{"id":"https://openalex.org/W2806121268","doi":"https://doi.org/10.1109/tcyb.2018.2837874","title":"Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors","display_name":"Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors","publication_year":2018,"publication_date":"2018-06-05","ids":{"openalex":"https://openalex.org/W2806121268","doi":"https://doi.org/10.1109/tcyb.2018.2837874","mag":"2806121268","pmid":"https://pubmed.ncbi.nlm.nih.gov/29994347"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2018.2837874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2018.2837874","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100610644","display_name":"Junsheng Wang","orcid":"https://orcid.org/0000-0001-9154-8255"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun-Sheng Wang","raw_affiliation_strings":["State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100610644"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":4.6813,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.95394835,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"49","issue":"8","first_page":"3020","last_page":"3031"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7121111750602722},{"id":"https://openalex.org/keywords/transmission-control-protocol","display_name":"Transmission Control Protocol","score":0.6413776278495789},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6314700245857239},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5488402247428894},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.4769538640975952},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.4698713421821594},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.44137272238731384},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.43917742371559143},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4326642155647278},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.383969247341156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3579089343547821},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33463597297668457},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3338219225406647},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08217951655387878}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7121111750602722},{"id":"https://openalex.org/C33588617","wikidata":"https://www.wikidata.org/wiki/Q8803","display_name":"Transmission Control Protocol","level":3,"score":0.6413776278495789},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6314700245857239},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5488402247428894},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.4769538640975952},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.4698713421821594},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.44137272238731384},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.43917742371559143},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4326642155647278},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.383969247341156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3579089343547821},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33463597297668457},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3338219225406647},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08217951655387878},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2018.2837874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2018.2837874","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:29994347","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/29994347","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G221516070","display_name":null,"funder_award_id":"61703429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8086002158","display_name":null,"funder_award_id":"61621004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G880789604","display_name":null,"funder_award_id":"61420106016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1552680854","https://openalex.org/W1972523481","https://openalex.org/W1976956127","https://openalex.org/W1992488456","https://openalex.org/W1998285730","https://openalex.org/W2003177232","https://openalex.org/W2004475000","https://openalex.org/W2005028112","https://openalex.org/W2015491033","https://openalex.org/W2025735965","https://openalex.org/W2040871222","https://openalex.org/W2041587044","https://openalex.org/W2086735113","https://openalex.org/W2098897917","https://openalex.org/W2100445566","https://openalex.org/W2105773843","https://openalex.org/W2108906138","https://openalex.org/W2120182684","https://openalex.org/W2129034289","https://openalex.org/W2186997898","https://openalex.org/W2329192114","https://openalex.org/W2343541124","https://openalex.org/W2346413031","https://openalex.org/W2465799076","https://openalex.org/W2520033077","https://openalex.org/W2555431798","https://openalex.org/W2738514392","https://openalex.org/W2749777304","https://openalex.org/W2766188596","https://openalex.org/W2767888192","https://openalex.org/W2780835704","https://openalex.org/W2798909945","https://openalex.org/W3210839039","https://openalex.org/W4230674069","https://openalex.org/W6747736733"],"related_works":["https://openalex.org/W2379618994","https://openalex.org/W2362309446","https://openalex.org/W4255396408","https://openalex.org/W2741684734","https://openalex.org/W745318315","https://openalex.org/W1990452682","https://openalex.org/W2005802534","https://openalex.org/W1593589176","https://openalex.org/W2375160356","https://openalex.org/W264007083"],"abstract_inverted_index":{"Most":[0],"of":[1,20,91,100,134,168,176],"the":[2,14,17,39,55,85,88,92,114,132,135,149,154,164,169,177,186],"existing":[3],"stealthy":[4,33,62,115,182],"attack":[5,34,63,102,116,183],"schemes":[6],"for":[7,65,112,130,163,185],"cyber-physical":[8],"systems":[9],"(CPSs)":[10],"are":[11,22,28,94,196],"presented":[12],"under":[13,84],"assumption":[15,40],"that":[16,41,71,87],"model":[18,89],"parameters":[19,90],"CPS":[21,67,93,155,170,187],"known":[23],"to":[24,53,143],"attackers.":[25],"Presently,":[26],"there":[27],"only":[29],"a":[30,61,96,105,180],"few":[31],"model-independent":[32],"approaches,":[35],"which,":[36],"however,":[37],"need":[38],"attackers":[42],"know":[43],"sensor":[44,151],"measurements":[45],"and":[46,59,104,147,194],"can":[47],"modify":[48],"them.":[49],"This":[50],"paper":[51],"aims":[52],"remove":[54],"aforementioned":[56],"conservative":[57],"assumptions":[58],"give":[60],"methodology":[64],"closed-loop":[66,159],"with":[68],"reference":[69],"signals,":[70],"is,":[72],"transmission":[73],"control":[74,79],"protocol/Internet":[75],"protocol":[76],"(TCP/IP)-based":[77],"networked":[78,107],"systems.":[80],"To":[81],"this":[82,139],"end,":[83],"condition":[86],"unknown,":[95],"benchmark":[97],"platform":[98],"(consisting":[99],"an":[101,141],"detector":[103],"TCP/IP-based":[106,136],"dc":[108],"servo":[109],"system)":[110],"used":[111],"testing":[113],"technology":[117],"is":[118,125,128,156,171,188],"constructed":[119],"via":[120],"data-driven":[121,181],"methods.":[122],"A":[123,158],"plan":[124],"made,":[126],"which":[127],"utilized":[129],"eavesdropping":[131],"information":[133],"CPS.":[137],"On":[138],"basis,":[140],"approach":[142],"blocking":[144],"network":[145],"communications":[146],"injecting":[148],"false":[150],"data":[152],"into":[153],"explored.":[157],"recursive":[160],"identification":[161],"strategy":[162],"dynamic":[165],"characteristic":[166],"matrix":[167],"designed.":[172],"By":[173],"employing":[174],"all":[175],"above-obtained":[178],"results,":[179],"scheme":[184],"proposed":[189],"and,":[190],"subsequently,":[191],"its":[192],"effectiveness":[193],"practicability":[195],"validated":[197],"by":[198],"experiment.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":6}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
