{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T06:04:44Z","timestamp":1748930684705,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,13]],"date-time":"2020-12-13T00:00:00Z","timestamp":1607817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation (NNSF) of China","doi-asserted-by":"publisher","award":["61973082"],"award-info":[{"award-number":["61973082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002949","name":"Jiangsu Province","doi-asserted-by":"publisher","award":["XYDXX-005"],"award-info":[{"award-number":["XYDXX-005"]}],"id":[{"id":"10.13039\/501100002949","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,13]]},"DOI":"10.1109\/icarcv50220.2020.9305496","type":"proceedings-article","created":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T10:23:59Z","timestamp":1610274239000},"page":"160-165","source":"Crossref","is-referenced-by-count":5,"title":["Consensus Kalman Filtering for Sensor Networks Based on FDI Attack Detection"],"prefix":"10.1109","author":[{"given":"Jiali","family":"Hao","sequence":"first","affiliation":[]},{"given":"Ya","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TSMC.2018.2884952","article-title":"A survey on security communication and control for smart grids under malicious cyber-attacks","volume":"49","author":"chen","year":"2019","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2918402"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1983.318053"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.1986.4308016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2494521"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2020.02.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916670"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2872120"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554570"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399678"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440912"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1410c","DOI":"10.1109\/TAC.2014.2357135","article-title":"Consensus-based linear and nonlinear filtering","volume":"60","author":"battistelli","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.01.071"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809451"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.02.052"},{"key":"ref2","article-title":"Dynamic consensus on mobile networks","author":"spanos","year":"2005","journal-title":"Proc of the 16th IFAC World Congress"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.01.036"},{"journal-title":"Optimal Filtering","year":"1979","author":"anderson","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2012.6222737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.09.028"}],"event":{"name":"2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)","start":{"date-parts":[[2020,12,13]]},"location":"Shenzhen, China","end":{"date-parts":[[2020,12,15]]}},"container-title":["2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9305021\/9305302\/09305496.pdf?arnumber=9305496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:10:32Z","timestamp":1656375032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9305496\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,13]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icarcv50220.2020.9305496","relation":{},"subject":[],"published":{"date-parts":[[2020,12,13]]}}}