{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:28:09Z","timestamp":1771705689804,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CMMI-1903972"],"award-info":[{"award-number":["CMMI-1903972"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CBET-1935555"],"award-info":[{"award-number":["CBET-1935555"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["317726"],"award-info":[{"award-number":["317726"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tnse.2021.3115032","type":"journal-article","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T21:42:42Z","timestamp":1632519762000},"page":"3465-3477","source":"Crossref","is-referenced-by-count":33,"title":["Distributed Detection and Mitigation of Biasing Attacks Over Multi-Agent Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-6608","authenticated-orcid":false,"given":"Mohammadreza","family":"Doostmohammadian","sequence":"first","affiliation":[]},{"given":"Houman","family":"Zarrabi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9835-4493","authenticated-orcid":false,"given":"Hamid R.","family":"Rabiee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0853-6518","authenticated-orcid":false,"given":"Usman A.","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4800-6738","authenticated-orcid":false,"given":"Themistoklis","family":"Charalambous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2246135"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717479"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426435"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2882168"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2626267"},{"key":"ref30","first-page":"8393","article-title":"Analysis and mitigation of bias injection attacks against a Kalman filter","volume":"50","author":"milo\u0161evi?","year":"2017","journal-title":"An online paper"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2749959"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426092"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2217338"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5990979"},{"key":"ref27","first-page":"36","article-title":"Diffusion strategies for distributed kalman filtering: Formulation and performance analysis","author":"cattivelli","year":"2008","journal-title":"Proc Cogn Inf Process"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.10.052"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927469"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2018.5139"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1049\/iet-spr.2016.0352","article-title":"Detection and classification of islanding and power quality disturbances in microgrid using hybrid signal processing and data mining techniques","volume":"12","author":"chakravorti","year":"2017","journal-title":"IET Signal Process"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.01.011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.927480"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2296897"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2951686"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.08.036"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2015.7330811"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171098"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403135"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2840819"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3092603"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029701"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2013.879257"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(03)00104-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580474"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3029861"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2015.0384"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2900027"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2017.0377"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2973345"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2014.7094825"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-018-9813-7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8815298"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2018.03.002"},{"key":"ref47","article-title":"Secure event-triggered distributed kalman filters for state estimation","author":"mustafa","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472600"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2314512"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2749265"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2260329"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2830966"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2813330"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3029165"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.12.016"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7742038"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718068"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719841496"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2400372"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2020.12.122"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2016.2607119"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2723723"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.152"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541744"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2687422"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2229274"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2365196"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8170930"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032253"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Syst Mag"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CAMSAP.2011.6135906"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3134135"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638656"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1201\/b19191"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/9.618250"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2019.2960002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161427"},{"key":"ref90","author":"bay","year":"1999","journal-title":"Fundamentals of Linear State Space Systems"},{"key":"ref98","author":"murota","year":"2000","journal-title":"Matrices and Matroids for Systems Analysis"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS49788.2021.9551184"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2956546"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2824761"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2842097"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3043637"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2988994"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3027543"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00638-7"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586334"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS49788.2021.9551162"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2859339"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2020.0391"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2746570"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Process Mag"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2020.02700"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2421935"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS47429.2020.9183526"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2013.6669187"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638535"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6190346"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.05.008"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1215508110"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488902\/9644929\/9547791-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9644929\/09547791.pdf?arnumber=9547791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:56Z","timestamp":1649444036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9547791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":99,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2021.3115032","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}