{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:29:18Z","timestamp":1766773758237,"version":"3.48.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["CNS 1505664"],"award-info":[{"award-number":["CNS 1505664"]}]},{"name":"NSF","award":["ECCS 1846706"],"award-info":[{"award-number":["ECCS 1846706"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tcns.2025.3591869","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T18:44:40Z","timestamp":1753296280000},"page":"2844-2855","source":"Crossref","is-referenced-by-count":0,"title":["Attack Estimation of Switched Nonlinear Control Systems Using Invertibility"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2768-5623","authenticated-orcid":false,"given":"Xu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, The Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8981-098X","authenticated-orcid":false,"given":"Yang","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Robotics and Automation, Nanjing University, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3879-7820","authenticated-orcid":false,"given":"Minghui","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, The Pennsylvania State University, University Park, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Presidents council of advisors on science and technology. Designing a digital future: federally funded research and development in networking and information technology","author":"Holdren","year":"2010","journal-title":"Executive Office of the President"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634434"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref7","first-page":"1","article-title":"Green lights forever: Analyzing the security of traffic infrastructure","volume-title":"Proc. 8th USENIX Workshop Offensive Technol.","author":"Ghena","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2840819"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619724"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171098"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3078621"},{"key":"ref13","first-page":"1","article-title":"False data injection attacks in control systems","volume-title":"Preprints 1st workshop Secure Control Syst.","author":"Mo","year":"2010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2704434"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3204439"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963621"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/0317022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9780203745625"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.08.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2010.08.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147765"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3217100"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2008.09.002"},{"volume-title":"Nonlinear Systems","year":"2002","author":"Khalil","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102181"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1698-8","volume-title":"Multivariable Calculus and Mathematica","author":"Coombes","year":"1998"},{"volume-title":"Mathematical Analysis an Introduction","year":"1996","author":"Browder","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2112-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.03.001"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6509490\/11315888\/11091487-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6509490\/11315888\/11091487.pdf?arnumber=11091487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:25:06Z","timestamp":1766773506000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11091487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2025.3591869","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"type":"electronic","value":"2325-5870"},{"type":"electronic","value":"2372-2533"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}