{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:14:51Z","timestamp":1772907291884,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"A*STAR Industrial Internet of Things Research Program","award":["A1788a0023"],"award-info":[{"award-number":["A1788a0023"]}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018AAA0101601"],"award-info":[{"award-number":["2018AAA0101601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004359","name":"Vetenskapsr\u00e5det","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/tac.2020.2971994","type":"journal-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T20:52:22Z","timestamp":1586379142000},"page":"3895-3902","source":"Crossref","is-referenced-by-count":51,"title":["An Online Approach to Physical Watermark Design"],"prefix":"10.1109","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9340-5503","authenticated-orcid":false,"given":"Hanxiao","family":"Liu","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7937-6737","authenticated-orcid":false,"given":"Yilin","family":"Mo","sequence":"additional","affiliation":[{"name":"Department of Automation and BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2054-8033","authenticated-orcid":false,"given":"Jiaqi","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7137-4136","authenticated-orcid":false,"given":"Lihua","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Electrical and Electro-nic Engineering, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9940-5929","authenticated-orcid":false,"given":"Karl H.","family":"Johansson","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Division of Decision and Control Systems, KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref11","first-page":"3344","article-title":"Security analysis for cyber-physical systems against stealthy deception attacks","author":"kwon","year":"0","journal-title":"Proc IEEE Amer Control Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Syst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1502"},{"key":"ref18","first-page":"1854","article-title":"Stochastic game approach for replay attack detection","author":"miao","year":"0","journal-title":"Proc 52nd IEEE Conf Decis Control"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524930"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref27","article-title":"An online approach to physical watermark design","author":"liu","year":"2019","journal-title":"arXiv 1911 01868"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"ref6","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"cardenas","year":"0","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1252211"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732208"},{"key":"ref7","first-page":"22","article-title":"Challenges in security for cyber-physical systems","author":"neuman","year":"0","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2011.5779477"},{"key":"ref1","author":"lee","year":"2016","journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619632"},{"key":"ref22","volume":"63","author":"scharf","year":"1991","journal-title":"Statistical Signal Processing Detection Estimation and Time Series Analysis"},{"key":"ref21","author":"chen","year":"1998","journal-title":"Linear System Theory and Design"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0959-1524(93)80006-W"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/2689304"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698981"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9\/9179066\/09061046.pdf?arnumber=9061046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T20:50:42Z","timestamp":1736369442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9061046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":27,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tac.2020.2971994","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"value":"0018-9286","type":"print"},{"value":"1558-2523","type":"electronic"},{"value":"2334-3303","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}