{"id":"https://openalex.org/W4285106060","doi":"https://doi.org/10.1109/tfuzz.2022.3189394","title":"Stochastic Data-Based Denial-of-Service Attack Strategy Design Against Remote State Estimation in Interval Type-2 T\u2013S Fuzzy Systems","display_name":"Stochastic Data-Based Denial-of-Service Attack Strategy Design Against Remote State Estimation in Interval Type-2 T\u2013S Fuzzy Systems","publication_year":2022,"publication_date":"2022-07-12","ids":{"openalex":"https://openalex.org/W4285106060","doi":"https://doi.org/10.1109/tfuzz.2022.3189394"},"language":"en","primary_location":{"id":"doi:10.1109/tfuzz.2022.3189394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2022.3189394","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023587665","display_name":"Mengge Fan","orcid":"https://orcid.org/0000-0003-2009-2785"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengge Fan","raw_affiliation_strings":["College of Science, University of Shanghai for Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Science, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050172715","display_name":"Engang Tian","orcid":"https://orcid.org/0000-0002-8169-5347"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Engang Tian","raw_affiliation_strings":["School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066409796","display_name":"Xiangpeng Xie","orcid":"https://orcid.org/0000-0003-4822-3134"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang-peng Xie","raw_affiliation_strings":["Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100727487","display_name":"Dong Yue","orcid":"https://orcid.org/0000-0001-7810-9338"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Yue","raw_affiliation_strings":["Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072075631","display_name":"Teng Cao","orcid":"https://orcid.org/0000-0002-8589-8280"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Teng Cao","raw_affiliation_strings":["College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023587665"],"corresponding_institution_ids":["https://openalex.org/I148128674"],"apc_list":null,"apc_paid":null,"fwci":4.6894,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95096344,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"31","issue":"3","first_page":"825","last_page":"834"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5895520448684692},{"id":"https://openalex.org/keywords/interval","display_name":"Interval (graph theory)","score":0.5736196041107178},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5672924518585205},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4872216284275055},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.4686509966850281},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.46625885367393494},{"id":"https://openalex.org/keywords/stochastic-process","display_name":"Stochastic process","score":0.4450744390487671},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43751204013824463},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.436349481344223},{"id":"https://openalex.org/keywords/interval-estimation","display_name":"Interval estimation","score":0.43466752767562866},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.43129318952560425},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.33821094036102295},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31257349252700806},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.25638502836227417},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22916743159294128},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.19422030448913574},{"id":"https://openalex.org/keywords/confidence-interval","display_name":"Confidence interval","score":0.17618399858474731},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15421125292778015},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12751734256744385},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.09619927406311035}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5895520448684692},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.5736196041107178},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5672924518585205},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4872216284275055},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.4686509966850281},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.46625885367393494},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.4450744390487671},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43751204013824463},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.436349481344223},{"id":"https://openalex.org/C205167067","wikidata":"https://www.wikidata.org/wiki/Q3300636","display_name":"Interval estimation","level":3,"score":0.43466752767562866},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.43129318952560425},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.33821094036102295},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31257349252700806},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25638502836227417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22916743159294128},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.19422030448913574},{"id":"https://openalex.org/C44249647","wikidata":"https://www.wikidata.org/wiki/Q208498","display_name":"Confidence interval","level":2,"score":0.17618399858474731},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15421125292778015},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12751734256744385},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.09619927406311035},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tfuzz.2022.3189394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2022.3189394","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"},{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2930414529","display_name":null,"funder_award_id":"21ZR444900","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G3144160905","display_name":null,"funder_award_id":"61903252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3656832279","display_name":null,"funder_award_id":"62173231","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3790867977","display_name":null,"funder_award_id":"62022044","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336023","display_name":"Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1978518835","https://openalex.org/W1994578438","https://openalex.org/W2003677466","https://openalex.org/W2012005963","https://openalex.org/W2063688797","https://openalex.org/W2095509930","https://openalex.org/W2100409338","https://openalex.org/W2520033077","https://openalex.org/W2546109980","https://openalex.org/W2558624015","https://openalex.org/W2606723072","https://openalex.org/W2622677990","https://openalex.org/W2735071102","https://openalex.org/W2758737610","https://openalex.org/W2801899875","https://openalex.org/W2802681489","https://openalex.org/W2804551196","https://openalex.org/W2921874104","https://openalex.org/W2923584227","https://openalex.org/W2947443079","https://openalex.org/W2948178128","https://openalex.org/W2971723304","https://openalex.org/W2972371309","https://openalex.org/W2975348938","https://openalex.org/W2984987324","https://openalex.org/W2990407612","https://openalex.org/W3002997336","https://openalex.org/W3018082279","https://openalex.org/W3045184377","https://openalex.org/W3046790819","https://openalex.org/W3122969820","https://openalex.org/W3129797436","https://openalex.org/W3166033322","https://openalex.org/W3196090388","https://openalex.org/W3211121045","https://openalex.org/W3213666303","https://openalex.org/W4200265924","https://openalex.org/W4205761702"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"This":[0],"article":[1],"focuses":[2],"on":[3],"designing":[4],"a":[5,109],"novel":[6],"stochastic":[7,110,181],"data-based":[8,76,182],"denial-of-service":[9],"(DoS)":[10],"attack":[11,36,73,78,90,104,115,117,120,144,153,184,204],"strategy":[12,37,91,185,205],"that":[13],"can":[14,83],"intercept":[15],"measurements":[16],"and":[17,82,119,124,147],"reduce":[18],"the":[19,47,57,63,69,75,88,99,112,136,140,143,148,152,179,191,195,199,202,207],"quality":[20,193],"of":[21,46,151,194,201],"remote":[22],"state":[23],"estimation":[24,192],"in":[25,62,126,161],"interval":[26],"type-2":[27],"(IT2)":[28],"T\u2013S":[29],"fuzzy":[30],"systems.":[31],"The":[32],"new":[33],"proposed":[34,89,180,203],"DoS":[35,49,72,77,103,177,183],"has":[38,95],"two":[39],"main":[40],"characteristics.":[41],"First":[42],"different":[43],"from":[44,206],"most":[45],"existing":[48,70,176],"models,":[50,178],"it":[51],"is":[52,79,92,155,159],"data-based,":[53],"which":[54,94,158,197],"mainly":[55],"attacks":[56,137],"packets":[58],"playing":[59],"important":[60],"roles":[61],"system":[64],"performance.":[65],"Therefore,":[66],"compared":[67,173],"with":[68,174],"indiscriminate":[71],"approaches,":[74],"more":[80],"intelligent":[81],"cause":[84],"larger":[85],"disruptions.":[86],"Second,":[87],"random,":[93],"better":[96],"concealment":[97],"than":[98],"periodic":[100],"or":[101],"consecutive":[102],"models.":[105],"Then,":[106],"by":[107],"using":[108],"method,":[111],"relationship":[113],"among":[114],"effect,":[116],"probability,":[118],"parameter":[121,154],"are":[122,138],"analyzed":[123],"shown":[125,160],"Theorem":[127,162],"<xref":[128,163],"ref-type=\"theorem\"":[129,164],"rid=\"theorem9\"":[130],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[131,166],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</xref>":[132],".":[133,168],"Furthermore,":[134],"if":[135],"energy-constrained,":[139],"relation":[141],"between":[142],"rate":[145],"threshold":[146],"upper":[149],"bound":[150],"expressed":[156],"analytically,":[157],"rid=\"theorem12\"":[165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</xref>":[167],"Simulation":[169],"results":[170],"demonstrate":[171],"that,":[172],"some":[175],"brings":[186],"about":[187],"greater":[188],"destructiveness":[189],"to":[190],"systems,":[196],"demonstrates":[198],"effectiveness":[200],"attacker\u2019s":[208],"perspective.":[209]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
