{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:04:15Z","timestamp":1776881055916,"version":"3.51.2"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["110400ZG21"],"award-info":[{"award-number":["110400ZG21"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,5,15]]},"DOI":"10.1109\/jiot.2024.3358798","type":"journal-article","created":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T18:31:33Z","timestamp":1706207493000},"page":"17602-17614","source":"Crossref","is-referenced-by-count":14,"title":["Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5931-7114","authenticated-orcid":false,"given":"Zedong","family":"Li","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"given":"Shijie","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hangyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0549-0999","authenticated-orcid":false,"given":"Shichao","family":"Lv","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-7521","authenticated-orcid":false,"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1351644"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3560833.3563564"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2021.12.007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2851584"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01879-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tase.2023.3243147"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2021.3129108"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2022.3179713"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22390-7_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485880"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00035"},{"key":"ref13","volume-title":"Industrial security exploitation framework","author":"Shadow","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3194089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3046267"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3032074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.437"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"ref19","first-page":"1","article-title":"BadUSB\u2014On accessories that turn evil","volume-title":"Blackhat Conf","author":"Karsten"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510349"},{"key":"ref23","first-page":"953","article-title":"Physical-layer attacks against pulse width modulationcontrolled actuators","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Dayan\u0131kl\u0131"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471850"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.01.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3560833.3563565"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2923215"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"ref29","volume-title":"Automation Systems and Integration\u2014Numerical Control of Machines\u2014 Program Format and Definitions of Address Words\u2014Part-1: Data Format for Positioning, Line Motion and Contouring Control Systems, International Organization for Standardization","year":"2009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/1403797"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2998530"},{"key":"ref33","first-page":"1181","article-title":"See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Bayens"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055198"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10528217\/10414168.pdf?arnumber=10414168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T17:33:25Z","timestamp":1715362405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10414168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":34,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3358798","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,15]]}}}