{"id":"https://openalex.org/W4409233039","doi":"https://doi.org/10.1109/tfuzz.2025.3557896","title":"Interval Observer-Based Secure Estimation for T\u2013S Fuzzy Systems Under Stealthy Attacks","display_name":"Interval Observer-Based Secure Estimation for T\u2013S Fuzzy Systems Under Stealthy Attacks","publication_year":2025,"publication_date":"2025-04-07","ids":{"openalex":"https://openalex.org/W4409233039","doi":"https://doi.org/10.1109/tfuzz.2025.3557896"},"language":"en","primary_location":{"id":"doi:10.1109/tfuzz.2025.3557896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2025.3557896","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108050603","display_name":"Zhihui Li","orcid":"https://orcid.org/0009-0006-3035-9438"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhi-Hui Li","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108050603"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":6.6857,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96282496,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"33","issue":"7","first_page":"2251","last_page":"2260"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9553999900817871,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/observer","display_name":"Observer (physics)","score":0.6040632128715515},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5956271290779114},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5736644268035889},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.5145382285118103},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.511130154132843},{"id":"https://openalex.org/keywords/interval","display_name":"Interval (graph theory)","score":0.5021669864654541},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.4755384922027588},{"id":"https://openalex.org/keywords/interval-estimation","display_name":"Interval estimation","score":0.4705774188041687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41811513900756836},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3865531384944916},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35359060764312744},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3166581094264984},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3121631443500519},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.20725592970848083},{"id":"https://openalex.org/keywords/confidence-interval","display_name":"Confidence interval","score":0.15063312649726868},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.14116644859313965},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12872853875160217}],"concepts":[{"id":"https://openalex.org/C2780704645","wikidata":"https://www.wikidata.org/wiki/Q9251458","display_name":"Observer (physics)","level":2,"score":0.6040632128715515},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5956271290779114},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5736644268035889},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.5145382285118103},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.511130154132843},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.5021669864654541},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.4755384922027588},{"id":"https://openalex.org/C205167067","wikidata":"https://www.wikidata.org/wiki/Q3300636","display_name":"Interval estimation","level":3,"score":0.4705774188041687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41811513900756836},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3865531384944916},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35359060764312744},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3166581094264984},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3121631443500519},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.20725592970848083},{"id":"https://openalex.org/C44249647","wikidata":"https://www.wikidata.org/wiki/Q208498","display_name":"Confidence interval","level":2,"score":0.15063312649726868},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.14116644859313965},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12872853875160217},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tfuzz.2025.3557896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2025.3557896","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5053323464","display_name":null,"funder_award_id":"U1908213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G577153277","display_name":null,"funder_award_id":"U23A20337","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1972523481","https://openalex.org/W2079325629","https://openalex.org/W2084628204","https://openalex.org/W2094245978","https://openalex.org/W2097089521","https://openalex.org/W2132934431","https://openalex.org/W2133331983","https://openalex.org/W2145386862","https://openalex.org/W2154692645","https://openalex.org/W2222631131","https://openalex.org/W2762300680","https://openalex.org/W2801793887","https://openalex.org/W2802447865","https://openalex.org/W2911862555","https://openalex.org/W2912771596","https://openalex.org/W2982621597","https://openalex.org/W2983616847","https://openalex.org/W2999434607","https://openalex.org/W3022408907","https://openalex.org/W3031873949","https://openalex.org/W3034850927","https://openalex.org/W3046519495","https://openalex.org/W3118755205","https://openalex.org/W4206186196","https://openalex.org/W4206379619","https://openalex.org/W4212989343","https://openalex.org/W4220671257","https://openalex.org/W4226221659","https://openalex.org/W4285225983","https://openalex.org/W4294816500","https://openalex.org/W4388581178","https://openalex.org/W4388948813","https://openalex.org/W4389633713","https://openalex.org/W4400178831","https://openalex.org/W4404809264"],"related_works":["https://openalex.org/W2384410534","https://openalex.org/W2374448978","https://openalex.org/W2045103335","https://openalex.org/W2011847478","https://openalex.org/W2998804369","https://openalex.org/W2419509170","https://openalex.org/W2053692289","https://openalex.org/W1585599148","https://openalex.org/W2801254109","https://openalex.org/W2039703772"],"abstract_inverted_index":{"This":[0],"paper":[1],"focuses":[2],"on":[3,64],"the":[4,17,25,36,41,50,54,65,79,85,94,102,111,124,127],"interval":[5,69,96,104],"state":[6,76],"estimation":[7,33,80],"for":[8,35,98],"T-S":[9,99],"fuzzy":[10,60,100],"systems":[11],"under":[12,114],"stealthy":[13,26,115],"sensor":[14],"attacks,":[15],"where":[16,40],"premise":[18],"variables":[19],"are":[20,46,120],"unmeasurable.":[21],"To":[22],"deal":[23],"with":[24,93],"attack,":[27],"an":[28,67],"upper":[29],"and":[30,43,78],"lower":[31],"bounds":[32],"method":[34],"attack":[37],"is":[38,71,82,113],"proposed,":[39],"nominal":[42],"auxiliary":[44],"matrices":[45],"introduced":[47],"to":[48,73,122],"overcome":[49],"difficulty":[51],"of":[52,126],"ensuring":[53],"error":[55],"system":[56,112],"nonnegativity":[57],"induced":[58],"by":[59],"rules.":[61],"Then,":[62],"based":[63],"bounds,":[66],"attack-resistant":[68],"observer":[70,97,105],"constructed":[72],"achieve":[74],"secure":[75],"estimation,":[77],"accuracy":[81],"improved":[83],"using":[84],"<inline-formula":[86],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[87],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[88],"notation=\"LaTeX\">$H_{\\infty":[89],"}$</tex-math></inline-formula>":[90],"technique.":[91],"Compared":[92],"existing":[95],"systems,":[101],"designed":[103],"has":[106],"better":[107],"resilience":[108],"performance":[109],"when":[110],"attacks.":[116],"Finally,":[117],"simulation":[118],"examples":[119],"provided":[121],"illustrate":[123],"effectiveness":[125],"proposed":[128],"results.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
