{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:13:37Z","timestamp":1740132817513,"version":"3.37.3"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Fundacao para a Ciencia e a Tecnologia","award":["UID\/Multi\/04621\/2019"],"award-info":[{"award-number":["UID\/Multi\/04621\/2019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/lsp.2019.2948257","type":"journal-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T19:49:27Z","timestamp":1571428167000},"page":"1803-1807","source":"Crossref","is-referenced-by-count":6,"title":["Square-Root Approach for Chandrasekhar-Based Maximum Correntropy Kalman Filtering"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8470-9831","authenticated-orcid":false,"given":"Maria V.","family":"Kulikova","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/LSP.2012.2204435"},{"year":"2018","author":"comminiello","journal-title":"Adaptive Learning Methods for Nonlinear System Modeling","key":"ref38"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/0005-1098(77)90006-1","article-title":"Numerical comparison of Kalman filter algorithms: Orbit determination case study","volume":"13","author":"bierman","year":"1977","journal-title":"Automatica"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TAC.1971.1099816"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/9.280773"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TAC.1975.1100994"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1049\/iet-cta.2018.5864"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1049\/iet-cta.2016.1282"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/9.384225"},{"key":"ref34","first-page":"1224","article-title":"Kalman filter algorithm based on singular value decomposition","author":"wang","year":"1992","journal-title":"Proc 31st Conf Decis Control"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICASSP.2001.940586"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TAC.2009.2019800"},{"key":"ref40","first-page":"1","article-title":"Map-based localization under adversarial attacks","author":"yang","year":"0","journal-title":"Proc Int Symp Robot Res"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TSP.2010.2056923"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1049\/iet-rsn.2018.5148"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-030-01797-2"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/LSP.2014.2319308"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/LSP.2015.2428713"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CISS.2016.7460553"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.automatica.2016.10.004"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.sigpro.2016.06.025"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TIT.1973.1055104"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1137\/15M1039833"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TAC.2019.2919341"},{"year":"2015","author":"grewal","journal-title":"Kalman Filtering Theory and Practice Using MATLAB","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1049\/iet-cta.2018.5404"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TAC.1974.1100576"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1049\/iet-cta.2016.1381"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ASSPCC.2000.882463"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1002\/rnc.4440"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/0470045345"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/0471221546.ch7"},{"year":"2000","author":"kailath","journal-title":"Linear Estimation","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/IJCNN.2016.7727408"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/78.134396"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1137\/S0036144502414930"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1080\/00207721.2016.1277407"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1137\/140952429"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.sigpro.2017.12.012"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/s10543-011-0333-5"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.jfranklin.2017.10.023"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1090\/S0025-5718-1977-0428694-0"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1049\/iet-rsn.2016.0594"},{"key":"ref41","first-page":"1","article-title":"Attack-resilient map-based localization","author":"yang","year":"0","journal-title":"RSS Workshop on on Adversarial Robotics"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.sigpro.2019.03.003"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/S0024-3795(99)00045-2"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.sysconle.2017.07.016"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1137\/S0895479896296921"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/8883092\/08876690.pdf?arnumber=8876690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:48:57Z","timestamp":1657745337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8876690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":48,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2019.2948257","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"type":"print","value":"1070-9908"},{"type":"electronic","value":"1558-2361"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}