{"id":"https://openalex.org/W4405521134","doi":"https://doi.org/10.1109/tnse.2024.3519624","title":"Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks","display_name":"Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks","publication_year":2024,"publication_date":"2024-12-18","ids":{"openalex":"https://openalex.org/W4405521134","doi":"https://doi.org/10.1109/tnse.2024.3519624"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3519624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3519624","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083349103","display_name":"Xudong Zhao","orcid":"https://orcid.org/0000-0002-1864-4686"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xudong Zhao","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Dalian University of Technology, Ministry of Education, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Dalian University of Technology, Ministry of Education, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365474","display_name":"Wei Xing","orcid":"https://orcid.org/0000-0001-5729-5186"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xing","raw_affiliation_strings":["School of Information and Communication Engineering, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111337469","display_name":"Xinyu Wang","orcid":"https://orcid.org/0000-0001-5692-3355"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyu Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Dalian University of Technology, Ministry of Education, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Dalian University of Technology, Ministry of Education, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010159448","display_name":"Ning Zhao","orcid":"https://orcid.org/0000-0002-9877-6872"},"institutions":[{"id":"https://openalex.org/I97009856","display_name":"Bohai University","ror":"https://ror.org/01kdzej58","country_code":"CN","type":"education","lineage":["https://openalex.org/I97009856"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Zhao","raw_affiliation_strings":["College of Control Science and Engineering, Bohai University, Jinzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Control Science and Engineering, Bohai University, Jinzhou, China","institution_ids":["https://openalex.org/I97009856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083349103"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":2.5979,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90379812,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"12","issue":"2","first_page":"814","last_page":"822"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6554723381996155},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.48026490211486816},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.46666043996810913},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.46110281348228455},{"id":"https://openalex.org/keywords/stochastic-process","display_name":"Stochastic process","score":0.42561596632003784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34939098358154297},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32099175453186035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1848255693912506},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.17432335019111633},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.13597261905670166},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12837126851081848},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10958334803581238},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09801608324050903}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6554723381996155},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.48026490211486816},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.46666043996810913},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.46110281348228455},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.42561596632003784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34939098358154297},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32099175453186035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1848255693912506},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.17432335019111633},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.13597261905670166},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12837126851081848},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10958334803581238},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09801608324050903},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3519624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3519624","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1492753165","display_name":null,"funder_award_id":"U21A20477","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G534987079","display_name":null,"funder_award_id":"62463005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5767325880","display_name":null,"funder_award_id":"62463007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6115563519","display_name":null,"funder_award_id":"2022YFB4701302","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7933371502","display_name":null,"funder_award_id":"62073011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2036033662","https://openalex.org/W2039148409","https://openalex.org/W2042960896","https://openalex.org/W2064284013","https://openalex.org/W2068740779","https://openalex.org/W2105773843","https://openalex.org/W2123990969","https://openalex.org/W2125794835","https://openalex.org/W2165519686","https://openalex.org/W2169239645","https://openalex.org/W2322427245","https://openalex.org/W2528207313","https://openalex.org/W2555431798","https://openalex.org/W2787341959","https://openalex.org/W2795347454","https://openalex.org/W2896442278","https://openalex.org/W2963441278","https://openalex.org/W2963712738","https://openalex.org/W2990170928","https://openalex.org/W3081270886","https://openalex.org/W4225391069","https://openalex.org/W4225777933","https://openalex.org/W4229706427","https://openalex.org/W4232242513","https://openalex.org/W4288772231","https://openalex.org/W4386536246"],"related_works":["https://openalex.org/W2385031275","https://openalex.org/W2790138121","https://openalex.org/W2610549918","https://openalex.org/W2964166404","https://openalex.org/W2971501545","https://openalex.org/W2995980218","https://openalex.org/W4224903450","https://openalex.org/W2734555013","https://openalex.org/W2778462195","https://openalex.org/W3177248053"],"abstract_inverted_index":{"This":[0,59],"paper":[1],"considers":[2],"the":[3,16,20,41,49,54,64,72,93,101,110,114,117,127,135,150,154,173],"security":[4,162],"of":[5,15,43,56,66,95,112,149],"cyber-physical":[6],"systems":[7],"(CPSs)":[8],"subject":[9],"to":[10,19,38,105,139,169],"replay":[11,44,87,107,140],"attacks":[12],"with":[13],"measurements":[14],"sensor":[17],"transmitted":[18],"remote":[21],"estimator":[22],"over":[23],"a":[24,30,78,91,146],"wireless":[25],"communication":[26],"network.":[27],"We":[28],"present":[29],"novel":[31],"stochastic":[32],"event-triggered":[33],"feedback":[34],"physical":[35,57,68,97],"watermarking":[36],"technique":[37],"effectively":[39],"mitigate":[40],"impact":[42],"attacks,":[45],"while":[46],"simultaneously":[47],"addressing":[48],"performance":[50,82],"degradation":[51],"caused":[52],"by":[53],"inclusion":[55],"watermarks.":[58],"innovative":[60],"approach":[61],"dynamically":[62],"adjusts":[63],"probability":[65,94],"adding":[67,96],"watermarks":[69,98],"based":[70],"on":[71],"system's":[73,151],"current":[74],"operational":[75],"state,":[76],"striking":[77],"balance":[79],"between":[80],"optimal":[81],"and":[83,116,133,153,159,171],"effective":[84],"countermeasures":[85],"against":[86],"attacks.":[88,108,141],"And,":[89],"as":[90],"result,":[92],"increases":[99],"when":[100],"system":[102,115,128,136],"is":[103],"subjected":[104,138],"malicious":[106],"Furthermore,":[109],"performances":[111],"both":[113],"detector":[118],"are":[119,167],"thoroughly":[120],"characterized":[121],"in":[122,157],"two":[123],"distinct":[124],"scenarios:":[125],"(i)":[126],"operating":[129],"under":[130],"normal":[131],"conditions,":[132],"(ii)":[134],"being":[137],"These":[142],"scenarios":[143],"allow":[144],"for":[145],"comprehensive":[147],"evaluation":[148],"capabilities":[152],"detector's":[155],"efficacy":[156],"detecting":[158],"mitigating":[160],"potential":[161],"threats.":[163],"Finally,":[164],"simulation":[165],"examples":[166],"provided":[168],"corroborate":[170],"illustrate":[172],"theoretical":[174],"results.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
