{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T13:11:48Z","timestamp":1724937108955},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61621004","61420106016","61773097"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011248","name":"State Key Laboratory of Synthetical Automation for Process Industries","doi-asserted-by":"publisher","award":["2018ZCX03"],"id":[{"id":"10.13039\/501100011248","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1016\/j.ins.2019.08.052","type":"journal-article","created":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T23:25:29Z","timestamp":1566861929000},"page":"92-104","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":47,"special_numbering":"C","title":["False data injection attacks against state estimation in the presence of sensor failures"],"prefix":"10.1016","volume":"508","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9132-3483","authenticated-orcid":false,"given":"An-Yang","family":"Lu","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8911-0112","authenticated-orcid":false,"given":"Guang-Hong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.ins.2019.08.052_bib0001","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1109\/TAC.2017.2753466","article-title":"Data-driven coordinated attack policy design based on adaptive L2-gain optimal theory","volume":"63","author":"An","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"issue":"12","key":"10.1016\/j.ins.2019.08.052_bib0002","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TAC.2016.2539221","article-title":"Distributed covariance intersection fusion estimation for cyber-physical systems with communication constraints","volume":"61","author":"Chen","year":"2016","journal-title":"IEEE Trans. Autom. Control"},{"issue":"5","key":"10.1016\/j.ins.2019.08.052_bib0003","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","article-title":"A survey on model-based distributed control and filtering for industrial cyber-physical systems","volume":"15","author":"Ding","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.ins.2019.08.052_bib0004","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","article-title":"A survey on security control and attack detection for industrial cyber-physical systems","volume":"275","author":"Ding","year":"2018","journal-title":"Neurocomputing"},{"issue":"5","key":"10.1016\/j.ins.2019.08.052_bib0005","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/TSMC.2016.2616544","article-title":"Security control for discrete-time stochastic nonlinear systems subject to deception attacks","volume":"48","author":"Ding","year":"2018","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"10.1016\/j.ins.2019.08.052_bib0006","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.ins.2018.07.051","article-title":"Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of smart grid","volume":"479","author":"Durgadevi","year":"2019","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.ins.2019.08.052_bib0007","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/TSG.2016.2581588","article-title":"A cyber-physical control framework for transient stability in smart grids","volume":"9","author":"Farraj","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"10.1016\/j.ins.2019.08.052_bib0008","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","article-title":"Secure estimation and control for cyber-physical systems under adversarial attacks","volume":"59","author":"Fawzi","year":"2014","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.08.052_bib0009","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2017.2769722","article-title":"Distributed event-triggered estimation over sensor networks: a survey","author":"Ge","year":"2019","journal-title":"IEEE Trans. Cybern."},{"issue":"8","key":"10.1016\/j.ins.2019.08.052_bib0010","doi-asserted-by":"crossref","first-page":"1807","DOI":"10.1109\/TCYB.2016.2570860","article-title":"Consensus of multiagent systems subject to partially accessible and overlapping Markovian network topologies","volume":"47","author":"Ge","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.08.052_bib0011","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ins.2015.07.047","article-title":"Distributed networked control systems: a brief overview","volume":"380","author":"Ge","year":"2017","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.ins.2019.08.052_bib0012","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1016\/j.epsr.2007.05.021","article-title":"Identification of interacting bad data in the framework of the weighted least square method","volume":"78","author":"Granelli","year":"2008","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ins.2019.08.052_bib0013","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.ins.2016.08.092","article-title":"Special issue on recent developments in distributed networked control systems","volume":"370\u2013371","author":"Han","year":"2016","journal-title":"Inf. Sci."},{"issue":"12","key":"10.1016\/j.ins.2019.08.052_bib0014","doi-asserted-by":"crossref","first-page":"3194","DOI":"10.1109\/TAC.2014.2351625","article-title":"Efficient computations of a security index for false data attacks in power networks","volume":"59","author":"Hendrickx","year":"2014","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.08.052_bib0015","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.automatica.2017.09.028","article-title":"State estimation under false data injection attacks: security analysis and system protection","volume":"87","author":"Hu","year":"2018","journal-title":"Automatica"},{"issue":"3","key":"10.1016\/j.ins.2019.08.052_bib0016","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TSG.2012.2195338","article-title":"Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks","volume":"3","author":"Hug","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"10.1016\/j.ins.2019.08.052_bib0017","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious data attacks on the smart grid","volume":"2","author":"Kosut","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.ins.2019.08.052_bib0018","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2019.2915942","article-title":"Resilient observer-based control for cyber-physical systems with multiple transmission channels under denial-of-service","author":"Lu","year":"2019","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.08.052_sbref0019","article-title":"Secure state estimation for distributed control systems with faulty and malicious agents","author":"Lu","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.08.052_bib0020","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.ins.2017.07.029","article-title":"Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer","volume":"417","author":"Lu","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.052_bib0021","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1016\/j.ins.2019.01.001","article-title":"Optimal stealthy false data injection attacks in cyber-physical systems","volume":"481","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"issue":"8","key":"10.1016\/j.ins.2019.08.052_bib0022","doi-asserted-by":"crossref","first-page":"1446","DOI":"10.1109\/TCYB.2013.2286209","article-title":"Fault detection in finite frequency domain for Takagi-Sugeno fuzzy systems with sensor faults","volume":"44","author":"Li","year":"2014","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"10.1016\/j.ins.2019.08.052_bib0023","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","article-title":"A review of false data injection attacks against modern power systems","volume":"8","author":"Liang","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"10.1016\/j.ins.2019.08.052_bib0024","doi-asserted-by":"crossref","first-page":"3864","DOI":"10.1109\/TPWRS.2015.2504950","article-title":"Vulnerability analysis and consequences of false data injection attack on power system state estimation","volume":"31","author":"Liang","year":"2016","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"10.1016\/j.ins.2019.08.052_bib0025","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/j.ins.2019.08.052_bib0026","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ins.2018.04.010","article-title":"Reconfiguration-based methodology for improving recovery performance of faults in smart grids","volume":"454\u2013455","author":"Meskina","year":"2018","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2019.08.052_bib0027","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/TCNS.2016.2607420","article-title":"Attack-resilient state estimation for noisy dynamical systems","volume":"4","author":"Pajic","year":"2017","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"10.1016\/j.ins.2019.08.052_bib0028","article-title":"Fault-tolerant consensus tracking control for linear multiagent systems under switching directed network","author":"Wang","year":"2019","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.08.052_bib0029","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.automatica.2018.01.026","article-title":"Network-based modelling and dynamic output feedback control for unmanned marine vehicles","volume":"96","author":"Wang","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2019.08.052_bib0030","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.ins.2015.08.049","article-title":"Fault detection filter design for data reconstruction-based continuous-time networked control systems","volume":"328","author":"Wang","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.052_bib0031","doi-asserted-by":"crossref","first-page":"8183","DOI":"10.1109\/ACCESS.2017.2680463","article-title":"Low-sparsity unobservable attacks against smart grid: attack exposure analysis and a data-driven attack scheme","volume":"5","author":"Xie","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2019.08.052_sbref0032","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.ins.2016.02.019","article-title":"Distributed formation control for teleoperating cyber-physical system under time delay and actuator saturation constrains","volume":"370\u2013371","author":"Yan","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2019.08.052_bib0033","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2019.2915124","article-title":"Summation detector for false data injection attack in cyber-physical systems","author":"Ye","year":"2019","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"10.1016\/j.ins.2019.08.052_bib0034","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1109\/TSG.2014.2382714","article-title":"Blind false data injection attack using PCA approximation method in smart grid","volume":"6","author":"Yu","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"issue":"7","key":"10.1016\/j.ins.2019.08.052_bib0035","doi-asserted-by":"crossref","first-page":"3354","DOI":"10.1109\/TAC.2016.2642403","article-title":"Minimum sparsity of unobservable power network attacks","volume":"62","author":"Zhao","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"10.1016\/j.ins.2019.08.052_bib0036","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","article-title":"MATPOWER steady-state operations, planning and analysis tools for power systems research and education","volume":"26","author":"Zimmerman","year":"2011","journal-title":"IEEE Trans. Power Syst."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519308011?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519308011?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T12:14:13Z","timestamp":1610885653000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025519308011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":36,"alternative-id":["S0020025519308011"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.052","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2020,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"False data injection attacks against state estimation in the presence of sensor failures","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.052","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}