openalex.org/W2804002131","https://openalex.org/W2810411747","https://openalex.org/W2906103050","https://openalex.org/W2909003024","https://openalex.org/W2920505407","https://openalex.org/W2963639842","https://openalex.org/W2963890529","https://openalex.org/W2965493712","https://openalex.org/W2978995128","https://openalex.org/W3006414217","https://openalex.org/W3006475749","https://openalex.org/W3033532966","https://openalex.org/W3037568993","https://openalex.org/W3039187353","https://openalex.org/W3096166287","https://openalex.org/W3105547033","https://openalex.org/W3112645336","https://openalex.org/W3115892855","https://openalex.org/W3118332182","https://openalex.org/W3118717760","https://openalex.org/W3120097157","https://openalex.org/W3133948173","https://openalex.org/W3157969184","https://openalex.org/W3189308364","https://openalex.org/W3200537822","https://openalex.org/W3210137673","https://openalex.org/W4281560244","https://openalex.org/W4285590518"],"related_works":["https://openalex.org/W4243145179","https://openalex.org/W4255875982","https://openalex.org/W4244853958","https://openalex.org/W2029404707","https://openalex.org/W4285325679","https://openalex.org/W4247719608","https://openalex.org/W4237439661","https://openalex.org/W1928239295","https://openalex.org/W1982160337","https://openalex.org/W4242981732"],"abstract_inverted_index":{"This":[0],"article":[1],"is":[2,26,69,74],"concerned":[3],"with":[4,92],"the":[5,15,40,44,53,66,77,86,90,103,106],"secure":[6],"state":[7,42,57,88],"estimation":[8],"problem":[9,25,29],"of":[10,17,55,105],"cyber-physical":[11],"systems":[12],"(CPSs)":[13],"in":[14,30],"presence":[16],"sparse":[18],"sensor":[19],"attacks.":[20],"Considering":[21],"that":[22,76],"such":[23],"a":[24,27],"combinatorial":[28],"nature,":[31],"novel":[32],"saturating":[33,49],"adaptive":[34,50],"algorithms":[35],"are":[36,59,99],"proposed":[37,78,107],"to":[38,84,101],"reconstruct":[39],"system":[41,87],"from":[43],"corrupted":[45],"measurements.":[46],"Through":[47],"introducing":[48],"terms":[51],"limiting":[52],"impact":[54],"attacks,":[56],"estimates":[58],"obtained":[60],"without":[61],"brute":[62],"force":[63],"search,":[64],"and":[65],"computational":[67],"complexity":[68],"reduced":[70],"greatly.":[71],"Meanwhile,":[72],"it":[73],"shown":[75],"method":[79],"also":[80],"can":[81],"be":[82],"adopted":[83],"estimate":[85],"under":[89],"attacks":[91],"varying":[93],"attack":[94],"targets.":[95],"Finally,":[96],"simulation":[97],"results":[98],"provided":[100],"illustrate":[102],"effectiveness":[104],"methods.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
