{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:25:36Z","timestamp":1764174336320,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cdc.2016.7798671","type":"proceedings-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T12:11:18Z","timestamp":1483618278000},"page":"2709-2714","source":"Crossref","is-referenced-by-count":47,"title":["Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries"],"prefix":"10.1109","author":[{"given":"Aritra","family":"Mitra","sequence":"first","affiliation":[]},{"given":"Shreyas","family":"Sundaram","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332505"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21236\/ADA568117"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447011"},{"journal-title":"Byzantine multi-agent optimization Part i","year":"2015","author":"su","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2757","DOI":"10.1016\/j.automatica.2011.09.011","article-title":"Distributed fault detection for interconnected second-order systems","volume":"47","author":"shames","year":"2011","journal-title":"Automatica"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2012.6265722"},{"key":"ref16","article-title":"A trust based distributed Kalman filtering approach for mode estimation in power systems","author":"jiang","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/5925.5931"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011807"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717479"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991569"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2560766"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426092"},{"key":"ref8","first-page":"5855","article-title":"Robustness of information diffusion algorithms to locally bounded adversaries","author":"zhang","year":"2012","journal-title":"Proc of the American Control Conference"},{"journal-title":"Distributed observers for LTI systems","year":"2016","author":"mitra","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2007.4434303"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2005.1583486"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130413"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.10.007"},{"journal-title":"Linear System Theory and Design","year":"1995","author":"chen","key":"ref21"}],"event":{"name":"2016 IEEE 55th Conference on Decision and Control (CDC)","start":{"date-parts":[[2016,12,12]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 55th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786694\/7798233\/07798671.pdf?arnumber=7798671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T01:41:37Z","timestamp":1568684497000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7798671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cdc.2016.7798671","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}