{"id":"https://openalex.org/W4388717297","doi":"https://doi.org/10.48550/arxiv.2311.08207","title":"Online Data-driven Control Against False Data Injection Attacks","display_name":"Online Data-driven Control Against False Data Injection Attacks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4388717297","doi":"https://doi.org/10.48550/arxiv.2311.08207"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2311.08207","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2311.08207","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114833203","display_name":"Wenjie Liu","orcid":"https://orcid.org/0000-0002-5678-7346"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Wenjie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093208620","display_name":"Lidong Li","orcid":"https://orcid.org/0000-0001-9578-4239"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Lidong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100701131","display_name":"Jian Sun","orcid":"https://orcid.org/0000-0001-9898-3129"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sun, Jian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108050766","display_name":"Fang Deng","orcid":"https://orcid.org/0000-0002-1111-7285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deng, Fang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367403","display_name":"Gang Wang","orcid":"https://orcid.org/0000-0002-7266-2412"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Gang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333005","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0003-2449-9793"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Jie","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.813179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":82},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.48048392}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.66216826},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6504477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6258138},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.48048392},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.45799878},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.44911775},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4147956},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17944595},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1428715},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2311.08207","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2311.08207","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2311.08207","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387171935","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W4377970398","https://openalex.org/W4230824443","https://openalex.org/W3026018975","https://openalex.org/W2765763546","https://openalex.org/W2185673024","https://openalex.org/W2142794587","https://openalex.org/W1484565796"],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,14,22,81,116,122,146,165,168,210],"cyber-security":[3],"concerns":[4],"has":[5,48],"brought":[6],"significant":[7],"attention":[8],"to":[9,89,142,160],"the":[10,19,74,79,93,113,120,143,166,188,190,208],"analysis":[11],"and":[12,27,37,119,136,176,196],"design":[13,80],"cyber-physical":[15],"systems":[16,87],"(CPSs).":[17],"Among":[18],"various":[20],"types":[21],"cyberattacks,":[23],"denial-of-service":[24],"(DoS)":[25],"attacks":[26,32,47,57,91],"false":[28],"data":[29,175],"injection":[30],"(FDI)":[31],"can":[33],"be":[34],"easily":[35],"launched":[36],"have":[38,58],"become":[39],"prominent":[40],"threats.":[41],"While":[42],"resilient":[43],"control":[44,129],"against":[45,55],"DoS":[46],"received":[49],"substantial":[50],"research":[51],"efforts,":[52],"countermeasures":[53],"developed":[54],"FDI":[56,90,103,147,211],"been":[59],"relatively":[60],"limited,":[61],"particularly":[62],"when":[63],"explicit":[64],"system":[65],"models":[66],"are":[67,193],"not":[68],"available.":[69],"To":[70,98],"address":[71],"this":[72,99],"gap,":[73],"present":[75],"paper":[76],"focuses":[77],"on":[78,92,112,134,187],"data-driven":[82],"controllers":[83],"for":[84],"unknown":[85],"linear":[86],"subject":[88],"actuators,":[94],"utilizing":[95],"input-state":[96,138],"data.":[97,179],"end,":[100],"a":[101,162],"general":[102],"attack":[104,117,123],"model":[105],"is":[106,131,150,181],"presented,":[107],"which":[108,140],"imposes":[109],"minimally":[110],"constraints":[111],"switching":[114,145],"frequency":[115],"channels":[118],"magnitude":[121],"matrices.":[124],"A":[125],"dynamic":[126],"state":[127],"feedback":[128],"law":[130],"designed":[132],"based":[133],"offline":[135,173],"online":[137,177],"data,":[139],"adapts":[141],"channel":[144],"attacks.":[148,212],"This":[149],"achieved":[151],"by":[152],"solving":[153],"two":[154],"data-based":[155],"semi-definite":[156],"programs":[157],"(SDPs)":[158],"on-the-fly":[159],"yield":[161],"tight":[163],"approximation":[164],"set":[167],"subsystems":[169],"consistent":[170],"with":[171],"both":[172],"clean":[174],"attack-corrupted":[178],"It":[180],"shown":[182],"that":[183],"under":[184],"mild":[185],"conditions":[186],"attack,":[189],"proposed":[191],"SDPs":[192],"recursively":[194],"feasible":[195],"controller":[197],"achieves":[198],"exponential":[199],"stability.":[200],"Numerical":[201],"examples":[202],"showcase":[203],"its":[204],"effectiveness":[205],"in":[206],"mitigating":[207],"impact":[209]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4388717297","counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-04-17T12:48:26.506596","created_date":"2023-11-16"}