{"id":"https://openalex.org/W4411358791","doi":"https://doi.org/10.1109/tcns.2025.3580676","title":"Securing Cyber-Physical Systems Under Periodic Detection: Optimal Stealthy Linear Attack and Countermeasure","display_name":"Securing Cyber-Physical Systems Under Periodic Detection: Optimal Stealthy Linear Attack and Countermeasure","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W4411358791","doi":"https://doi.org/10.1109/tcns.2025.3580676"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2025.3580676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2025.3580676","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jia Qi","orcid":"https://orcid.org/0000-0001-8021-8859"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jia Qi","raw_affiliation_strings":["Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","Dept. of Automation, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]},{"raw_affiliation_string":"Dept. of Automation, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoyu Luo","orcid":"https://orcid.org/0000-0002-4995-7853"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyu Luo","raw_affiliation_strings":["College of Engineering, Boston University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066835481","display_name":"Chongrong Fang","orcid":"https://orcid.org/0000-0003-2357-0228"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chongrong Fang","raw_affiliation_strings":["Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","Dept. of Automation, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]},{"raw_affiliation_string":"Dept. of Automation, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004668792","display_name":"Jianping He","orcid":"https://orcid.org/0000-0002-6253-7802"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping He","raw_affiliation_strings":["Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","Dept. of Automation, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]},{"raw_affiliation_string":"Dept. of Automation, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I116953780","https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12740236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"4","first_page":"2505","last_page":"2517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9672999978065491,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9672999978065491,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9502000212669373,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9340000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7697449922561646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.611173689365387},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5893881916999817},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.546816349029541},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25749459862709045},{"id":"https://openalex.org/keywords/aerospace-engineering","display_name":"Aerospace engineering","score":0.12364324927330017}],"concepts":[{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7697449922561646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.611173689365387},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5893881916999817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.546816349029541},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25749459862709045},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.12364324927330017},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2025.3580676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2025.3580676","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7153339986","display_name":null,"funder_award_id":"62473260","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G928701077","display_name":null,"funder_award_id":"62373247","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W17486081","https://openalex.org/W1925746542","https://openalex.org/W1972523481","https://openalex.org/W2107043025","https://openalex.org/W2135688397","https://openalex.org/W2158914121","https://openalex.org/W2402911760","https://openalex.org/W2484646121","https://openalex.org/W2525221147","https://openalex.org/W2589039213","https://openalex.org/W2780545917","https://openalex.org/W2886930206","https://openalex.org/W2896375370","https://openalex.org/W2921750014","https://openalex.org/W2982304490","https://openalex.org/W3036062693","https://openalex.org/W3048112693","https://openalex.org/W3138139098","https://openalex.org/W3156519058","https://openalex.org/W3211862199","https://openalex.org/W4226284643","https://openalex.org/W4236076921","https://openalex.org/W4250589301","https://openalex.org/W4283322835","https://openalex.org/W4285122460","https://openalex.org/W4289126832","https://openalex.org/W4300580367","https://openalex.org/W4320519381","https://openalex.org/W4321354397","https://openalex.org/W4352976914","https://openalex.org/W4384835155","https://openalex.org/W4388579777","https://openalex.org/W4391020672","https://openalex.org/W4394627620","https://openalex.org/W4401113472","https://openalex.org/W4403025366"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2362741838","https://openalex.org/W622044715","https://openalex.org/W2378994067","https://openalex.org/W1598708558","https://openalex.org/W2350438938"],"abstract_inverted_index":{"Security":[0],"issues":[1],"are":[2,32,87,153,188],"of":[3,72,97,185,194],"significant":[4],"importance":[5],"for":[6,63,78,100,121],"cyber-physical":[7],"systems":[8,44],"(CPS),":[9],"where":[10],"the":[11,27,33,36,70,81,106,114,132,143,151,166,172,192,195,200],"attack":[12,22,76,93,98,119,197],"design":[13,23,71,113],"is":[14],"a":[15,158,161],"major":[16],"concern.":[17],"Most":[18],"related":[19],"studies":[20],"on":[21,165],"implicitly":[24],"assume":[25],"that":[26,95,142],"control":[28,51,82,129,136],"and":[29,52,84,102,124,135,146,199],"detection":[30,47,85,101],"periods":[31,38],"same.":[34],"However,":[35],"two":[37],"could":[39,58],"be":[40],"different":[41],"in":[42],"practical":[43],"with":[45,171],"remote":[46],"such":[48],"as":[49],"supervisory":[50],"data":[53],"acquisition":[54],"(SCADA)":[55],"systems,":[56],"which":[57],"lead":[59],"to":[60,130,180,190],"new":[61],"vulnerabilities":[62],"attackers.":[64],"In":[65],"this":[66,110,183],"paper,":[67],"we":[68,90,112],"consider":[69],"innovation-based":[73,117],"stealthy":[74,116],"linear":[75,118],"strategies":[77,99,120,198],"CPS":[79],"when":[80],"period":[83,86,107],"inconsistent.":[88],"Specifically,":[89],"propose":[91,157],"an":[92],"framework":[94],"consists":[96],"non-detection":[103],"instants":[104],"under":[105],"discrepancy.":[108],"On":[109],"basis,":[111],"optimal":[115],"state":[122],"estimation":[123,133,144],"Linear":[125],"Quadratic":[126],"Gaussian":[127],"(LQG)":[128],"maximize":[131],"error":[134,145],"cost,":[137],"respectively.":[138],"We":[139,155],"then":[140],"prove":[141],"controller":[147],"cost":[148],"caused":[149],"by":[150],"attacker":[152],"bounded.":[154],"further":[156],"countermeasure":[159],"combining":[160],"secure":[162],"module":[163],"based":[164],"pseudo-random":[167],"number":[168],"(PRN)":[169],"technique":[170],"multivariate":[173],"exponentially":[174],"weighted":[175],"moving":[176],"average":[177],"(MEWMA)":[178],"detector":[179],"help":[181],"detect":[182],"type":[184],"attack.":[186],"Simulations":[187],"given":[189],"demonstrate":[191],"effectiveness":[193],"proposed":[196],"countermeasure.":[201]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
