{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T04:11:29Z","timestamp":1742875889763,"version":"3.40.2"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2022ZD0119601"],"award-info":[{"award-number":["2022ZD0119601"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62225306","U2141235"],"award-info":[{"award-number":["62225306","U2141235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Basic and Applied Research Foundation","award":["2022B1515120069"],"award-info":[{"award-number":["2022B1515120069"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tcns.2024.3432646","type":"journal-article","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T19:55:22Z","timestamp":1721764522000},"page":"1115-1124","source":"Crossref","is-referenced-by-count":0,"title":["A Switching Performance Index-Driven Escaping\u2013Chasing Control of Networked Control Systems Under Triggered DoS Attacks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8979-5561","authenticated-orcid":false,"given":"Ning","family":"Xing","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence and Automation, MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems, State Key Laboratory of Digital Manufacturing Equipment and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8819-8829","authenticated-orcid":false,"given":"Hai-Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Automation, MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems, State Key Laboratory of Digital Manufacturing Equipment and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/37.898794"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3151880"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3210291"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2932752"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3085759"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3148875"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110555"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3175726"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3160355"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110467"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3078130"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2023.3323766"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123798"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2926554"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.5719"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2020.3024423"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3168430"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3186624"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3106447"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.3046269"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3146975"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3180223"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1999.831330"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172455","volume-title":"Nonlinear Systems","author":"Drazin","year":"1992"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0017-8"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6509490\/10935358\/10607900.pdf?arnumber=10607900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T18:51:47Z","timestamp":1742842307000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10607900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":26,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2024.3432646","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"type":"electronic","value":"2325-5870"},{"type":"electronic","value":"2372-2533"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}