{"id":"https://openalex.org/W2901260105","doi":"https://doi.org/10.1631/fitee.1700334","title":"Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks","display_name":"Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2901260105","doi":"https://doi.org/10.1631/fitee.1700334","mag":"2901260105"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.1700334","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1700334","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065494628","display_name":"Mengzhou Gao","orcid":"https://orcid.org/0000-0003-2250-2127"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng-zhou Gao","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China","Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, 200240, China","State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, 200240, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101535999","display_name":"Dongqin Feng","orcid":"https://orcid.org/0000-0001-6140-5034"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong-qin Feng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065494628"],"corresponding_institution_ids":["https://openalex.org/I4391767838","https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.5518,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.68517353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":"19","issue":"9","first_page":"1098","last_page":"1111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9574999809265137,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.630516529083252},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5622114539146423},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.531886637210846},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5289088487625122},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.48381513357162476},{"id":"https://openalex.org/keywords/stochastic-process","display_name":"Stochastic process","score":0.44180989265441895},{"id":"https://openalex.org/keywords/bernoullis-principle","display_name":"Bernoulli's principle","score":0.44177085161209106},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4102056622505188},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3277750611305237},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27184271812438965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24845299124717712},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.1857011616230011},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13668152689933777},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11743903160095215},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07293003797531128}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.630516529083252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5622114539146423},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.531886637210846},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5289088487625122},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.48381513357162476},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.44180989265441895},{"id":"https://openalex.org/C152361515","wikidata":"https://www.wikidata.org/wiki/Q181328","display_name":"Bernoulli's principle","level":2,"score":0.44177085161209106},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4102056622505188},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3277750611305237},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27184271812438965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24845299124717712},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.1857011616230011},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13668152689933777},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11743903160095215},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07293003797531128},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.1700334","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1700334","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7995022326","display_name":null,"funder_award_id":"61433006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1987806716","https://openalex.org/W1989931931","https://openalex.org/W1998697412","https://openalex.org/W1999563762","https://openalex.org/W2003530067","https://openalex.org/W2006825631","https://openalex.org/W2023772751","https://openalex.org/W2041587044","https://openalex.org/W2043924974","https://openalex.org/W2043973235","https://openalex.org/W2055326651","https://openalex.org/W2081506936","https://openalex.org/W2109972663","https://openalex.org/W2114151726","https://openalex.org/W2147779517","https://openalex.org/W2158469273","https://openalex.org/W2164152021","https://openalex.org/W2290211681","https://openalex.org/W2337446187","https://openalex.org/W2339323489","https://openalex.org/W2383630506","https://openalex.org/W2437511496","https://openalex.org/W2469287823","https://openalex.org/W2518018527","https://openalex.org/W2520033077","https://openalex.org/W2570972465","https://openalex.org/W2582126286","https://openalex.org/W3142476740"],"related_works":["https://openalex.org/W1619264321","https://openalex.org/W2899588557","https://openalex.org/W4254565718","https://openalex.org/W4298392611","https://openalex.org/W3094386089","https://openalex.org/W2180382450","https://openalex.org/W2129020938","https://openalex.org/W1980594489","https://openalex.org/W4253643872","https://openalex.org/W2566241227"],"abstract_inverted_index":{"Security":[0],"issues":[1],"in":[2,11,189,202],"networked":[3],"control":[4],"systems":[5],"(NCSs)":[6],"have":[7,69],"received":[8],"increasing":[9],"attention":[10],"recent":[12],"years.":[13],"However,":[14],"security":[15],"protection":[16,41,115,150,193],"often":[17],"requires":[18],"extra":[19],"energy":[20,55],"consumption,":[21,56],"computational":[22,51],"overhead,":[23,52],"and":[24,33,54,76,81,116,170,180,186,201],"time":[25,199],"delays,":[26],"which":[27],"could":[28],"adversely":[29],"affect":[30],"the":[31,63,77,88,122,143,177,183,191,198,204,210],"real-time":[32],"energy-limited":[34],"system.":[35,173],"In":[36],"this":[37],"paper,":[38],"random":[39,82,113,119,148,152],"cryptographic":[40,60,114,149],"is":[42,45,97,163],"implemented.":[43],"It":[44],"less":[46],"expensive":[47],"with":[48,58,103,155],"respect":[49],"to":[50,208],"time,":[53],"compared":[57],"persistent":[59],"protection.":[61],"Under":[62],"consideration":[64],"of":[65,91,112,118,146,182],"weak":[66],"attackers":[67],"who":[68],"little":[70],"system":[71,102,205],"knowledge,":[72],"ungenerous":[73],"attacking":[74],"capability":[75],"desire":[78],"for":[79,110],"stealthiness":[80],"zero-measurement":[83,120,153],"attacks":[84,154],"are":[85,187],"introduced":[86],"as":[87,99],"malicious":[89],"modification":[90],"measurements":[92],"into":[93,196],"zero":[94],"signals.":[95],"NCS":[96],"modeled":[98],"a":[100,129,156,160,167],"stochastic":[101,108,123,137],"two":[104],"correlated":[105],"Bernoulli":[106],"distributed":[107],"variables":[109],"implementation":[111],"occurrence":[117],"attacks;":[121],"stability":[124,138],"can":[125,140],"be":[126],"analyzed":[127],"using":[128],"linear":[130],"matrix":[131],"inequality":[132],"(LMI)":[133],"approach.":[134],"The":[135,174],"proposed":[136,184],"analysis":[139],"help":[141],"determine":[142],"proper":[144,192],"probability":[145],"running":[147],"against":[151,212],"certain":[157],"probability.":[158],"Finally,":[159],"simulation":[161],"example":[162],"presented":[164],"based":[165],"on":[166],"vertical":[168],"take-off":[169],"landing":[171],"(VTOL)":[172],"results":[175],"show":[176],"effectiveness,":[178],"robustness,":[179],"application":[181],"method,":[185],"helpful":[188],"choosing":[190],"mechanism":[194],"taking":[195],"account":[197],"delay":[200],"determining":[203],"sampling":[206],"period":[207],"increase":[209],"resistance":[211],"such":[213],"attacks.":[214]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
