{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:34:51Z","timestamp":1768347291295,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cdc.2016.7799376","type":"proceedings-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T12:11:18Z","timestamp":1483618278000},"page":"7177-7182","source":"Crossref","is-referenced-by-count":9,"title":["System identification in the presence of adversarial outputs"],"prefix":"10.1109","author":[{"given":"Mehrdad","family":"Showkatbakhsh","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Tabuada","sequence":"additional","affiliation":[]},{"given":"Suhas","family":"Diggavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2284145"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref12","author":"antsaklis","year":"2006","journal-title":"Linear Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7799376"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2279896"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416924"},{"key":"ref16","article-title":"A jamming-resilient algorithm for self-triggered network coordination","author":"senejohnny","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717544"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364723"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171098"},{"key":"ref28","volume":"26","author":"willems","year":"2013","journal-title":"Introduction to Mathematical Systems Theory A Behavioral Approach"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717166"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566483"},{"key":"ref3","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"HOTSEC"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718263"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423187"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364709"},{"key":"ref1","article-title":"Hackers remotely kill a jeep on the highway, with me in it","author":"greenberg","year":"2015"},{"key":"ref20","first-page":"2439","article-title":"Smt-based observer design for cyber physical systems under sensor attacks","author":"shoukry","year":"2015","journal-title":"American Control Conference (ACC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2350231"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403027"},{"key":"ref23","article-title":"Event-triggered state observers for sparse sensor noise\/attacks","author":"shoukry","year":"2013","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7402810"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282993"}],"event":{"name":"2016 IEEE 55th Conference on Decision and Control (CDC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 55th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786694\/7798233\/07799376.pdf?arnumber=7799376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:21:14Z","timestamp":1498360874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7799376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cdc.2016.7799376","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}