{"id":"https://openalex.org/W4225391069","doi":"https://doi.org/10.1109/tii.2022.3168868","title":"Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking","display_name":"Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking","publication_year":2022,"publication_date":"2022-04-22","ids":{"openalex":"https://openalex.org/W4225391069","doi":"https://doi.org/10.1109/tii.2022.3168868"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3168868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3168868","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Attack_Detection_for_Networked_Control_Systems_Using_Event-Triggered_Dynamic_Watermarking/19606996","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100735340","display_name":"Dajun Du","orcid":"https://orcid.org/0000-0003-2979-1507"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dajun Du","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018162700","display_name":"Changda Zhang","orcid":"https://orcid.org/0000-0002-1948-6691"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changda Zhang","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100372203","display_name":"Xue Li","orcid":"https://orcid.org/0000-0002-4691-0160"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Li","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051175363","display_name":"Minrui Fei","orcid":"https://orcid.org/0000-0002-7804-077X"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minrui Fei","raw_affiliation_strings":["Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Power Station Automation Technology, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066119228","display_name":"Huiyu Zhou","orcid":"https://orcid.org/0000-0003-1634-9840"},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Huiyu Zhou","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Leicester, Leicester, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Leicester, Leicester, U.K","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100735340"],"corresponding_institution_ids":["https://openalex.org/I113940042"],"apc_list":null,"apc_paid":null,"fwci":3.2814,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.92091426,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":"1","first_page":"351","last_page":"361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6933752298355103},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.5425837635993958},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5370316505432129},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5079279541969299},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.48421573638916016},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4731774628162384},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.45110076665878296},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44745463132858276},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.32631316781044006},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.20447465777397156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1503567099571228},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09284472465515137}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6933752298355103},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.5425837635993958},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5370316505432129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5079279541969299},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.48421573638916016},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4731774628162384},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.45110076665878296},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44745463132858276},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32631316781044006},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.20447465777397156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1503567099571228},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09284472465515137},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2022.3168868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3168868","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/19606996","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Attack_Detection_for_Networked_Control_Systems_Using_Event-Triggered_Dynamic_Watermarking/19606996","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/19606996","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Attack_Detection_for_Networked_Control_Systems_Using_Event-Triggered_Dynamic_Watermarking/19606996","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2627950882","display_name":null,"funder_award_id":"61803252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3837850091","display_name":null,"funder_award_id":"D18003","funder_id":"https://openalex.org/F4320327912","funder_display_name":"Higher Education Discipline Innovation Project"},{"id":"https://openalex.org/G4707368403","display_name":null,"funder_award_id":"61833011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5803096225","display_name":null,"funder_award_id":"20JC1414000","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G6760817873","display_name":null,"funder_award_id":"61773253","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7080948407","display_name":null,"funder_award_id":"92067106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7631971269","display_name":null,"funder_award_id":"21190780300","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G8554241465","display_name":null,"funder_award_id":"19510750300","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"},{"id":"https://openalex.org/F4320327912","display_name":"Higher Education Discipline Innovation Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2135123910","https://openalex.org/W2150801051","https://openalex.org/W2171509823","https://openalex.org/W2345006808","https://openalex.org/W2402911760","https://openalex.org/W2515370279","https://openalex.org/W2555431798","https://openalex.org/W2555793209","https://openalex.org/W2603165544","https://openalex.org/W2768779900","https://openalex.org/W2799059726","https://openalex.org/W2801815112","https://openalex.org/W2921584596","https://openalex.org/W2922885984","https://openalex.org/W2924206081","https://openalex.org/W2948535117","https://openalex.org/W2963445270","https://openalex.org/W2978051137","https://openalex.org/W3043386701","https://openalex.org/W3045516846","https://openalex.org/W3084020177","https://openalex.org/W3094377270","https://openalex.org/W3199647054","https://openalex.org/W3207678990"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187","https://openalex.org/W1593964766","https://openalex.org/W2387614453","https://openalex.org/W2365808414"],"abstract_inverted_index":{"Dynamic":[0],"watermarking":[1,24,45,52],"schemes":[2,32],"can":[3],"enhance":[4],"the":[5,28,59,69,78,106],"cyberattack":[6],"detection":[7],"capability":[8],"of":[9,30,80,99,108],"networked":[10,101],"control":[11],"systems":[12],"(NCSs).":[13],"This":[14],"article":[15],"presents":[16],"a":[17,41,100],"linear":[18],"event-triggered":[19,34,43],"solution":[20],"to":[21],"conventional":[22],"dynamic":[23,44],"(CDW)":[25],"schemes.":[26],"First,":[27],"limitations":[29],"CDW":[31],"for":[33],"state":[35],"estimation-based":[36],"NCSs":[37],"are":[38,90],"investigated.":[39],"Second,":[40],"new":[42],"(ETDW)":[46],"scheme":[47],"is":[48,74],"designed":[49,91],"by":[50],"treating":[51],"as":[53],"symmetric":[54],"key":[55],"encryption,":[56],"based":[57],"on":[58],"limit":[60],"convergence":[61],"theorem":[62],"in":[63,77],"probability.":[64],"Its":[65],"security":[66],"property":[67],"against":[68],"generalized":[70],"replay":[71],"attacks":[72],"(GRAs)":[73],"also":[75],"discussed":[76],"form":[79],"bounded":[81],"asymptotic":[82],"attack":[83],"power.":[84],"Third,":[85],"finite":[86],"sample":[87],"ETDW":[88],"tests":[89],"with":[92],"matrix":[93],"concentration":[94],"inequalities.":[95],"Finally,":[96],"experimental":[97],"results":[98],"inverted":[102],"pendulum":[103],"system":[104],"demonstrate":[105],"validity":[107],"our":[109],"proposed":[110],"scheme.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
