{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:29:21Z","timestamp":1766773761001,"version":"3.48.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62473260"],"award-info":[{"award-number":["62473260"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62373247"],"award-info":[{"award-number":["62373247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientist Sponsorship Program"},{"name":"Science and Technology, China","award":["YESS20220357"],"award-info":[{"award-number":["YESS20220357"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tcns.2025.3580676","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T13:42:31Z","timestamp":1750167751000},"page":"2505-2517","source":"Crossref","is-referenced-by-count":0,"title":["Securing Cyber-Physical Systems Under Periodic Detection: Optimal Stealthy Linear Attack and Countermeasure"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8021-8859","authenticated-orcid":false,"given":"Jia","family":"Qi","sequence":"first","affiliation":[{"name":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4995-7853","authenticated-orcid":false,"given":"Xiaoyu","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Engineering, Boston University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2357-0228","authenticated-orcid":false,"given":"Chongrong","family":"Fang","sequence":"additional","affiliation":[{"name":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-7802","authenticated-orcid":false,"given":"Jianping","family":"He","sequence":"additional","affiliation":[{"name":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC49753.2023.10384272"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108638"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2015.7152667"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2460747"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/seaa.2018.00022"},{"key":"ref7","volume-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","volume":"388","author":"Case","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.04.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109090"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2570003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110895"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.11.018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2023.3260041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3125430"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3332013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2668220"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2950072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3068220"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3165086"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-443-19021-6.00012-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/23.211438"},{"volume-title":"Securing SCADA Systems","year":"2005","author":"Krutz","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3384146"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3434622"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.1982.4308806"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781118122631"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3187531"},{"article-title":"CVX: Matlab software for disciplined convex programming, version 2.1","year":"2014","author":"Grant","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431798"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970081"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109182"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3184396"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/s0927-0507(06)13004-2"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6509490\/11315888\/11039024.pdf?arnumber=11039024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:25:09Z","timestamp":1766773509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11039024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":39,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2025.3580676","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"type":"electronic","value":"2325-5870"},{"type":"electronic","value":"2372-2533"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}