{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:35:49Z","timestamp":1740148549704,"version":"3.37.3"},"reference-count":28,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T00:00:00Z","timestamp":1643414400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010818","name":"Beijing Information Science and Technology University","doi-asserted-by":"publisher","award":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"],"award-info":[{"award-number":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"]}],"id":[{"id":"10.13039\/501100010818","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Project of Beijing Municipal Educational Commission","award":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"],"award-info":[{"award-number":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"],"award-info":[{"award-number":["2121YJPY221","QXTCPC202110","KM201911232014","61773334","61603047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2022,1,29]]},"abstract":"<jats:p>We consider the secure state estimation of linear time-invariant Gaussian systems subject to dynamic malicious attacks. An error compensator is proposed to reduce the impact of local error data on state estimation. Based on that, a new estimation algorithm based on the Gaussian mixture model (GMM) aiming at dynamic attacks is proposed, which can cluster the local state estimates autonomously and improve the remote estimation accuracy effectively. The superiority of the proposed algorithm is verified by numerical simulations.<\/jats:p>","DOI":"10.1155\/2022\/2127102","type":"journal-article","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:05:09Z","timestamp":1643475909000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9318-2445","authenticated-orcid":true,"given":"Cui","family":"Zhu","sequence":"first","affiliation":[{"name":"Beijing Information Science and Technology University, School of Information and Communication Engineering, Beijing 100192, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6895-0446","authenticated-orcid":true,"given":"Zile","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University, School of Information and Communication Engineering, Beijing 100192, China"}]},{"given":"Zeyuan","family":"Zang","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University, School of Information and Communication Engineering, Beijing 100192, China"}]},{"given":"Yuxuan","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University, School of Information and Communication Engineering, Beijing 100192, China"}]},{"given":"Huanming","family":"Zheng","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University, School of Information and Communication Engineering, Beijing 100192, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.006"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/et.2010.0410"},{"key":"5","first-page":"73","article-title":"Lessons learned from the Maroochy water breach","volume":"253","author":"J. Slay","year":"2007","journal-title":"IFIP Advances in Information and Communication Technology"},{"key":"6","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyber\u2013physical systems: a perspective at the centennial","volume":"100","author":"K. Kim","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ei2.2018.8582309"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/cec48606.2020.9185666"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ELMA.2019.8771532"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.23919\/icact51234.2021.9370464"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2615473"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2793162"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2846744"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2953256"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2606880"},{"key":"16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ins.2018.03.056","article-title":"Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries","volume":"451\u2013452","author":"W. Ao","year":"2018","journal-title":"Information Sciences"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1491"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2017.8256330"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.765"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.07.029"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2018.2879037"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2018.03.002"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/iccps.2014.6843720"},{"volume-title":"Optimal Filtering","year":"2012","author":"B. D. Anderson","key":"25"},{"volume-title":"Pattern Eecognition and Machine Learning","year":"2006","author":"C. M. Bishop","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/acc.2015.7171098"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/2127102.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/2127102.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/2127102.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:05:18Z","timestamp":1643475918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2022\/2127102\/"}},"subtitle":[],"editor":[{"given":"Xue-bo","family":"Jin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,29]]},"references-count":28,"alternative-id":["2127102","2127102"],"URL":"https:\/\/doi.org\/10.1155\/2022\/2127102","relation":{},"ISSN":["1687-7268","1687-725X"],"issn-type":[{"type":"electronic","value":"1687-7268"},{"type":"print","value":"1687-725X"}],"subject":[],"published":{"date-parts":[[2022,1,29]]}}}