{"id":"https://openalex.org/W4403759058","doi":"https://doi.org/10.1109/tnse.2024.3486451","title":"Distributed Consensus-Based Filtering Against False Data Injection Attacks","display_name":"Distributed Consensus-Based Filtering Against False Data Injection Attacks","publication_year":2024,"publication_date":"2024-10-25","ids":{"openalex":"https://openalex.org/W4403759058","doi":"https://doi.org/10.1109/tnse.2024.3486451"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3486451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3486451","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096228527","display_name":"Yuhang Yang","orcid":"https://orcid.org/0000-0002-0315-0026"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhang Yang","raw_affiliation_strings":["Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022562272","display_name":"Xiangzhou Gao","orcid":"https://orcid.org/0000-0002-8165-342X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangzhou Gao","raw_affiliation_strings":["Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001526404","display_name":"Shenmin Song","orcid":"https://orcid.org/0000-0003-3177-6701"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenmin Song","raw_affiliation_strings":["Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100438076","display_name":"Zhiqiang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Li","raw_affiliation_strings":["32nd Research Institute of China Electronics Technology Group Corporation, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"32nd Research Institute of China Electronics Technology Group Corporation, Shanghai, China","institution_ids":["https://openalex.org/I2800372957"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5096228527"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":2.7919,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91328542,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"1","first_page":"110","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9542999863624573,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6074360013008118},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.47888416051864624},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.4210949242115021},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2306218445301056},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22493788599967957},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.20023953914642334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6074360013008118},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.47888416051864624},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.4210949242115021},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2306218445301056},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22493788599967957},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.20023953914642334}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3486451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3486451","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2063997062","https://openalex.org/W2092587286","https://openalex.org/W2092770992","https://openalex.org/W2158191982","https://openalex.org/W2402911760","https://openalex.org/W2910473178","https://openalex.org/W2951782192","https://openalex.org/W2996657988","https://openalex.org/W3004811186","https://openalex.org/W3014836846","https://openalex.org/W3016249598","https://openalex.org/W3019217877","https://openalex.org/W3092153988","https://openalex.org/W3138235761","https://openalex.org/W3189939479","https://openalex.org/W3198058595","https://openalex.org/W3206469347","https://openalex.org/W3213861068","https://openalex.org/W3215453560","https://openalex.org/W4206920925","https://openalex.org/W4214746925","https://openalex.org/W4225391069","https://openalex.org/W4225630785","https://openalex.org/W4283030207","https://openalex.org/W4283695576","https://openalex.org/W4285219481","https://openalex.org/W4291653176","https://openalex.org/W4294811169","https://openalex.org/W4294811472","https://openalex.org/W4312572620","https://openalex.org/W4316876972","https://openalex.org/W4317103712","https://openalex.org/W4317987750","https://openalex.org/W4321484896","https://openalex.org/W4365517354","https://openalex.org/W4365812710","https://openalex.org/W4366144497","https://openalex.org/W4366384351","https://openalex.org/W4366439776","https://openalex.org/W4376456760","https://openalex.org/W4386432161","https://openalex.org/W4396817539"],"related_works":["https://openalex.org/W1940417675","https://openalex.org/W2106670435","https://openalex.org/W2246375794","https://openalex.org/W1978666881","https://openalex.org/W4394651929","https://openalex.org/W3201708707","https://openalex.org/W2034250407","https://openalex.org/W2167425623","https://openalex.org/W2916913908","https://openalex.org/W3046732854"],"abstract_inverted_index":{"Existing":[0],"distributed":[1,80],"state":[2],"estimation":[3,81,121],"algorithms":[4,24],"usually":[5],"show":[6],"satisfactory":[7],"performance":[8],"when":[9],"dealing":[10],"with":[11,153],"data":[12,46,138,171,193,210],"bias":[13],"caused":[14],"by":[15,29,99,187],"network-induced":[16],"phenomena.":[17],"However,":[18],"the":[19,39,50,52,66,71,85,94,101,116,120,126,137,160,164,170,174,181,196,205,213,219,227,230],"security":[20],"characteristics":[21],"of":[22,41,49,70,93,103,118,140,163,208,218,229],"these":[23],"are":[25,223],"often":[26],"significantly":[27,56,97],"affected":[28],"more":[30],"complex":[31],"and":[32,44,68,143,179,211,215],"severe":[33],"network":[34,175],"attacks.":[35],"Specifically,":[36],"due":[37],"to":[38,65,125,158,203,225],"lack":[40],"dynamic":[42,189],"adaptability":[43],"abnormal":[45,183,192],"detection":[47],"ability":[48,162],"estimator,":[51],"estimator":[53,95],"may":[54],"deteriorate":[55],"or":[57,184],"even":[58],"diverge,":[59],"which":[60],"poses":[61],"a":[62,79],"serious":[63],"threat":[64],"stability":[67],"reliability":[69],"system.":[72,220],"To":[73],"remedy":[74],"this":[75],"issue,":[76],"we":[77,107],"propose":[78],"algorithm":[82],"based":[83,114],"on":[84,115],"classical":[86],"Kalman":[87],"consensus":[88],"filter":[89],"framework.":[90],"The":[91,166],"accuracy":[92,128,139],"is":[96,156,194],"improved":[98],"utilizing":[100],"innovation":[102],"neighbor":[104],"nodes.":[105],"Furthermore,":[106],"construct":[108],"an":[109,150],"adaptive":[110],"weight":[111,147],"allocation":[112],"mechanism":[113,134],"principle":[117],"minimizing":[119],"error":[122],"variance":[123],"according":[124],"possible":[127],"differences":[129],"between":[130],"different":[131],"estimators.":[132],"This":[133],"can":[135,168,198],"evaluate":[136],"each":[141],"node,":[142],"dynamically":[144],"adjust":[145],"its":[146],"accordingly.":[148],"Subsenquently,":[149],"event-triggered":[151],"detector":[152,167,197],"random":[154],"thresholds":[155],"designed":[157],"enhance":[159],"anti-attack":[161],"estimator.":[165],"monitor":[169],"flow":[172],"in":[173,176],"real":[177],"time,":[178],"identify":[180],"potential":[182],"attack":[185],"behavior":[186],"setting":[188],"thresholds.":[190],"Once":[191],"detected,":[195],"immediately":[199],"trigger":[200],"corresponding":[201],"countermeasures":[202],"block":[204],"propagation":[206],"path":[207],"erroneous":[209],"protect":[212],"safe":[214],"stable":[216],"operation":[217],"Simulation":[221],"results":[222],"employed":[224],"validate":[226],"effectiveness":[228],"proposed":[231],"method.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
