{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:19:26Z","timestamp":1771661966886,"version":"3.50.1"},"reference-count":27,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61433006"],"award-info":[{"award-number":["61433006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Key Research Project of Zhejiang Province, China","award":["2017C01062"],"award-info":[{"award-number":["2017C01062"]}]},{"name":"the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China","award":["ICT1800422"],"award-info":[{"award-number":["ICT1800422"]}]},{"name":"the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, China","award":["AGK2018003"],"award-info":[{"award-number":["AGK2018003"]}]},{"name":"the Department of Education of Zhejiang Province, China","award":["Y201840611"],"award-info":[{"award-number":["Y201840611"]}]},{"name":"the Zhejiang Provincial Natural Science Foundation of China","award":["LY16F020019"],"award-info":[{"award-number":["LY16F020019"]}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1631\/fitee.1700334","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T06:54:34Z","timestamp":1542351274000},"page":"1098-1111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks"],"prefix":"10.1631","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2250-2127","authenticated-orcid":false,"given":"Meng-zhou","family":"Gao","sequence":"first","affiliation":[]},{"given":"Dong-qin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/isgt.2010.5434780"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2012.2211873"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2013.6423186"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2016.2582802"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.12.026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2016.2544062"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2015.1106730"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.08.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/9.362"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/cdc.2015.7403296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2425142"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2011.2160543"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2013.2266831"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2011.2160298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2012.6194395"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cdc.2016.7799042"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tac.1976.1101300"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/mcs.2014.2364709"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2014.2351671"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2016.04.011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1500446"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2003.08.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2012.2209662"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2386281"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700334.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1700334\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700334.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:39:44Z","timestamp":1771659584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1700334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":27,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["1292"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1700334","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]},"assertion":[{"value":"https:\/\/orcid.org\/0000-0003-2250-2127","URL":"http","order":0,"name":"name","label":"Meng-zhou GAO","group":{"name":"orcid","label":"ORCID"}},{"value":"2017-05-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-15","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2018","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}