{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:02:20Z","timestamp":1744434140809},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:00:00Z","timestamp":1673395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:00:00Z","timestamp":1673395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11432-021-3428-y","type":"journal-article","created":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T13:04:34Z","timestamp":1673701474000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Nonlinear fusion estimation for false data injection attack signals in cyber-physical systems"],"prefix":"10.1007","volume":"66","author":[{"given":"Yawen","family":"Tan","sequence":"first","affiliation":[]},{"given":"Pindi","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"3428_CR1","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/JAS.2019.1911531","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L, Ma L F, Zhang J, et al. Sliding mode control for nonlinear Markovian jump systems under denial-of-service attacks. IEEE CAA J Autom Sin, 2019, 7: 1638\u20131648","journal-title":"IEEE CAA J Autom Sin"},{"key":"3428_CR2","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSMC.2020.3041121","volume":"51","author":"D Ding","year":"2021","unstructured":"Ding D, Han Q L, Ge X H, et al. Secure state estimation and control of cyber-physical systems: a survey. IEEE Trans Syst Man Cybern Syst, 2021, 51: 176\u2013190","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"3428_CR3","doi-asserted-by":"publisher","first-page":"108557","DOI":"10.1016\/j.automatica.2019.108557","volume":"109","author":"X H Ge","year":"2019","unstructured":"Ge X H, Han Q L, Zhong M Y, et al. Distributed Krein space-based attack detection over sensor networks under deception attacks. Automatica, 2019, 109: 108557","journal-title":"Automatica"},{"key":"3428_CR4","first-page":"2292","volume":"47","author":"P D Weng","year":"2021","unstructured":"Weng P D, Chen B, Yu L. Fusion estimate of FDI attack signals (in Chinese). Acta Autom Sin, 2021, 47: 2292\u20132300","journal-title":"Acta Autom Sin"},{"key":"3428_CR5","first-page":"1487","volume":"67","author":"L J Gao","year":"2019","unstructured":"Gao L J, Chen B, Yu L. Fusion-based FDI attack detection in cyber-physical systems. IEEE Trans Circ Syst II, 2019, 67: 1487\u20131491","journal-title":"IEEE Trans Circ Syst II"},{"key":"3428_CR6","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1016\/j.automatica.2004.01.014","volume":"40","author":"S L Sun","year":"2004","unstructured":"Sun S L, Deng Z L. Multi-sensor optimal information fusion Kalman filter. Automatica, 2004, 40: 1017\u20131023","journal-title":"Automatica"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3428-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3428-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3428-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T15:12:27Z","timestamp":1724857947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3428-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,11]]},"references-count":6,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["3428"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3428-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2023,1,11]]},"assertion":[{"value":"12 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"179203"}}