{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:06:30Z","timestamp":1776103590013,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100011248","name":"State Key Laboratory of Synthetical Automation for Process Industries","doi-asserted-by":"publisher","award":["2018ZCX03"],"award-info":[{"award-number":["2018ZCX03"]}],"id":[{"id":"10.13039\/501100011248","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20337"],"award-info":[{"award-number":["U23A20337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61621004"],"award-info":[{"award-number":["61621004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.neucom.2026.133171","type":"journal-article","created":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:55:24Z","timestamp":1772207724000},"page":"133171","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Data transmission strategy for non-smart sensors under transmission rate constraints"],"prefix":"10.1016","volume":"678","author":[{"given":"Xiao-Hui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guang-Hong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133171_bib0005","first-page":"36","article-title":"Mechanical design and control of the pendubot","volume":"104","author":"Block","year":"1995","journal-title":"SAE Trans."},{"key":"10.1016\/j.neucom.2026.133171_bib0010","doi-asserted-by":"crossref","first-page":"1697","DOI":"10.1109\/TAC.2023.3328244","article-title":"A lightweight sensor scheduler based on aoi function for remote state estimation over lossy wireless channels","volume":"69","author":"Chang","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0015","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/TWC.2023.3277861","article-title":"Structure-enhanced DRL for optimal transmission scheduling","volume":"23","author":"Chen","year":"2024","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.neucom.2026.133171_bib0020","doi-asserted-by":"crossref","first-page":"3311","DOI":"10.1109\/TCYB.2022.3179280","article-title":"Distributed state estimation over wireless sensor networks with energy harvesting sensors","volume":"53","author":"Chen","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2026.133171_bib0025","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1109\/TII.2020.2981549","article-title":"Distributed resilient control for energy storage systems in cyber\u2013physical microgrids","volume":"17","author":"Deng","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.neucom.2026.133171_bib0030","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/TCYB.2020.2972686","article-title":"Mas-based distributed resilient control for a class of cyber-physical systems with communication delays under DOS attacks","volume":"51","author":"Deng","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2026.133171_bib0035","first-page":"1","article-title":"Stochastic event-triggered estimation with smart sensors over packet-dropping links","author":"Deng","year":"2025","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"10.1016\/j.neucom.2026.133171_bib0040","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","article-title":"A survey on security control and attack detection for industrial cyber-physical systems","volume":"275","author":"Ding","year":"2018","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133171_bib0045","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/TAC.2023.3274792","article-title":"Trust-based distributed secure state estimation against malicious agents via two-hop communication","volume":"69","author":"Gao","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0050","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.automatica.2016.09.015","article-title":"Optimal sensor scheduling for multiple linear dynamical systems","volume":"75","author":"Han","year":"2017","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133171_bib0055","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/23307706.2019.1683901","article-title":"Optimal fusion state estimator for a multi-sensor system subject to multiple packet dropouts","volume":"8","author":"Han","year":"2021","journal-title":"J. Control Decis."},{"key":"10.1016\/j.neucom.2026.133171_bib0060","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security-a survey","volume":"4","author":"Humayed","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2026.133171_bib0065","doi-asserted-by":"crossref","first-page":"4058","DOI":"10.1109\/TASE.2023.3292163","article-title":"Sensor power control for remote state estimation with historical data re-transmission","volume":"21","author":"Kan","year":"2024","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"10.1016\/j.neucom.2026.133171_bib0070","doi-asserted-by":"crossref","first-page":"10398","DOI":"10.1109\/TII.2024.3396553","article-title":"Sensor transmission scheduling over a time-varying channel","volume":"20","author":"Liu","year":"2024","journal-title":"IEEE Trans. Ind. Informat."},{"key":"10.1016\/j.neucom.2026.133171_bib0075","doi-asserted-by":"crossref","first-page":"5953","DOI":"10.1109\/JIOT.2024.3488725","article-title":"Remote state estimation for cyber-physical systems under redundancy transmission protocol","volume":"12","author":"Liu","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2026.133171_bib0080","first-page":"1","article-title":"Completely stealthy false data injection attacks against exposed sensor nodes and channels","author":"Liu","year":"2025","journal-title":"J. Control Decis."},{"key":"10.1016\/j.neucom.2026.133171_bib0085","first-page":"732","article-title":"Control design for cyber-physical uncertain systems under unreliable markovian network susceptible to denial-of-service attacks","volume":"71","author":"Oliveira","year":"2024","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"10.1016\/j.neucom.2026.133171_bib0090","doi-asserted-by":"crossref","first-page":"4611","DOI":"10.1109\/TAC.2016.2624139","article-title":"Optimal sensor data scheduling for remote estimation over a time-varying channel","volume":"62","author":"Qi","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0095","doi-asserted-by":"crossref","first-page":"3794","DOI":"10.1109\/TAC.2020.3026017","article-title":"Randomized consensus-based distributed kalman filtering over wireless sensor networks","volume":"66","author":"Qin","year":"2021","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0100","first-page":"409","article-title":"A real-time hardware-in-the-loop system incorporating software defined radios for emulating multi-sensor networked control systems","volume":"72","author":"Rajagopal","year":"2025","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"10.1016\/j.neucom.2026.133171_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2023.110895","article-title":"Optimal stealthy attack with historical data on cyber\u2013physical systems","volume":"151","author":"Ren","year":"2023","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133171_bib0110","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1016\/j.automatica.2014.02.022","article-title":"Dynamic sensor transmission power scheduling for remote state estimation","volume":"50","author":"Ren","year":"2014","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133171_bib0115","doi-asserted-by":"crossref","first-page":"1453","DOI":"10.1109\/TAC.2004.834121","article-title":"Kalman filtering with intermittent observations","volume":"49","author":"Sinopoli","year":"2004","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0120","series-title":"Proceedings of 1995 34th IEEE Conference on Decision and Control","first-page":"555","article-title":"The pendubot: a mechatronic system for control research and education","volume":"vol. 1","author":"Spong","year":"1995"},{"key":"10.1016\/j.neucom.2026.133171_bib0125","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TAC.2024.3424306","article-title":"Exponential mean-square stabilization control for cyber-physical systems under random DOS attacks and transmission delay","volume":"70","author":"Tan","year":"2025","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0130","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.neucom.2017.08.023","article-title":"Optimal sensor scheduling for two linear dynamical systems under limited resources in sensor networks","volume":"273","author":"Wang","year":"2018","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133171_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.109342","article-title":"Remote state estimation with usage-dependent markovian packet losses","volume":"123","author":"Wang","year":"2021","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133171_bib0140","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.neucom.2022.10.011","article-title":"Transmission schedule for jointly optimizing remote state estimation and wireless sensor network lifetime","volume":"514","author":"Wei","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133171_bib0145","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1109\/TCYB.2021.3100303","article-title":"Secure state estimation of nonlinear cyber-physical systems against DOS attacks: a multiobserver approach","volume":"53","author":"Yan","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2026.133171_bib0150","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.1109\/TAC.2023.3327622","article-title":"Optimal transmission scheduling over multihop networks: structural results and reinforcement learning","volume":"69","author":"Yang","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2021.109517","article-title":"Optimal DOS attack schedules on remote state estimation under multi-sensor round-robin protocol","volume":"127","author":"Zhang","year":"2021","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133171_bib0160","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSMC.2015.2435700","article-title":"Distributed filtering for fuzzy time-delay systems with packet dropouts and redundant channels","volume":"46","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"10.1016\/j.neucom.2026.133171_bib0165","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128159","article-title":"Security control for cyber\u2013physical systems under aperiodic denial-of-service attacks: a memory-event-triggered active approach","volume":"600","author":"Zhao","year":"2024","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133171_bib0170","doi-asserted-by":"crossref","first-page":"8111","DOI":"10.1109\/TAC.2023.3288624","article-title":"Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach","volume":"68","author":"Zou","year":"2023","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.neucom.2026.133171_bib0175","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/JAS.2023.123393","article-title":"Encrypted finite-horizon energy-to-peak state estimation for time-varying systems under eavesdropping attacks: tackling secrecy capacity","volume":"10","author":"Zou","year":"2023","journal-title":"IEEE\/CAA J. Autom. Sin."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226005680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226005680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:59:53Z","timestamp":1776099593000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226005680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":35,"alternative-id":["S0925231226005680"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133171","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Data transmission strategy for non-smart sensors under transmission rate constraints","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133171","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133171"}}