{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T05:46:30Z","timestamp":1762321590775,"version":"3.41.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/cdc.2015.7403027","type":"proceedings-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T21:32:44Z","timestamp":1456781564000},"page":"5162-5169","source":"Crossref","is-referenced-by-count":50,"title":["Resilient state estimation against switching attacks on stochastic cyber-physical systems"],"prefix":"10.1109","author":[{"given":"Sze Zheng","family":"Yong","sequence":"first","affiliation":[]},{"given":"Minghui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Frazzoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref12","article-title":"Green lights forever: Analyzing the security of traffic infrastructure","author":"ghena","year":"2014","journal-title":"8th USENIX Workshop on Offensive Technologies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130712"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.08.002"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"7034","DOI":"10.1109\/CDC.2013.6761004","article-title":"Simultaneous input and state estimation for linear discrete-time stochastic systems with direct feedthrough","author":"yong","year":"2013","journal-title":"Conference on Decision and Control (CDC)"},{"key":"ref16","article-title":"A unified filter for simultaneous input and state estimation of linear discrete-time stochastic systems","author":"yong","year":"2015","journal-title":"Automatica"},{"key":"ref17","article-title":"On strong detectability and simultaneous input and state estimation with a delay","author":"yong","year":"2015","journal-title":"IEEE Conference on Decision and Control (CDC)"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1002\/0471221279","author":"bar-shalom","year":"2002","journal-title":"Estimation with Applications to Tracking and Navigation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/7.640267"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.09.031"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref6","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Workshop on Secure Control Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185516"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref2","first-page":"6:1","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot Topics in Security HOTSEC'08"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039914"},{"journal-title":"Power Generation Operation and Control","year":"2013","author":"wood","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.890371"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101690"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2005.1591873"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101745"}],"event":{"name":"2015 54th IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2015,12,15]]},"location":"Osaka","end":{"date-parts":[[2015,12,18]]}},"container-title":["2015 54th IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7396016\/7402066\/07403027.pdf?arnumber=7403027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T15:34:37Z","timestamp":1748792077000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7403027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cdc.2015.7403027","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}