{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:11:48Z","timestamp":1774588308967,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tnse.2025.3545280","type":"journal-article","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T18:40:53Z","timestamp":1740422453000},"page":"2165-2179","source":"Crossref","is-referenced-by-count":3,"title":["Cyber-Physical Defense for Heterogeneous Multi-Agent Systems Against Exponentially Unbounded Attacks on Signed Digraphs"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9709-5215","authenticated-orcid":false,"given":"Yichao","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1195-1933","authenticated-orcid":false,"given":"Mohamadamin","family":"Rajabinezhad","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4457-1601","authenticated-orcid":false,"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9830-9310","authenticated-orcid":false,"given":"Shan","family":"Zuo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2403261"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3162651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9111314"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/jmse11122332"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/2600000019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2468991"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-023-02229-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2612482"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkw548"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2892521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIE55183.2023.10175300"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2017.0686"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741850"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3371072"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.12.024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2998333"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2021.3066941"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tcns.2023.3338772"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC53836.2021.9539956"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3267092"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3129799"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3225361"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126382"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126699"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/ACC55779.2023.10156059"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8795652"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3137573"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3140241.3140243"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1608"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381978"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.03.016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029712"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3293789"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2937951"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10281-7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2014.01.006"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1515\/9781400873173"},{"key":"ref44","volume-title":"Nonlinear Systems","author":"Khalil","year":"2002"},{"key":"ref45","volume-title":"Cooperative Control of Multi-Agent Systems: Optimal and Adaptive Design Approaches","author":"Lewis","year":"2013"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718683"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.02.002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGEA51094.2020.00130"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2992118"},{"key":"ref51","volume-title":"Nonlinear and Adaptive Control Design","author":"Krstic","year":"1995"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/10975856\/10902133.pdf?arnumber=10902133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T05:07:27Z","timestamp":1745557647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10902133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":51,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3545280","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}