{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:19:59Z","timestamp":1773973199326,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62573099"],"award-info":[{"award-number":["62573099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Mathematics and Computation"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.amc.2026.129954","type":"journal-article","created":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T10:57:28Z","timestamp":1768474648000},"page":"129954","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Sensor attack detection and identification for cyber-physical systems: A data-driven approach"],"prefix":"10.1016","volume":"520","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1246-2305","authenticated-orcid":false,"given":"Kaiyu","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5725-8956","authenticated-orcid":false,"given":"Dan","family":"Ye","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.amc.2026.129954_bib0001","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"Mo","year":"2014","journal-title":"IEEE Trans. Control Syst. Techn."},{"issue":"2","key":"10.1016\/j.amc.2026.129954_bib0002","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/TSG.2016.2581588","article-title":"A cyber-physical control framework for transient stability in smart grids","volume":"9","author":"Farraj","year":"2018","journal-title":"IEEE Trans. Smart Grid."},{"key":"10.1016\/j.amc.2026.129954_bib0003","article-title":"Fuzzy adaptive resilient decentralized control of nonlinear interconnected cyber-physical systems under false data injection attacks","volume":"469","author":"Fan","year":"2024","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.amc.2026.129954_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2024.112012","article-title":"Stochastic encryption against stealthy attacks in CPSs: a zero-sum game approach","volume":"172","author":"Li","year":"2025","journal-title":"Automatica"},{"issue":"10","key":"10.1016\/j.amc.2026.129954_bib0005","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1080\/00207160.2025.2505024","article-title":"Quantized fuzzy H\u221e control for networked systems with a markovian sensor distortion under hybrid attacks","volume":"102","author":"Wang","year":"2025","journal-title":"Int. J. Comput. Math."},{"key":"10.1016\/j.amc.2026.129954_bib0006","series-title":"Proc. Int. Conf. Crit. Infrastructure Protection","first-page":"73","article-title":"Lessons learned from the maroochy water breach","author":"Slay","year":"2007"},{"issue":"1","key":"10.1016\/j.amc.2026.129954_bib0007","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","article-title":"Stuxnet and the future of cyber war","volume":"53","author":"Farwell","year":"2011","journal-title":"Survival"},{"issue":"2","key":"10.1016\/j.amc.2026.129954_bib0008","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TSG.2022.3199305","article-title":"Data integrity attack detection using ensemble-based learning for cyber-physical power systems","volume":"14","author":"Goyel","year":"2023","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"10.1016\/j.amc.2026.129954_bib0009","doi-asserted-by":"crossref","first-page":"9952","DOI":"10.1109\/TII.2024.3390549","article-title":"Attack detection and mitigation scheme of load frequency control systems against false data injection attacks","volume":"20","author":"Zhao","year":"2024","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"3","key":"10.1016\/j.amc.2026.129954_bib0010","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1109\/TAC.2023.3316160","article-title":"Attack detection and secure state estimation of collectively observable cyber-physical systems under false data injection attacks","volume":"69","author":"Suo","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.amc.2026.129954_bib0011","article-title":"Improving Kalman filter for cyber physical systems subject to replay attacks: an attack-detection-based compensation strategy","volume":"466","author":"Li","year":"2024","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.amc.2026.129954_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.109953","article-title":"Distributed control under compromised measurements: resilient estimation, attack detection, and vehicle platooning","volume":"134","author":"He","year":"2021","journal-title":"Automatica"},{"issue":"10","key":"10.1016\/j.amc.2026.129954_bib0013","doi-asserted-by":"crossref","first-page":"6712","DOI":"10.1109\/TII.2022.3144445","article-title":"Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems","volume":"18","author":"Yan","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"11","key":"10.1016\/j.amc.2026.129954_bib0014","doi-asserted-by":"crossref","first-page":"5275","DOI":"10.1109\/TCYB.2025.3555018","article-title":"Dynamic output feedback linear quadratic control for CPSs under sparse attacks","volume":"55","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Cybernet."},{"issue":"1","key":"10.1016\/j.amc.2026.129954_bib0015","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TPWRS.2022.3167024","article-title":"An online approach to covert attack detection and identification in power systems","volume":"38","author":"Li","year":"2023","journal-title":"IEEE Trans. Power Syst."},{"issue":"9","key":"10.1016\/j.amc.2026.129954_bib0016","doi-asserted-by":"crossref","first-page":"5349","DOI":"10.1109\/TAC.2022.3218545","article-title":"Detection and identification of sparse sensor attacks in cyber-physical systems with side information","volume":"68","author":"Lu","year":"2023","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.amc.2026.129954_bib0017","doi-asserted-by":"crossref","first-page":"24572","DOI":"10.1109\/TASE.2025.3636581","article-title":"Disturbance-utilization data-driven attitude coordination control for multiple UAVs with input saturation and multi-source disturbances","volume":"22","author":"Chen","year":"2025","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"10","key":"10.1016\/j.amc.2026.129954_bib0018","doi-asserted-by":"crossref","first-page":"2615","DOI":"10.1016\/j.automatica.2014.08.022","article-title":"Data-driven realizations of kernel and image representations and their application to fault detection and control system design","volume":"50","author":"Ding","year":"2014","journal-title":"Automatica"},{"issue":"6","key":"10.1016\/j.amc.2026.129954_bib0019","doi-asserted-by":"crossref","first-page":"5404","DOI":"10.1109\/TSG.2025.3590035","article-title":"Load frequency control of smart grid based on data-driven FDI attacks detection and data repair","volume":"16","author":"Cui","year":"2025","journal-title":"IEEE Trans. Smart Grid."},{"issue":"10","key":"10.1016\/j.amc.2026.129954_bib0020","doi-asserted-by":"crossref","first-page":"6330","DOI":"10.1109\/TAC.2022.3230360","article-title":"Data-driven attack detection and identification for cyber-physical systems under sparse sensor attacks","volume":"68","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Autom. Control"},{"issue":"5","key":"10.1016\/j.amc.2026.129954_bib0021","doi-asserted-by":"crossref","first-page":"3812","DOI":"10.1109\/TNSE.2025.3565691","article-title":"Data-driven attack detection and resilient control for heterogeneous nonlinear nonaffine MASs","volume":"12","author":"Yang","year":"2025","journal-title":"IEEE Trans. Netw, Sci. Eng."},{"issue":"4","key":"10.1016\/j.amc.2026.129954_bib0022","doi-asserted-by":"crossref","first-page":"4293","DOI":"10.1109\/TIE.2022.3176301","article-title":"Data-driven cyber-attack detection of intelligent attacks in islanded dc microgrids","volume":"70","author":"Wan","year":"2023","journal-title":"IEEE Trans. ind. Electron."},{"issue":"12","key":"10.1016\/j.amc.2026.129954_bib0023","doi-asserted-by":"crossref","first-page":"8467","DOI":"10.1109\/TII.2022.3149106","article-title":"Data-driven detection of stealthy false data injection attack against power system state estimation","volume":"18","author":"Chen","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"key":"10.1016\/j.amc.2026.129954_bib0024","article-title":"Orthotope-search-expansion-based extended zonotopic kalman filter design for a discrete-time linear parameter-varying system with a dual-noise term","volume":"474","author":"Wang","year":"2024","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.amc.2026.129954_bib0025","article-title":"Set operations and order reductions for constrained zonotopes","volume":"139","author":"Vignesh","year":"2022","journal-title":"Automatica"},{"key":"10.1016\/j.amc.2026.129954_bib0026","series-title":"Technical Report","article-title":"Reachability analysis and its application to the safety assessment of autonomous cars","author":"Althoff","year":"2010"},{"key":"10.1016\/j.amc.2026.129954_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.108867","article-title":"Set-membership estimation for linear time-varying descriptor systems","volume":"115","author":"Tang","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.amc.2026.129954_bib0028","article-title":"Joint state and parameter estimation based on constrained zonotopes","volume":"142","author":"Brenner","year":"2022","journal-title":"Automatica"},{"key":"10.1016\/j.amc.2026.129954_bib0029","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.automatica.2016.02.036","article-title":"Constrained zonotopes: a new tool for set-based estimation and fault detection","volume":"69","author":"Scott","year":"2016","journal-title":"Automatica"},{"key":"10.1016\/j.amc.2026.129954_bib0030","article-title":"Set-valued state estimation of nonlinear discrete-time systems with nonlinear invariants based on constrained zonotopes","volume":"129","author":"Brenner","year":"2021","journal-title":"Automatica"},{"issue":"11","key":"10.1016\/j.amc.2026.129954_bib0031","doi-asserted-by":"crossref","first-page":"6828","DOI":"10.1109\/TAC.2023.3240383","article-title":"Attack detection for cyber-physical systems: a zonotopic approach","volume":"68","author":"Li","year":"2023","journal-title":"IEEE Trans. Autom. Control"},{"issue":"8","key":"10.1016\/j.amc.2026.129954_bib0032","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1109\/TAC.2017.2766759","article-title":"Secure state estimation against sparse sensor attacks with adaptive switching mechanism","volume":"63","author":"An","year":"2018","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Applied Mathematics and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300326000068?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300326000068?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T01:39:23Z","timestamp":1773970763000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096300326000068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":32,"alternative-id":["S0096300326000068"],"URL":"https:\/\/doi.org\/10.1016\/j.amc.2026.129954","relation":{},"ISSN":["0096-3003"],"issn-type":[{"value":"0096-3003","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Sensor attack detection and identification for cyber-physical systems: A data-driven approach","name":"articletitle","label":"Article Title"},{"value":"Applied Mathematics and Computation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.amc.2026.129954","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"129954"}}