{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:14:42Z","timestamp":1774966482085,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62203144"],"award-info":[{"award-number":["62203144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Heilongjiang Province Science Foundation for Joint Guidance","award":["LH2022F022"],"award-info":[{"award-number":["LH2022F022"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M720961"],"award-info":[{"award-number":["2022M720961"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T171145"],"award-info":[{"award-number":["2024T171145"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Heilongjiang Postdoctoral Science Foundation","award":["LBH-Z22151"],"award-info":[{"award-number":["LBH-Z22151"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["HIT"],"award-info":[{"award-number":["HIT"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Sci. Eng."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tase.2024.3492727","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T14:04:11Z","timestamp":1732802651000},"page":"8925-8936","source":"Crossref","is-referenced-by-count":11,"title":["Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3507-4571","authenticated-orcid":false,"given":"Kangkang","family":"Sun","sequence":"first","affiliation":[{"name":"Research Institute of Intelligent Control and Systems, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4148-6120","authenticated-orcid":false,"given":"Xiaochun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Future Technology, Harbin Institute of Technology, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2020.3016131"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2023.3263395"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2023.3236470"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2686373"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110895"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2016.04.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391573"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109117"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683376"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.26"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2240891"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2461851"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00049"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GTDAsia.2019.8716017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2950072"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2915124"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3195856"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4567"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2498708"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2972033"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108757"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3189175"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.06.064"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0954407012438304"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2013.2293706"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2158565"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2018.12.032"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2015.08.129"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/YAC.2017.7967501"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147884"},{"key":"ref35","article-title":"Security metrics of networked control systems under sensor attacks (extended preprint)","author":"Murguia","year":"2018","journal-title":"arXiv:1809.01808"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719833"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2021.1940300"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970777"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2023.3240383"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3238709"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3204119"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846365"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2872204"}],"container-title":["IEEE Transactions on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8856\/10839176\/10770566.pdf?arnumber=10770566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T19:42:22Z","timestamp":1773862942000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10770566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/tase.2024.3492727","relation":{},"ISSN":["1545-5955","1558-3783"],"issn-type":[{"value":"1545-5955","type":"print"},{"value":"1558-3783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}