{"id":"https://openalex.org/W4293371130","doi":"https://doi.org/10.1109/tifs.2022.3202119","title":"Resilient Distributed State Estimation Under Stealthy Attack","display_name":"Resilient Distributed State Estimation Under Stealthy Attack","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4293371130","doi":"https://doi.org/10.1109/tifs.2022.3202119"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3202119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3202119","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081782525","display_name":"Yujiao Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yujiao Lv","raw_affiliation_strings":["College of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049482611","display_name":"Jianquan Lu","orcid":"https://orcid.org/0000-0003-4423-6034"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianquan Lu","raw_affiliation_strings":["School of Mathematics and the College of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Mathematics, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and the College of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Mathematics, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100356160","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0003-3761-0104"},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province and the College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, China","College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province and the College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067785754","display_name":"Jungang Lou","orcid":"https://orcid.org/0000-0002-5325-0404"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jungang Lou","raw_affiliation_strings":["Yangtze Delta Region (Huzhou) Institute of Intelligent Transportation, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"Yangtze Delta Region (Huzhou) Institute of Intelligent Transportation, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081782525"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":3.9765,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.94131167,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"3254","last_page":"3263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7798159122467041},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.7662888765335083},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.7415130138397217},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.6318210363388062},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6036060452461243},{"id":"https://openalex.org/keywords/kalman-filter","display_name":"Kalman filter","score":0.5961176753044128},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5444333553314209},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.47745612263679504},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.43084412813186646},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26551634073257446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24849554896354675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1270008385181427},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11562854051589966},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09931203722953796},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09656330943107605}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7798159122467041},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.7662888765335083},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.7415130138397217},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.6318210363388062},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6036060452461243},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.5961176753044128},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5444333553314209},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.47745612263679504},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.43084412813186646},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26551634073257446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24849554896354675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1270008385181427},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11562854051589966},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09931203722953796},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09656330943107605},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3202119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3202119","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1181187413","display_name":null,"funder_award_id":"LR20F020002","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G622103538","display_name":null,"funder_award_id":"LR20F030001","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G6768575545","display_name":null,"funder_award_id":"61973078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8498166285","display_name":null,"funder_award_id":"62173308","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2002254092","https://openalex.org/W2003530067","https://openalex.org/W2040394284","https://openalex.org/W2055326651","https://openalex.org/W2158191982","https://openalex.org/W2343541124","https://openalex.org/W2400117891","https://openalex.org/W2402911760","https://openalex.org/W2530103553","https://openalex.org/W2548001640","https://openalex.org/W2579438377","https://openalex.org/W2627024038","https://openalex.org/W2780545917","https://openalex.org/W2784198128","https://openalex.org/W2896832338","https://openalex.org/W2910473178","https://openalex.org/W2919286888","https://openalex.org/W2921508228","https://openalex.org/W2922520136","https://openalex.org/W2944749370","https://openalex.org/W2962792187","https://openalex.org/W2982304490","https://openalex.org/W2990351869","https://openalex.org/W2996657988","https://openalex.org/W3039187353","https://openalex.org/W3087323912","https://openalex.org/W3093941566","https://openalex.org/W3138139098","https://openalex.org/W6734797129"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W3004173571","https://openalex.org/W4287880334","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W4366700029","https://openalex.org/W2546638913","https://openalex.org/W2385701518","https://openalex.org/W4285230481"],"abstract_inverted_index":{"Network":[0],"security":[1],"issues":[2],"are":[3,12],"significant":[4],"for":[5,22,96],"cyber-physical":[6],"systems":[7],"while":[8],"existing":[9],"wireless":[10],"networks":[11],"vulnerable":[13],"to":[14,33,70,100,136,159],"cyber-attacks.":[15],"This":[16],"paper":[17],"proposes":[18],"a":[19,61,131,154],"novel":[20],"detector":[21,83,165],"stealthy":[23,62],"attacks":[24],"in":[25,145],"distributed":[26,58,97,168],"consensus-based":[27],"filtering,":[28],"which":[29],"has":[30,110],"fewer":[31],"objects":[32],"detect":[34],"and":[35,74],"thus":[36],"can":[37,51,121],"reduce":[38],"the":[39,43,47,53,57,72,77,81,86,93,105,108,117,138,141,146,150,161,164,167],"time":[40],"consumption":[41],"of":[42,56,66,76,140,163],"detector.":[44,152],"Based":[45],"on":[46,85,104,166],"proposed":[48,82,151],"detector,":[49],"we":[50,91],"analyze":[52,71],"estimated":[54],"performance":[55,75],"estimator":[59,78,147],"under":[60],"attack.":[63],"The":[64],"purpose":[65],"this":[67],"study":[68,92],"is":[69,134,157],"properties":[73],"equipped":[79,148],"with":[80,149],"depending":[84],"adversary&#x2019;s":[87],"available":[88],"resources.":[89,112],"First,":[90],"sufficient":[94,111,132],"condition":[95,133],"state":[98,126],"estimation":[99,127,142],"be":[101,122],"resilient":[102],"based":[103],"assumption":[106],"that":[107],"adversary":[109,115],"With":[113],"limited":[114],"resources,":[116],"optimal":[118],"Kalman":[119],"gain":[120],"obtained":[123],"by":[124],"minimizing":[125],"error":[128,143],"covariance.":[129],"Furthermore,":[130],"presented":[135],"guarantee":[137],"convergence":[139],"covariance":[144],"Finally,":[153],"simulation":[155],"example":[156],"provided":[158],"demonstrate":[160],"effect":[162],"estimator.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
