{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:40:11Z","timestamp":1733359211705,"version":"3.30.1"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1016\/j.neucom.2024.128942","type":"journal-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T08:05:46Z","timestamp":1732176346000},"page":"128942","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data"],"prefix":"10.1016","volume":"616","author":[{"given":"Shan","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3557-391X","authenticated-orcid":false,"given":"Yuqing","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Lingying","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Luan","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.neucom.2024.128942_b1","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1109\/TAC.2017.2753466","article-title":"Data-driven coordinated attack policy design based on adaptive L2-gain optimal theory","volume":"63","author":"An","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b2","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/JPROC.2006.887288","article-title":"A survey of recent results in networked control systems","volume":"95","author":"Hespanha","year":"2007","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.neucom.2024.128942_b3","series-title":"Proceedings the 28th International Conference on Distributed Computing Systems Workshops","first-page":"495","article-title":"Secure control: Towards survivable cyber\u2013physical systems","author":"Cardenas","year":"2008"},{"issue":"6","key":"10.1016\/j.neucom.2024.128942_b4","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","article-title":"Secure estimation and control for cyber\u2013physical systems under adversarial attacks","volume":"59","author":"Fawzi","year":"2014","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b5","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proc. IEEE"},{"issue":"10","key":"10.1016\/j.neucom.2024.128942_b6","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TAC.2015.2461851","article-title":"Jamming attacks on remote state estimation in cyber\u2013physical systems: A game-theoretic approach","volume":"60","author":"Li","year":"2015","journal-title":"IEEE Trans. Autom. Control"},{"year":"2010","author":"Alpcan","series-title":"Network Security: A Decision and Game-Theoretic Approach","key":"10.1016\/j.neucom.2024.128942_b7"},{"key":"10.1016\/j.neucom.2024.128942_b8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.automatica.2017.01.031","article-title":"Resilient control under denial-of-service: Robust design","volume":"79","author":"Feng","year":"2017","journal-title":"Automatica"},{"issue":"6","key":"10.1016\/j.neucom.2024.128942_b9","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TAC.2017.2751999","article-title":"Input-to-state stabilizing control for cyber\u2013physical systems with multiple transmission channels under denial of service","volume":"63","author":"Lu","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"issue":"7","key":"10.1016\/j.neucom.2024.128942_b10","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1109\/TCYB.2020.2973303","article-title":"Distributed secure control against denial-of-service attacks in cyber\u2013physical systems based on k-connected communication topology","volume":"50","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Cybern."},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b11","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.neucom.2024.128942_b12","series-title":"Proceedings of 2010 First IEEE International Conference on Smart Grid Communications","first-page":"226","article-title":"False data injection attacks in electricity markets","author":"Xie","year":"2010"},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"12","key":"10.1016\/j.neucom.2024.128942_b14","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.1109\/TAC.2017.2714903","article-title":"On Kalman filtering with compromised sensors: Attack stealthiness and performance bounds","volume":"62","author":"Bai","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"doi-asserted-by":"crossref","unstructured":"C.Z. Bai, F. Pasqualetti, V. Gupta, Security in stochastic control systems: Fundamental limitations and performance bounds, in: Proceedings of 2015 American Control Conference, ACC, 2015, pp. 195\u2013200.","key":"10.1016\/j.neucom.2024.128942_b15","DOI":"10.1109\/ACC.2015.7170734"},{"issue":"2","key":"10.1016\/j.neucom.2024.128942_b16","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TAC.2016.2565379","article-title":"The performance and limitations of \u03f5-stealthy attacks on higher order systems","volume":"62","author":"Kung","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCNS.2016.2570003","article-title":"Optimal linear cyber-attack on remote state estimation","volume":"4","author":"Guo","year":"2017","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"2","key":"10.1016\/j.neucom.2024.128942_b18","first-page":"3527","article-title":"An optimal linear attack strategy on remote state estimation","volume":"53","author":"Liu","year":"2020","journal-title":"Proc. Int. Fed. Autom. Control"},{"key":"10.1016\/j.neucom.2024.128942_b19","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.automatica.2017.11.018","article-title":"Worst-case stealthy innovation-based linear attack on remote state estimation","volume":"89","author":"Guo","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2024.128942_b20","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1016\/j.ins.2019.01.001","article-title":"Optimal stealthy false data injection attacks in cyber\u2013physical systems","volume":"481","author":"Li","year":"2019","journal-title":"Inform. Sci."},{"key":"10.1016\/j.neucom.2024.128942_b21","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.neucom.2020.08.007","article-title":"Optimal stealthy switching location attacks against remote state estimation in cyber\u2013physical systems","volume":"421","author":"Li","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2024.128942_b22","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.neucom.2022.05.085","article-title":"Optimal innovation-based deception attacks with side information against remote state estimation in cyber\u2013physical systems","volume":"500","author":"Li","year":"2022","journal-title":"Neurocomputing"},{"issue":"3","key":"10.1016\/j.neucom.2024.128942_b23","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TCNS.2017.2648508","article-title":"Detection against linear deception attacks on multi-sensor remote state estimation","volume":"5","author":"Li","year":"2018","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"2","key":"10.1016\/j.neucom.2024.128942_b24","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TCNS.2019.2927594","article-title":"Security against false data-injection attack in cyber\u2013physical systems","volume":"7","author":"Chattopadhyay","year":"2020","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"6","key":"10.1016\/j.neucom.2024.128942_b25","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TAC.2017.2751999","article-title":"Input-to-state stabilizing control for cyber\u2013physical systems with multiple transmission channels under denial of service","volume":"63","author":"Lu","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2024.128942_b26","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1016\/j.neucom.2020.10.055","article-title":"State estimation of CPSs with deception attacks: Stability analysis and approximate computation","volume":"423","author":"Zhao","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2024.128942_b27","article-title":"Secure state estimation for artificial neural networks with unknown-but-bounded noises: A homomorphic encryption scheme","author":"Zhu","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"8","key":"10.1016\/j.neucom.2024.128942_b28","doi-asserted-by":"crossref","first-page":"4999","DOI":"10.1109\/TSMC.2024.3391065","article-title":"Privacy-preserving control for 2-D systems with guaranteed probability","volume":"54","author":"Zhu","year":"2024","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"year":"2016","author":"Jiang","series-title":"Variational deep embedding: An unsupervised and generative approach to clustering","key":"10.1016\/j.neucom.2024.128942_b29"},{"year":"2000","author":"Kailath","series-title":"Linear Estimation","key":"10.1016\/j.neucom.2024.128942_b30"},{"issue":"1","key":"10.1016\/j.neucom.2024.128942_b31","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TSP.2018.2879037","article-title":"Secure state estimation against integrity attacks: A Gaussian mixture model approach","volume":"67","author":"Guo","year":"2019","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"10.1016\/j.neucom.2024.128942_b32","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1109\/TSMC.2019.2924976","article-title":"Optimal stealthy innovation-based attacks with historical data in cyber\u2013physical systems","volume":"51","author":"Li","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"doi-asserted-by":"crossref","unstructured":"Y. Mo, B. Sinopoli, Secure control against replay attacks, in: Proceedings of 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009, pp. 911\u2013918.","key":"10.1016\/j.neucom.2024.128942_b33","DOI":"10.1109\/ALLERTON.2009.5394956"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231224017132?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231224017132?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:12:15Z","timestamp":1733357535000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231224017132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":33,"alternative-id":["S0925231224017132"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2024.128942","relation":{},"ISSN":["0925-2312"],"issn-type":[{"type":"print","value":"0925-2312"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2024.128942","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"128942"}}