{"id":"https://openalex.org/W4409311228","doi":"https://doi.org/10.1109/tifs.2025.3559464","title":"Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression","display_name":"Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409311228","doi":"https://doi.org/10.1109/tifs.2025.3559464"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3559464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3559464","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057397257","display_name":"Xiao Cai","orcid":"https://orcid.org/0000-0003-3400-5566"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiao Cai","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065867178","display_name":"Yanbin Sun","orcid":"https://orcid.org/0000-0002-8157-5337"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanbin Sun","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066409796","display_name":"Xiangpeng Xie","orcid":"https://orcid.org/0000-0003-4822-3134"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangpeng Xie","raw_affiliation_strings":["School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085534511","display_name":"Nan Wei","orcid":"https://orcid.org/0000-0003-3477-9211"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Wei","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013941056","display_name":"Kaibo Shi","orcid":"https://orcid.org/0000-0002-9863-9229"},"institutions":[{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaibo Shi","raw_affiliation_strings":["School of Information Science and Engineering, Chengdu University, Chengdu, Sichuan, China","School of Information Science and Engineering, Chengdu University, Chengdu, Sichuan, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Chengdu University, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I4210125143"]},{"raw_affiliation_string":"School of Information Science and Engineering, Chengdu University, Chengdu, Sichuan, P.R. China","institution_ids":["https://openalex.org/I4210125143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079742998","display_name":"Huaicheng Yan","orcid":"https://orcid.org/0000-0001-5496-1809"},"institutions":[{"id":"https://openalex.org/I143593769","display_name":"East China University of Science and Technology","ror":"https://ror.org/01vyrm377","country_code":"CN","type":"education","lineage":["https://openalex.org/I143593769"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaicheng Yan","raw_affiliation_strings":["School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, East China University of Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I143593769"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056608045","display_name":"Zhihong Tian","orcid":"https://orcid.org/0000-0002-9409-5359"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Tian","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangdong Key Laboratory of Industrial Control System Security, and Huangpu Research School, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5057397257"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":2.3234,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87231865,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"20","issue":null,"first_page":"4100","last_page":"4109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9635000228881836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8448141813278198},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6525604128837585},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5143367052078247},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.46371960639953613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3900401294231415},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3686436414718628},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1692589819431305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8448141813278198},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6525604128837585},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5143367052078247},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.46371960639953613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3900401294231415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3686436414718628},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1692589819431305},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3559464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3559464","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.6700000166893005,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G2057174261","display_name":null,"funder_award_id":"62272119","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2567655147","display_name":null,"funder_award_id":"62372126","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4719667475","display_name":null,"funder_award_id":"2024M750616","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G5816856850","display_name":null,"funder_award_id":"2021A1515012307","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G6064493666","display_name":null,"funder_award_id":"U2436208","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6740853036","display_name":null,"funder_award_id":"2020A1515010450","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G6896414497","display_name":null,"funder_award_id":"U2468204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8317922470","display_name":null,"funder_award_id":"62402129","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8812891240","display_name":null,"funder_award_id":"62372129","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1868258070","https://openalex.org/W1981066143","https://openalex.org/W2035605646","https://openalex.org/W2037686415","https://openalex.org/W2045177900","https://openalex.org/W2052334067","https://openalex.org/W2099940443","https://openalex.org/W2100556411","https://openalex.org/W2113837300","https://openalex.org/W2152520525","https://openalex.org/W2885433138","https://openalex.org/W2888227520","https://openalex.org/W2907299225","https://openalex.org/W2944179575","https://openalex.org/W2964552218","https://openalex.org/W2972371309","https://openalex.org/W2986537346","https://openalex.org/W2995698009","https://openalex.org/W3008201130","https://openalex.org/W3018082279","https://openalex.org/W3040879027","https://openalex.org/W3091933747","https://openalex.org/W3096178361","https://openalex.org/W3179359551","https://openalex.org/W3187292492","https://openalex.org/W4206269769","https://openalex.org/W4210727699","https://openalex.org/W4210935577","https://openalex.org/W4285106060","https://openalex.org/W4312347179","https://openalex.org/W4383503575","https://openalex.org/W4386232551","https://openalex.org/W4390356915","https://openalex.org/W4390357354","https://openalex.org/W4391454203","https://openalex.org/W4400906885","https://openalex.org/W4401387486","https://openalex.org/W4402496391"],"related_works":["https://openalex.org/W2284759612","https://openalex.org/W4402320089","https://openalex.org/W2111375262","https://openalex.org/W2317728013","https://openalex.org/W4407154879","https://openalex.org/W4252076617","https://openalex.org/W1991205173","https://openalex.org/W4378555281","https://openalex.org/W2612632602","https://openalex.org/W2321805087"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"the":[3,36,67,74,88,118,121,140,145,170],"critical":[4,112],"challenge":[5],"of":[6,44,90,120,144,172],"achieving":[7],"asymptotic":[8],"stability":[9,24,119],"in":[10,175],"networked":[11],"control":[12,79,113],"systems":[13],"(NCSs)":[14],"under":[15,135],"denial-of-service":[16],"(DoS)":[17],"attacks,":[18,92],"focusing":[19],"on":[20,153],"maintaining":[21],"security":[22],"and":[23,55,110,142,168],"within":[25],"bandwidth-constrained":[26],"environments.":[27],"First,":[28],"we":[29,93],"construct":[30],"a":[31,41,95,154],"practical":[32],"attack":[33,46,53],"model":[34],"using":[35],"NSL-KDD":[37],"dataset":[38],"to":[39,65,77,102,162],"provide":[40],"realistic":[42],"representation":[43],"DoS":[45,91,173],"dynamics,":[47],"capturing":[48],"key":[49],"attributes":[50],"such":[51],"as":[52],"duration":[54],"frequency.":[56],"Then,":[57],"an":[58],"iterative":[59],"shrinkage-thresholding":[60],"algorithm":[61],"(ISTA)":[62],"is":[63,123],"introduced":[64],"supervise":[66],"adaptive":[68],"sampled-data":[69],"controller":[70],"(ADSC),":[71],"dynamically":[72],"optimizing":[73],"sampling":[75],"period":[76],"enhance":[78],"performance":[80],"while":[81],"minimizing":[82],"communication":[83,166],"overhead.":[84],"To":[85],"further":[86],"mitigate":[87,169],"impact":[89],"propose":[94],"novel":[96],"data":[97,114],"compression":[98],"mechanism":[99],"that":[100],"adapts":[101],"varying":[103],"network":[104,137],"conditions,":[105],"ensuring":[106],"efficient":[107],"bandwidth":[108],"utilization":[109],"preserving":[111],"fidelity.":[115],"In":[116],"addition,":[117],"NCS":[122],"rigorously":[124],"verified":[125],"through":[126,150],"Lyapunov-Krasovskii":[127],"functions":[128],"(LKFs),":[129],"demonstrating":[130],"robust":[131],"system":[132],"behavior":[133],"even":[134],"adverse":[136],"conditions.":[138],"Finally,":[139],"effectiveness":[141],"practicality":[143],"proposed":[146],"approach":[147],"are":[148],"validated":[149],"experimental":[151],"studies":[152],"2-degree-of-freedom":[155],"(2-DoF)":[156],"helicopter":[157],"system,":[158],"confirming":[159],"its":[160],"capability":[161],"ensure":[163],"stability,":[164],"optimize":[165],"efficiency,":[167],"effects":[171],"attacks":[174],"real-world":[176],"scenarios.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
