{"id":"https://openalex.org/W4414693265","doi":"https://doi.org/10.1109/tcyb.2025.3613852","title":"Optimal Stealthy Attacks Against Remote State Estimation in Cyber\u2013Physical Systems: A More Fine-Grained Stealthiness","display_name":"Optimal Stealthy Attacks Against Remote State Estimation in Cyber\u2013Physical Systems: A More Fine-Grained Stealthiness","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414693265","doi":"https://doi.org/10.1109/tcyb.2025.3613852","pmid":"https://pubmed.ncbi.nlm.nih.gov/41032552"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2025.3613852","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3613852","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056503180","display_name":"Xiuxiu Ren","orcid":"https://orcid.org/0000-0002-4477-2120"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiu-Xiu Ren","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I4391767858","display_name":"State Key Laboratory of Synthetical Automation for Process Industries","ror":"https://ror.org/0380ng272","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767858","https://openalex.org/I9224756"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering and the State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering and the State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756","https://openalex.org/I4391767858"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056503180"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33281755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"56","issue":"2","first_page":"1058","last_page":"1070"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6281999945640564},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5825999975204468},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.5450000166893005},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.49889999628067017},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4666000008583069},{"id":"https://openalex.org/keywords/row","display_name":"Row","score":0.40059998631477356},{"id":"https://openalex.org/keywords/basis","display_name":"Basis (linear algebra)","score":0.3919000029563904}],"concepts":[{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6281999945640564},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5825999975204468},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.5450000166893005},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4666000008583069},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4399000108242035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4066999852657318},{"id":"https://openalex.org/C135598885","wikidata":"https://www.wikidata.org/wiki/Q1366302","display_name":"Row","level":2,"score":0.40059998631477356},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.3499000072479248},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33230000734329224},{"id":"https://openalex.org/C91575142","wikidata":"https://www.wikidata.org/wiki/Q1971426","display_name":"Optimal control","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.2912999987602234},{"id":"https://openalex.org/C55660270","wikidata":"https://www.wikidata.org/wiki/Q5164377","display_name":"Constrained optimization","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C48753275","wikidata":"https://www.wikidata.org/wiki/Q11216","display_name":"Numerical analysis","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2025.3613852","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3613852","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:41032552","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41032552","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2230805867","display_name":null,"funder_award_id":"62403117","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3075680117","display_name":null,"funder_award_id":"2025-MS-042","funder_id":"https://openalex.org/F4320323086","funder_display_name":"Natural Science Foundation of Liaoning Province"},{"id":"https://openalex.org/G577153277","display_name":null,"funder_award_id":"U23A20337","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6074952546","display_name":null,"funder_award_id":"2018ZCX03","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8086002158","display_name":null,"funder_award_id":"61621004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323086","display_name":"Natural Science Foundation of Liaoning Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W585133165","https://openalex.org/W1536023576","https://openalex.org/W2021982403","https://openalex.org/W2073903244","https://openalex.org/W2156064084","https://openalex.org/W2329192114","https://openalex.org/W2400117891","https://openalex.org/W2402911760","https://openalex.org/W2627024038","https://openalex.org/W2780545917","https://openalex.org/W2944749370","https://openalex.org/W2961536906","https://openalex.org/W2982304490","https://openalex.org/W3025260206","https://openalex.org/W3036062693","https://openalex.org/W3087323912","https://openalex.org/W3138139098","https://openalex.org/W3153591500","https://openalex.org/W3156519058","https://openalex.org/W3164145521","https://openalex.org/W3211862199","https://openalex.org/W4205950470","https://openalex.org/W4221098525","https://openalex.org/W4236076921","https://openalex.org/W4292258978","https://openalex.org/W4300529730","https://openalex.org/W4310238737","https://openalex.org/W4312547357","https://openalex.org/W4313291074","https://openalex.org/W4320519381","https://openalex.org/W4327705382","https://openalex.org/W4327831242","https://openalex.org/W4360897890","https://openalex.org/W4360995511","https://openalex.org/W4386321968","https://openalex.org/W4400488657","https://openalex.org/W4407736676","https://openalex.org/W4410226725"],"related_works":[],"abstract_inverted_index":{"This":[0],"article":[1],"studies":[2],"the":[3,14,27,33,42,49,52,56,62,90,109,114,117,127,134,139,156,159],"stealthy":[4,54,106],"attack":[5,28,85,92,100,141],"design":[6],"problem":[7,44,58],"on":[8],"cyber-physical":[9],"systems":[10],"(cyber-physical":[11],"system),":[12],"where":[13],"(":[15,34],"$\\epsilon":[16,35],"$":[17,20,36,39],",":[18,37],"$\\delta":[19,38],")-stealthiness,":[21],"a":[22,82,104],"more":[23,77,105],"fine-grained":[24],"quantification":[25],"of":[26,138,158],"stealthiness,":[29],"is":[30,45,59,87,94],"considered.":[31],"Under":[32],")-stealthy":[40],"constraint,":[41],"optimization":[43],"nonconvex.":[46],"By":[47],"analysing":[48],"relationship":[50],"between":[51],"two":[53],"parameters,":[55],"nonconvex":[57],"transformed":[60],"into":[61],"one":[63,74],"with":[64,76],"only":[65],"equality":[66],"constraints,":[67],"which":[68,97],"can":[69],"be":[70],"solved":[71],"directly":[72],"in":[73,126],"step":[75],"simplified":[78],"solution":[79],"process.":[80],"Furthermore,":[81],"general":[83],"linear":[84],"model":[86],"considered,":[88],"and":[89,133,161],"optimal":[91,140],"strategy":[93],"given":[95,153],"analytically,":[96],"achieves":[98],"greater":[99],"performance":[101],"but":[102],"under":[103],"level":[107],"than":[108,144],"existing":[110,128],"results.":[111,163],"In":[112],"addition,":[113],"constraint":[115],"that":[116],"output":[118],"matrix":[119],"needs":[120],"to":[121,154],"have":[122],"full":[123],"rank":[124],"rows":[125],"works":[129],"has":[130],"been":[131],"removed,":[132],"completely":[135],"analytical":[136],"forms":[137,146],"parameters":[142],"rather":[143],"numerical":[145,150],"are":[147,152],"presented.":[148],"Finally,":[149],"simulations":[151],"show":[155],"effectiveness":[157],"method":[160],"comparison":[162]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
