{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T11:32:31Z","timestamp":1766057551635,"version":"3.48.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/pimrc62392.2025.11274814","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:33:25Z","timestamp":1765564405000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Ambiguous Data Injection Impacting Age of Incorrect Information: A Bayesian Game Analysis"],"prefix":"10.1109","author":[{"given":"Leonardo","family":"Badia","sequence":"first","affiliation":[{"name":"University of Padova,Dept. Information Engineering,Padua,Italy,35131"}]},{"given":"Valeria","family":"Bonagura","sequence":"additional","affiliation":[{"name":"University Roma Tre,Computer Science, Aeronautical Technologies Engineering,Dept. Civil,Rome,Italy,00146"}]},{"given":"Chiara","family":"Foglietta","sequence":"additional","affiliation":[{"name":"University Roma Tre,Computer Science, Aeronautical Technologies Engineering,Dept. Civil,Rome,Italy,00146"}]},{"given":"Erjol","family":"Sulku","sequence":"additional","affiliation":[{"name":"University of Padova,Dept. Information Engineering,Padua,Italy,35131"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3206354"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA61559.2024.10794277"},{"issue":"1","key":"ref3","first-page":"1","article-title":"An overview of false data injection attack against cyber-physical power systems","volume":"2","author":"Bae","year":"2023","journal-title":"Comput. Syst. Netw. Telec"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2790704"},{"issue":"3","key":"ref5","first-page":"1175","article-title":"Cyber deception games in cyber-physical systems: A survey","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Trans. Control Netw. Syst"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3005549"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518209"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162726"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959909"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2024.3431389"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3057268"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC61545.2025.10978178"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2798817"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2025.3540401"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2017.8488112"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2024.2363546"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/PCMP.2023.000138"},{"article-title":"A zero-sum jamming game with incomplete position information in wireless scenarios","volume-title":"Proc. European Wirel. Conf","author":"Scalabrin","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845146"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065053"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.52545\/3-10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2025.102498"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3320695"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2023.3347538"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/PCMP.2024.000129"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2992665"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2024.3394776"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.092813.131446"},{"volume-title":"Game theory: an introduction","year":"2013","author":"Tadelis","key":"ref30"}],"event":{"name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2025,9,1]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,9,4]]}},"container-title":["2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11274530\/11274549\/11274814.pdf?arnumber=11274814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T11:28:55Z","timestamp":1766057335000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11274814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/pimrc62392.2025.11274814","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}