{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T06:34:40Z","timestamp":1776839680480,"version":"3.51.2"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T00:00:00Z","timestamp":1546560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11424-018-8067-y","type":"journal-article","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T04:39:38Z","timestamp":1547095178000},"page":"1290-1305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Optimal Switching Integrity Attacks on Sensors in Industrial Control Systems"],"prefix":"10.1007","volume":"32","author":[{"given":"Guangyu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jian","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"issue":"6","key":"8067_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MNET.2010.5634434","volume":"24","author":"T Chen","year":"2010","unstructured":"Chen T, Stuxnet, the real start of cyber warfare?, IEEE Network, 2010, 24(6): 2\u20133.","journal-title":"IEEE Network"},{"issue":"3","key":"8067_CR2","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TAC.2013.2279896","volume":"59","author":"M Zhu","year":"2014","unstructured":"Zhu M and Martinez S, On the performance analysis of resilient networked control systems under replay attacks, IEEE Trans. Automatic Control, 2014, 59(3): 804\u2013808.","journal-title":"IEEE Trans. Automatic Control"},{"key":"8067_CR3","volume-title":"Proceedings of the 16th ACM conference on Computer and communications security Chicago","author":"Y Liu","year":"2009","unstructured":"Liu Y, Ning P, and Reiter M, False data injection attacks against state estimation in electric power grids, Proceedings of the 16th ACM conference on Computer and communications security Chicago, 2009."},{"key":"8067_CR4","volume-title":"Proceedings of the American Control Conference","author":"A Hoehn","year":"2016","unstructured":"Hoehn A and Zhang P, Detection of covert attacks and zero dynamics attacks in cyber-physical systems, Proceedings of the American Control Conference, Boston, 2016."},{"key":"8067_CR5","volume-title":"Proceedings of the 53rd IEEE Conference on Decision and Control","author":"F Miao","year":"2014","unstructured":"Miao F and Zhuo Q, A moving-horizon hybrid stochastic game for secure control of cyber-physical systems, Proceedings of the 53rd IEEE Conference on Decision and Control, Los Angeles, 2014."},{"issue":"12","key":"8067_CR6","first-page":"3209","volume":"59","author":"K Vamvoudakis","year":"2014","unstructured":"Vamvoudakis K, Hespanha J, and Sinopoli Band Mo Y, Detection in adversarial environments, IEEE Trans. Control System Technology, 2014, 59(12): 3209\u20133223.","journal-title":"IEEE Trans. Control System Technology"},{"issue":"4","key":"8067_CR7","first-page":"1396","volume":"22","author":"Y Mo","year":"2014","unstructured":"Mo Y, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Automatic Control, 2014, 22(4): 1396\u20131407.","journal-title":"IEEE Trans. Automatic Control"},{"issue":"4","key":"8067_CR8","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","volume":"2","author":"L Xie","year":"2011","unstructured":"Xie L, Mo Y, and Sinopoli B, False data injection attacks in electricity markets, IEEE Trans. Smart Grid, 2011, 2(4): 659\u2013666.","journal-title":"IEEE Trans. Smart Grid"},{"key":"8067_CR9","volume-title":"Proceedings of the 51st IEEE Conference on Decision and Control Hawaii","author":"F Pasqualetti","year":"2012","unstructured":"Pasqualetti F, Dorfler F, and Bullo F, Cyber-physical security via geometric control: Distributed monitoring and malicious attacks, Proceedings of the 51st IEEE Conference on Decision and Control Hawaii, 2012."},{"issue":"3","key":"8067_CR10","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TPDS.2013.92","volume":"25","author":"Q Yang","year":"2014","unstructured":"Yang Q, Yang J, Yu W, et al., On false data-injection attacks against power system state estimation: Modeling and countermeasures, IEEE Trans. Parallel and Distributed Systems, 2014, 25(3): 717\u2013729.","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"issue":"5","key":"8067_CR11","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1109\/TSP.2014.2385670","volume":"63","author":"J Kim","year":"2015","unstructured":"Kim J, Tong L, and Thomas R, Subspace methods for data attack on state estimation: A data driven approach, IEEE Trans. Signal Processing, 2015, 63(5): 1102\u20131114.","journal-title":"IEEE Trans. Signal Processing"},{"issue":"5","key":"8067_CR12","first-page":"1198","volume":"11","author":"J Hao","year":"2015","unstructured":"Hao J, Piechocki R, Kaleshi D, et al., Sparse malicious false data injection attacks and defense mechanisms in smart grids, IEEE Trans. Smart Grid, 2015, 11(5): 1198\u20131209.","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"8067_CR13","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TCST.2015.2462741","volume":"24","author":"H Zhang","year":"2016","unstructured":"Zhang H, Cheng P, Shi L, et al., Optimal DoS attack scheduling in wireless networked control system, IEEE Trans. Control System Technology, 2016, 24(3): 843\u2013852.","journal-title":"IEEE Trans. Control System Technology"},{"issue":"11","key":"8067_CR14","doi-asserted-by":"publisher","first-page":"3023","DOI":"10.1109\/TAC.2015.2409905","volume":"60","author":"H Zhang","year":"2015","unstructured":"Zhang H, Cheng P, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint, IEEE Trans. Automatic Control, 2015, 60(11): 3023\u20133028.","journal-title":"IEEE Trans. Automatic Control"},{"issue":"4","key":"8067_CR15","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1109\/TII.2017.2676005","volume":"13","author":"A Sa","year":"2017","unstructured":"Sa A, Carmo L, and Machado R, Covert attacks in cyber-physical control systems, IEEE Trans. Industrial Informatics, 2017, 13(4): 1641\u20131651.","journal-title":"IEEE Trans. Industrial Informatics"},{"issue":"9","key":"8067_CR16","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1109\/TAC.2015.2498708","volume":"61","author":"Y Mo","year":"2016","unstructured":"Mo Y and Sinopoli B, On the performance degradation of cyber-physical systems under stealthy integrity attacks, IEEE Trans. Automatic Control, 2016, 61(9): 2618\u20132624.","journal-title":"IEEE Trans. Automatic Control"},{"issue":"9","key":"8067_CR17","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TAC.2007.904451","volume":"52","author":"M Shaikh","year":"2007","unstructured":"Shaikh M and Caines P, On the hybrid optimal control problem: Theory and algorithms, IEEE Trans. Automatic Control, 2007, 52(9): 1587\u20131603.","journal-title":"IEEE Trans. Automatic Control"},{"issue":"6","key":"8067_CR18","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1109\/TNNLS.2013.2288067","volume":"25","author":"A Heydari","year":"2014","unstructured":"Heydari A and Balakrishnan S, Optimal switching and control of nonlinear switching systems using approximate dynamic programming, IEEE Trans. Neural Networks and Learning Systems, 2014, 25(6): 1106\u20131117.","journal-title":"IEEE Trans. Neural Networks and Learning Systems"},{"issue":"1","key":"8067_CR19","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TAC.2003.821417","volume":"49","author":"X Xu","year":"2014","unstructured":"Xu X and Antsaklis P, Optimal control of switched systems based on parameterization of the switching instants, IEEE Trans. Automatic Control, 2014, 49(1): 2\u201316.","journal-title":"IEEE Trans. Automatic Control"},{"key":"8067_CR20","volume-title":"Proceedings of the 55th IEEE Conference on Decision and Control","author":"B Stellato","year":"2016","unstructured":"Stellato B, Blobaum S, and Goulart P, Optimal control of switching times in switched linear systems, Proceedings of the 55th IEEE Conference on Decision and Control, Las Vegas, 2016."},{"issue":"1","key":"8067_CR21","first-page":"11","volume":"41","author":"S Bengea","year":"2005","unstructured":"Bengea S and DeCarlo R, Optimal control of switching systems, Automatica, 2005, 41(1): 11\u201327.","journal-title":"Automatica"},{"issue":"5","key":"8067_CR22","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1016\/j.automatica.2007.10.008","volume":"44","author":"T Das","year":"2008","unstructured":"Das T and Mukherjee R, Optimally switched linear systems, Automatica, 2008, 44(5): 1437\u20131441.","journal-title":"Automatica"},{"issue":"16","key":"8067_CR23","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1080\/00207170050163387","volume":"73","author":"W Lu","year":"2000","unstructured":"Lu W, Balas G, and Lee E, Linear quadratic performance with worst case disturbance rejection, International Journal of Control, 2000, 73(16): 1516\u20131524.","journal-title":"International Journal of Control"},{"issue":"3","key":"8067_CR24","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/87.845876","volume":"8","author":"K Johansson","year":"2000","unstructured":"Johansson K, The quadruple-tank process: A multivariable laboratory process with an adjustable zero, IEEE Trans. Control Systems Technology, 2000, 8(3): 456\u2013465.","journal-title":"IEEE Trans. Control Systems Technology"},{"issue":"2","key":"8067_CR25","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TIE.2013.2253073","volume":"61","author":"A Ahmadi","year":"2013","unstructured":"Ahmadi A, Salmasi F, Noori-Manzar M, et al., Speed sensorless and sensor-fault tolerant optimal PI regulator for networked DC motor system with unknown time-delay and packet dropout, IEEE Trans. Industrial Electronics, 2013, 61(2): 708\u2013717.","journal-title":"IEEE Trans. Industrial Electronics"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-8067-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-018-8067-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-8067-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T00:13:06Z","timestamp":1578096786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-018-8067-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["8067"],"URL":"https:\/\/doi.org\/10.1007\/s11424-018-8067-y","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,4]]},"assertion":[{"value":"9 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}