{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:24Z","timestamp":1775837124109,"version":"3.50.1"},"reference-count":81,"publisher":"Informa UK Limited","issue":"11","license":[{"start":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T00:00:00Z","timestamp":1661817600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Control"],"published-print":{"date-parts":[[2023,11,2]]},"DOI":"10.1080\/00207179.2022.2117084","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T17:44:52Z","timestamp":1661363092000},"page":"2853-2870","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":28,"title":["Sensor fault detection and isolation via networked estimation: rank-deficient dynamical systems"],"prefix":"10.1080","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-6608","authenticated-orcid":false,"given":"M.","family":"Doostmohammadian","sequence":"first","affiliation":[{"name":"Faculty of Mechanical Engineering, Semnan University, Semnan, Iran"},{"name":"School of Electrical Engineering, Aalto University, Espoo, Finland"}]},{"given":"H.","family":"Zarrabi","sequence":"additional","affiliation":[{"name":"Iran Telecommunication Research Center (ITRC), Tehran, Iran"}]},{"given":"T.","family":"Charalambous","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Aalto University, Espoo, Finland"}]}],"member":"301","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"e_1_3_4_2_1","volume-title":"System and method for anomaly and cyber-threat detection in a wind turbine","author":"Abbaszadeh M.","year":"2019","unstructured":"Abbaszadeh, M. (2019). System and method for anomaly and cyber-threat detection in a wind turbine. Google Patents. US Patent App. 15\/988, 515."},{"key":"e_1_3_4_3_1","doi-asserted-by":"crossref","unstructured":"Acemoglu D. Nedi\u0107 A. & Ozdaglar A. (2008 December). Convergence of rule-of-thumb learning rules in social networks. In 47th IEEE conference on decision and control (pp.\u00a01714\u20131720). IEEE.","DOI":"10.1109\/CDC.2008.4739167"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2014.2300198"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109589"},{"key":"e_1_3_4_7_1","doi-asserted-by":"crossref","unstructured":"Battistelli G. Chisci L. Mugnai G. Farina A. & Graziano A. (2012). Consensus-based algorithms for distributed filtering. In 51st IEEE conference on decision and control (pp.\u00a0794\u2013799).","DOI":"10.1109\/CDC.2012.6426435"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.3166\/ejc.15.503-516"},{"key":"e_1_3_4_9_1","doi-asserted-by":"crossref","unstructured":"Charalambous T. & Hadjicostis C. N. (2013). Distributed formation of balanced and bistochastic weighted digraphs in multi-agent systems. In European control conference (pp.\u00a01752\u20131757). IEEE.","DOI":"10.23919\/ECC.2013.6669187"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.79"},{"key":"e_1_3_4_11_1","doi-asserted-by":"crossref","unstructured":"Chong M. S. Wakaiki M. & Hespanha J. P. (2015). Observability of linear systems under adversarial attacks. In American control conference (pp.\u00a02439\u20132444). IEEE.","DOI":"10.1109\/ACC.2015.7171098"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.12.014"},{"key":"e_1_3_4_13_1","unstructured":"Commault C. Dion J. & Yacoub Agha S. (2006). Location of additional sensors for FDI. In 4th workshop on advanced control and diagnosis . Semantec Scholar."},{"key":"e_1_3_4_14_1","volume-title":"Introduction to\u00a0algorithms","author":"Cormen T. H.","year":"2009","unstructured":"Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to\u00a0algorithms. MIT Press."},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.87"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.10.052"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(03)00104-3"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.4267003"},{"key":"e_1_3_4_19_1","doi-asserted-by":"crossref","unstructured":"Doostmohammadian M. Charalambous T. Shafie-khah M. Meskin N. & Khan U. A. (2021). Simultaneous distributed estimation and attack detection\/isolation in social networks: Structural observability kronecker-product network and chi-square detector. In 1st IEEE international conference on autonomous systems (ICAS) (pp.\u00a0344\u2013348). IEEE.","DOI":"10.1109\/ICAS49788.2021.9551162"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2246135"},{"key":"e_1_3_4_21_1","doi-asserted-by":"crossref","unstructured":"Doostmohammadian M. & Khan U. A. (2013b May). On the distributed estimation of rank-deficient dynamical systems: A generic approach. In IEEE conference on acoustics speech and signal processing (pp.\u00a04618\u20134622). IEEE.","DOI":"10.1109\/ICASSP.2013.6638535"},{"key":"e_1_3_4_22_1","doi-asserted-by":"crossref","unstructured":"Doostmohammadian M. & Khan U. A. (2016). Measurement partitioning and observational equivalence in state estimation. In IEEE international conference on acoustics speech and signal processing (pp.\u00a04855\u20134859). IEEE.","DOI":"10.1109\/ICASSP.2016.7472600"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.6884276"},{"key":"e_1_3_4_24_1","article-title":"Consensus-based\u00a0distributed\u00a0estimation in the presence of\u00a0heterogeneous,\u00a0time-Invariant\u00a0delays","author":"Doostmohammadian M.","year":"2021","unstructured":"Doostmohammadian, M., Khan, U. A., Pirani, M., & Charalambous, T. (2021). Consensus-based\u00a0distributed\u00a0estimation in the presence of\u00a0heterogeneous,\u00a0time-Invariant\u00a0delays. IEEE Control Systems Letters, 6. Early Access.","journal-title":"IEEE Control Systems Letters"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3029165"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2824761"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.4267003"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2746570"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1958-052-0"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.618250"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"e_1_3_4_32_1","volume-title":"A guide to chi-squared testing","author":"Greenwood P. E.","year":"1996","unstructured":"Greenwood, P. E., & Nikulin, M. S. (1996). A guide to chi-squared testing. John Wiley & Sons."},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.6884276"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2275669"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/1004057"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_4_37_1","doi-asserted-by":"crossref","unstructured":"He X. Ren X. Sandberg H. & Johansson K. H. (2019). Secure distributed filtering for unstable dynamics under compromised observations. In IEEE 58th conference on decision and control (Vol. 67 pp.\u00a05344\u20135349). IEEE.","DOI":"10.1109\/CDC40024.2019.9029701"},{"key":"e_1_3_4_38_1","article-title":"How to\u00a0secure\u00a0distributed\u00a0filters\u00a0under\u00a0sensor\u00a0attacks?","author":"He X.","year":"2021","unstructured":"He, X., Ren, X., Sandberg, H., & Johansson, K. H. (2021). How to\u00a0secure\u00a0distributed\u00a0filters\u00a0under\u00a0sensor\u00a0attacks?. IEEE Transactions on Automatic Control, 67(6), arXiv preprint arXiv:2004.05409.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2007.06.035"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048026"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2100385"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2191450"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2161834"},{"key":"e_1_3_4_45_1","doi-asserted-by":"crossref","unstructured":"Khan U. A. & Doostmohammadian M. (2011 December). A sensor placement and network design paradigm for future smart grids. In 4th IEEE international workshop on computational advances in multi-sensor adaptive processing (pp.\u00a0137\u2013140). IEEE.","DOI":"10.1109\/CAMSAP.2011.6135906"},{"key":"e_1_3_4_46_1","doi-asserted-by":"crossref","unstructured":"Khan U. A. & Jadbabaie A. (2011 December). Coordinated networked estimation strategies using structured systems theory. In 49th IEEE conference on decision and control (pp.\u00a02112\u20132117). IEEE.","DOI":"10.1109\/CDC.2011.6161427"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.05.008"},{"key":"e_1_3_4_48_1","doi-asserted-by":"crossref","unstructured":"Khan U. A. & Stankovi\u0107 A. M. (2013). Secure distributed estimation in cyber-physical systems. In IEEE international conference on acoustics speech and signal processing (pp.\u00a05209\u20135213). IEEE.","DOI":"10.1109\/ICASSP.2013.6638656"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.926"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2800908"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1137\/070700620"},{"key":"e_1_3_4_52_1","doi-asserted-by":"crossref","unstructured":"Lee C. Shim H. & Eun Y. (2015). Secure and robust state estimation under sensor attacks measurement noises and process disturbances: Observer-based combinatorial approach. In European control conference (pp.\u00a01872\u20131877). IEEE.","DOI":"10.1109\/ECC.2015.7330811"},{"key":"e_1_3_4_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2837107"},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207170802031528"},{"key":"e_1_3_4_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.1690"},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1974.1100557"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.917383"},{"key":"e_1_3_4_59_1","doi-asserted-by":"crossref","unstructured":"Micali S. & Vazirani V. V. (1980). An \nO(|V||E|) algorithm for finding maximum matching in general graphs. In 21st annual symposium on foundations of computer science (pp.\u00a017\u201327). IEEE.","DOI":"10.1109\/SFCS.1980.12"},{"key":"e_1_3_4_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3050032"},{"key":"e_1_3_4_61_1","doi-asserted-by":"crossref","unstructured":"Mitra A. & Sundaram S. (2018). Secure distributed state estimation of an LTI system over time-varying networks and analog erasure channels. In American control conference (pp.\u00a06578\u20136583). IEEE.","DOI":"10.23919\/ACC.2018.8431060"},{"key":"e_1_3_4_62_1","volume-title":"Matrices and matroids for systems analysis","author":"Murota K.","year":"2000","unstructured":"Murota, K. (2000). Matrices and matroids for systems analysis. Springer."},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2018.01.002"},{"key":"e_1_3_4_64_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970791"},{"key":"e_1_3_4_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100466"},{"key":"e_1_3_4_66_1","doi-asserted-by":"crossref","unstructured":"Olfati-Saber R. (2009 December). Kalman-consensus filter: Optimality stability and performance. In 48th IEEE conference on decision and control (pp.\u00a07036\u20137042). IEEE.","DOI":"10.1109\/CDC.2009.5399678"},{"key":"e_1_3_4_67_1","doi-asserted-by":"crossref","unstructured":"Pajic M. Tabuada P. Lee I. & Pappas G. J. (2015). Attack-resilient state estimation in the presence of noise. In 54th IEEE conference on decision and control (pp.\u00a05827\u20135832). IEEE.","DOI":"10.1109\/CDC.2015.7403135"},{"key":"e_1_3_4_68_1","doi-asserted-by":"crossref","unstructured":"Park S. & Martins N. (2012). Necessary and sufficient conditions for the stabilizability of a class of LTI distributed observers. In 51st IEEE conference on decision and control (pp.\u00a07431\u20137436). IEEE.","DOI":"10.1109\/CDC.2012.6426092"},{"key":"e_1_3_4_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2378873"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/002071799220704"},{"key":"e_1_3_4_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0051585"},{"key":"e_1_3_4_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2657765"},{"key":"e_1_3_4_73_1","doi-asserted-by":"crossref","unstructured":"Renganathan V. Hashemi N. Ruths J. & Summers T. H. (2020). Distributionally robust tuning of anomaly detectors in cyber-physical systems with stealthy attacks. In American control conference (pp.\u00a01247\u20131252). IEEE.","DOI":"10.23919\/ACC45564.2020.9147661"},{"key":"e_1_3_4_74_1","first-page":"1","article-title":"On the survivable network design problem with mixed connectivity requirements","author":"Sadeghi E.","year":"2019","unstructured":"Sadeghi, E., & Fan, N. (2019). On the survivable network design problem with mixed connectivity requirements. Annals of Operations Research, 1\u201313.","journal-title":"Annals of Operations Research"},{"key":"e_1_3_4_75_1","unstructured":"Sundaram S. (2012). Fault-tolerant and secure control systems. University of Waterloo Lecture Notes ."},{"key":"e_1_3_4_76_1","unstructured":"Umsonst D. (2019). Tuning of anomaly detectors in the presence of sensor attacks [Unpublished doctoral dissertation]. KTH Royal Institute of Technology."},{"key":"e_1_3_4_77_1","doi-asserted-by":"crossref","unstructured":"Weerakkody S. Liu X. & Sinopoli B. (2017). Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks. In 56th IEEE conference on decision and control (pp.\u00a01356\u20131361). IEEE.","DOI":"10.1109\/CDC.2017.8263843"},{"key":"e_1_3_4_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.08.010"},{"key":"e_1_3_4_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_4_80_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.18.2.334"},{"key":"e_1_3_4_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2582469"},{"key":"e_1_3_4_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3127641"}],"container-title":["International Journal of Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207179.2022.2117084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T23:00:58Z","timestamp":1696114858000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207179.2022.2117084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,30]]},"references-count":81,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11,2]]}},"alternative-id":["10.1080\/00207179.2022.2117084"],"URL":"https:\/\/doi.org\/10.1080\/00207179.2022.2117084","relation":{},"ISSN":["0020-7179","1366-5820"],"issn-type":[{"value":"0020-7179","type":"print"},{"value":"1366-5820","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcon20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcon20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-10-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}