{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T05:54:39Z","timestamp":1720245279923},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Media Lab Asia (Visvesvaraya Ph.D. Scheme for Electronics and IT at IIT Delhi (MI01182)) through the Department of DeitY Government of India"},{"DOI":"10.13039\/501100007488","name":"Brigadier Bhopinder Singh Chair, Indian Institute of Technology Delhi, New Delhi, India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007488","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2020.3031378","type":"journal-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:28:17Z","timestamp":1602790097000},"page":"1424-1439","source":"Crossref","is-referenced-by-count":9,"title":["Defending False Data Injection on State Estimation Over Fading Wireless Channels"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8548-7094","authenticated-orcid":false,"given":"Saptarshi","family":"Ghosh","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0612-594X","authenticated-orcid":false,"given":"Manav R.","family":"Bhatnagar","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2247-2458","authenticated-orcid":false,"given":"Walid","family":"Saad","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2062-2889","authenticated-orcid":false,"given":"Bijaya K.","family":"Panigrahi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2006.1708970"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1057\/jors.1985.165"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2769121"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2549640"},{"key":"ref30","author":"vanderbei","year":"2004","journal-title":"Linear Programming Foundations and Extensions"},{"key":"ref37","article-title":"Uniqueness of solution in linear programming","author":"mangasarian","year":"1978"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2382095"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2691352"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2787988"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503599"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2749959"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2760804"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653665"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646424"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2610582"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/18.490565"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2281192"},{"key":"ref27","author":"mathai","year":"1992","journal-title":"Quadratic Forms in Random Variables"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2174247"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2775344"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2780172"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2852003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883144"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2386615"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref1","article-title":"Graph-theoretic framework for unified analysis of observability and data injection attacks in the smart grid","author":"sanjab","year":"2018","journal-title":"arXiv 1801 08951"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2561266"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550218"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2788040"},{"key":"ref24","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2798817"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/3315199"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09224789.pdf?arnumber=9224789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:39Z","timestamp":1652194359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9224789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.3031378","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}