{"id":"https://openalex.org/W3013227197","doi":"https://doi.org/10.1109/tcyb.2020.2975042","title":"Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems","display_name":"Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems","publication_year":2020,"publication_date":"2020-03-31","ids":{"openalex":"https://openalex.org/W3013227197","doi":"https://doi.org/10.1109/tcyb.2020.2975042","mag":"3013227197","pmid":"https://pubmed.ncbi.nlm.nih.gov/32224473"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2020.2975042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.2975042","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100367710","display_name":"Xiao\u2010Lei Wang","orcid":"https://orcid.org/0000-0002-1632-5761"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiao-Lei Wang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","State Key Laboratory of Rolling and Automation, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"State Key Laboratory of Rolling and Automation, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040659448","display_name":"Dianhua Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dianhua Zhang","raw_affiliation_strings":["State Key Laboratory of Rolling and Automation, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Rolling and Automation, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100367710"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":1.0413,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.75880772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"52","issue":"1","first_page":"472","last_page":"480"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9483000040054321,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9099000096321106,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7161292433738708},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6411711573600769},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5849948525428772},{"id":"https://openalex.org/keywords/riccati-equation","display_name":"Riccati equation","score":0.490078330039978},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.46299442648887634},{"id":"https://openalex.org/keywords/linear-system","display_name":"Linear system","score":0.4416744112968445},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4289810061454773},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3845469057559967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2900579571723938},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20001542568206787},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.14328786730766296},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08744964003562927},{"id":"https://openalex.org/keywords/differential-equation","display_name":"Differential equation","score":0.06972572207450867}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7161292433738708},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6411711573600769},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5849948525428772},{"id":"https://openalex.org/C45473103","wikidata":"https://www.wikidata.org/wiki/Q851503","display_name":"Riccati equation","level":3,"score":0.490078330039978},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.46299442648887634},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.4416744112968445},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4289810061454773},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3845469057559967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2900579571723938},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20001542568206787},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.14328786730766296},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08744964003562927},{"id":"https://openalex.org/C78045399","wikidata":"https://www.wikidata.org/wiki/Q11214","display_name":"Differential equation","level":2,"score":0.06972572207450867},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false}],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2020.2975042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.2975042","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:32224473","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/32224473","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4276612039","display_name":null,"funder_award_id":"2017YFB0304100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6507692090","display_name":null,"funder_award_id":"2018ZCX03","funder_id":"https://openalex.org/F4320335661","funder_display_name":"State Key Laboratory of Synthetical Automation for Process Industries"},{"id":"https://openalex.org/G7476430661","display_name":null,"funder_award_id":"51634002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8086002158","display_name":null,"funder_award_id":"61621004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G880789604","display_name":null,"funder_award_id":"61420106016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335661","display_name":"State Key Laboratory of Synthetical Automation for Process Industries","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1853375248","https://openalex.org/W2003530067","https://openalex.org/W2016617706","https://openalex.org/W2021805781","https://openalex.org/W2023230804","https://openalex.org/W2028579885","https://openalex.org/W2068740779","https://openalex.org/W2104575980","https://openalex.org/W2105773843","https://openalex.org/W2156629001","https://openalex.org/W2315448583","https://openalex.org/W2342560477","https://openalex.org/W2343541124","https://openalex.org/W2345283418","https://openalex.org/W2400117891","https://openalex.org/W2402911760","https://openalex.org/W2530103553","https://openalex.org/W2581258406","https://openalex.org/W2749616810","https://openalex.org/W2758737610","https://openalex.org/W2760597204","https://openalex.org/W2762155482","https://openalex.org/W2783221532","https://openalex.org/W2793015082","https://openalex.org/W2795347454","https://openalex.org/W2800008718","https://openalex.org/W2809302593","https://openalex.org/W2811475107","https://openalex.org/W2904889657","https://openalex.org/W2906912256","https://openalex.org/W2920505407","https://openalex.org/W2921508228","https://openalex.org/W2922520136","https://openalex.org/W2923584227","https://openalex.org/W2925438923","https://openalex.org/W2945266571","https://openalex.org/W2948566387","https://openalex.org/W2963865981","https://openalex.org/W2964156796","https://openalex.org/W2971723304","https://openalex.org/W2972371309"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2357141384","https://openalex.org/W3019776739","https://openalex.org/W3023620176","https://openalex.org/W2114791549","https://openalex.org/W2546638913","https://openalex.org/W4293448734","https://openalex.org/W2358245908","https://openalex.org/W2984841587","https://openalex.org/W4391020672"],"abstract_inverted_index":{"This":[0],"article":[1],"studies":[2],"the":[3,6,21,38,42,64,74,105,108],"problem":[4],"of":[5,73,76,107],"optimal":[7,44,65,88],"stealth":[8,45,70,89],"attack":[9,29,46,66,90],"strategy":[10,91],"design":[11],"for":[12],"linear":[13,28],"cyber-physical":[14],"systems":[15,18],"(CPSs).":[16],"Virtual":[17],"that":[19,48],"reflect":[20],"attacker's":[22],"target":[23],"are":[24,49],"constructed,":[25],"and":[26,56],"a":[27],"model":[30],"with":[31],"varying":[32],"gains":[33],"is":[34,92,101],"designed":[35,50],"based":[36,51],"on":[37,52],"virtual":[39],"models.":[40],"Unlike":[41],"existing":[43],"strategies":[47],"sufficient":[53,57],"conditions,":[54,86],"necessary":[55],"conditions":[58],"are,":[59],"respectively,":[60],"established":[61],"to":[62,103],"achieve":[63],"performance":[67],"while":[68],"maintaining":[69],"in":[71],"virtue":[72],"solvability":[75],"certain":[77],"coupled":[78],"recursive":[79],"Riccati":[80],"difference":[81],"equations":[82],"(RDEs).":[83],"Under":[84],"those":[85],"an":[87,95],"constructed":[93],"by":[94],"offline":[96],"algorithm.":[97],"A":[98],"simulation":[99],"example":[100],"applied":[102],"verify":[104],"effectiveness":[106],"presented":[109],"technical":[110],"scheme.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
