{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:56:52Z","timestamp":1774335412679,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973123"],"award-info":[{"award-number":["61973123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61991412"],"award-info":[{"award-number":["61991412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Projects Sponsored by the Development Fund for Shanghai Talents, the Shanghai Natural Science Foundation","doi-asserted-by":"publisher","award":["18ZR1409700"],"award-info":[{"award-number":["18ZR1409700"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Programme of Introducing Talents of Discipline to Universities","award":["B17017"],"award-info":[{"award-number":["B17017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tsmc.2020.2982492","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T19:58:41Z","timestamp":1586462321000},"page":"7735-7744","source":"Crossref","is-referenced-by-count":23,"title":["Detection of Data Integrity Attacks in Distributed State Estimation"],"prefix":"10.1109","volume":"51","author":[{"given":"Yuanyuan","family":"Xia","sequence":"first","affiliation":[]},{"given":"Shuangping","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7321-2923","authenticated-orcid":false,"given":"Housheng","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xinting","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4961-0507","authenticated-orcid":false,"given":"Weijie","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4943-7919","authenticated-orcid":false,"given":"Wen","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3182\/20080706-5-KR-1001.00243"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.09.009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.05.025"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1057\/jors.1977.45","article-title":"Graph theory with applications","volume":"28","author":"bondy","year":"1977","journal-title":"J Oper Res Soc"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2570003"},{"key":"ref36","first-page":"5967","article-title":"Consequence analysis of innovation-based integrity attacks with side information on remote state estimation","author":"guo","year":"2017","journal-title":"Proc 20th World Congr Int Feder Autom Control"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0142331209342213"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882059"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2522382"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-010-2863-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2852290"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2793241"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75476-3_46"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2638400"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895912"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2879037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.12.027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2017.2711044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958987"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108557"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2818941"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.41"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2875793"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2938216"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2713807"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s151229835"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1109\/SURV.2014.012114.00058","article-title":"An industrial perspective on wireless sensor networks&#x2014;A survey of requirements, protocols, and challenges","volume":"16","author":"ajith kumar s","year":"2014","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2708700"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1982.4308806"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.12.020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2896292"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2937951"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2014.22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2367322"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568478"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/9619612\/09062334.pdf?arnumber=9062334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:14Z","timestamp":1652194394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9062334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":43,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2020.2982492","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"value":"2168-2216","type":"print"},{"value":"2168-2232","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}