{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:04:24Z","timestamp":1740099864120,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006751","name":"U.S. Army","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006751","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/cdc42340.2020.9304080","type":"proceedings-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T07:27:32Z","timestamp":1610522852000},"page":"3785-3792","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries"],"prefix":"10.1109","author":[{"given":"Bhaskar","family":"Ramasubramanian","sequence":"first","affiliation":[]},{"given":"Luyao","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Bushnell","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Markov Decision Processes Discrete Stochastic Dynamic Programming","year":"2014","author":"puterman","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.10.006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-060117-105018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2564339"},{"key":"ref30","article-title":"Differentially private policy evaluation","author":"balle","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"journal-title":"Markov Chains and Stochastic Stability","year":"2012","author":"meyn","key":"ref36"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"ref35"},{"key":"ref34","first-page":"394","article-title":"Model checking differentially private properties","author":"liu","year":"2018","journal-title":"Asian Symposium on Programming Languages and Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147949"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1955.5.285"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431397"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2007.363946"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_12"},{"key":"ref14","article-title":"Asymmetric distances for approximate differential privacy","author":"chistikov","year":"2019","journal-title":"International Conference on Concurrency Theory"},{"key":"ref15","first-page":"3544","article-title":"Secure control under LTL constraints","author":"niu","year":"2018","journal-title":"Proc American Control Conference (ACC)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2930039"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814630"},{"article-title":"Secure control in partially observable environments to satisfy LTL specifications","year":"2020","author":"ramasubramanian","key":"ref18"},{"key":"ref19","first-page":"162","article-title":"Control synthesis for cyber-physical systems to satisfy metric interval temporal logic objectives under timing and actuator attacks","author":"niu","year":"2020","journal-title":"ACM\/ IEEE International Conference on Cyber-physical Systems"},{"key":"ref28","first-page":"162","article-title":"Metrics for finite Markov decision processes","volume":"4","author":"ferns","year":"2004","journal-title":"Conference on Uncertainty in Artificial Intelligence"},{"key":"ref4","first-page":"55","article-title":"Non-invasive spoofing attacks for anti-lock braking systems","author":"shoukry","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2003.09.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2017.02.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1994.315941"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/10080484X"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","article-title":"Ensuring safety, security, and sustainability of mission-critical CPSs","volume":"100","author":"banerjee","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref8","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2283096"},{"key":"ref1","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref20","article-title":"Robust satisfaction of metric interval temporal logic objectives in adversarial environments","author":"niu","year":"2020","journal-title":"submitted"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99154-2_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2017.03.002"},{"key":"ref41","article-title":"On computing the total variation distance of hidden Markov models","author":"kiefer","year":"2018","journal-title":"International Colloquium on Automata Languages and Programming (ICALP)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3358232"},{"key":"ref26","first-page":"227","article-title":"On the transfer of masses","volume":"37","author":"kantorovich","year":"1942","journal-title":"Doklady Akademii Nauk USSR"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2019.102388"}],"event":{"name":"2020 59th IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2020,12,14]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2020,12,18]]}},"container-title":["2020 59th IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9303728\/9303729\/09304080.pdf?arnumber=9304080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:59:12Z","timestamp":1656345552000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cdc42340.2020.9304080","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}