{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T11:33:09Z","timestamp":1770895989901,"version":"3.50.1"},"reference-count":30,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Transactions of the Institute of Measurement and Control"],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:p>The proposed detection method in this study, which involves smooth watermarking, encoding, and decoding, aims to address replay attacks in time-delay systems during communication. Implementing an event-triggered technique helps save communication resources and cut down on unnecessary information transmission. A weighted sliding average method is employed to smooth the system\u2019s watermark influenced by time delay, decreasing unnecessary fluctuations and boosting anti-attack resilience. The encoding and decoding systems were ingeniously designed to increase the invisibility of the smooth watermarking, making it more sensitive in detecting replay attacks. Multiple attack scenarios are meticulously examined, after which rigorous simulation tests are carried out to prove the proposed scheme\u2019s reliability, effectiveness, and substantial superiority.<\/jats:p>","DOI":"10.1177\/01423312241288307","type":"journal-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T23:20:32Z","timestamp":1731626432000},"page":"411-420","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Replay attack detection based on smooth watermarking and encoding and decoding"],"prefix":"10.1177","volume":"48","author":[{"given":"Sha","family":"Fu","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4867-6997","authenticated-orcid":false,"given":"Ping","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan, China"}]},{"given":"Hong","family":"Sang","sequence":"additional","affiliation":[{"name":"College of Marine Electrical Engineering, Dalian Maritime University, Dalian, ChinaData Availability Statement included at the end of the article"}]},{"given":"Minxin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, University of Science and Technology Liaoning, Anshan, China"}]}],"member":"179","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2022.06.002"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3360972"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108698"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3638552"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3394315"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2749959"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3209820"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305868"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3370490"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2023.3308557"},{"key":"e_1_3_3_12_1","first-page":"1","article-title":"Intelligent consensus asymptotic tracking control for nonlinear multiagent systems under denial-of-service attacks","author":"Jiang Y","year":"2024","unstructured":"Jiang Y, Niu B, Zhao X, et al. (2024) Intelligent consensus asymptotic tracking control for nonlinear multiagent systems under denial-of-service attacks. IEEE Transactions on Automation Science and Engineering pp.1\u201312.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.3013760"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.2987279"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110926"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/01423312221134326"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2023.128444"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3215284"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1491"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.111147"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3022756"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3300710"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.5254"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2020.10.002"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105944"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2215253"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3020845"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3223221"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2023.3272827"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3268532"}],"container-title":["Transactions of the Institute of Measurement and Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01423312241288307","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01423312241288307","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01423312241288307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:48:21Z","timestamp":1770893301000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01423312241288307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["10.1177\/01423312241288307"],"URL":"https:\/\/doi.org\/10.1177\/01423312241288307","relation":{},"ISSN":["0142-3312","1477-0369"],"issn-type":[{"value":"0142-3312","type":"print"},{"value":"1477-0369","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,14]]}}}