{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:58:13Z","timestamp":1752361093237,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/cdc.2015.7403297","type":"proceedings-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T16:32:44Z","timestamp":1456763564000},"page":"6844-6849","source":"Crossref","is-referenced-by-count":13,"title":["Event-based attack against remote state estimation"],"prefix":"10.1109","author":[{"given":"Yifei","family":"Qi","sequence":"first","affiliation":[]},{"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"128","article-title":"Online deception attack against remote state estimation","author":"zhang","year":"2014","journal-title":"Proceedings of World Congress of the International Federation of Automatic Control (IFAC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-484-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2215253"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024418"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.61"},{"key":"ref17","first-page":"12","article-title":"A survey of anti-tamper technologies crosstalk","volume":"17","author":"bryant","year":"2004","journal-title":"The Journal of Defense Software Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0340-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882059"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2043038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2409905"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.1403002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2461851"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834121"}],"event":{"name":"2015 54th IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2015,12,15]]},"location":"Osaka","end":{"date-parts":[[2015,12,18]]}},"container-title":["2015 54th IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7396016\/7402066\/07403297.pdf?arnumber=7403297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T13:24:36Z","timestamp":1490189076000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7403297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cdc.2015.7403297","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}