{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:18:35Z","timestamp":1761920315632,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/acc.2017.7963229","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:39:58Z","timestamp":1499722798000},"page":"1898-1903","source":"Crossref","is-referenced-by-count":17,"title":["Secure state estimation for Cyber Physical Systems with sparse malicious packet drops"],"prefix":"10.23919","author":[{"given":"Gabriella","family":"Fiore","sequence":"first","affiliation":[]},{"given":"Young Hwan","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Qie","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Maria Domenica","family":"Di Benedetto","sequence":"additional","affiliation":[]},{"given":"Claire J.","family":"Tomlin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"journal-title":"Google Google Project Wing","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2006.11.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.01.008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"ref14","article-title":"Secure estimation for Unmanned Aerial Vehicles against adversarial cyber-attacks","author":"hu","year":"2016","journal-title":"16th Congress of the International Council of Aeronautical Sciences (ICAS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1429408"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3605","DOI":"10.23919\/ACC.2004.1384471","article-title":"Wireless medium access control in networked control systems","volume":"4","author":"liu","year":"2004","journal-title":"American Control Conference 2004 Proceedings of the 2004"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/978-3-642-32723-0_39","article-title":"Cooperative grasping and transport using multiple quadrotors","author":"mellinger","year":"2013","journal-title":"Distributed Autonomous Robotic Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2212616"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.09.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834121"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2492159"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-033-5","volume":"406","author":"bemporad","year":"2010","journal-title":"Networked Control Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171098"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2013.IX.011"},{"key":"ref5","article-title":"Secure estimation based Kalman filter for Cyber-Physical Systems against adversarial attacks","author":"chang","year":"2016","journal-title":"CoRR abs\/1512 03853v2"},{"key":"ref8","article-title":"Benedetto. Secure mode distinguishability for switching systems subject to sparse attacks","author":"fiore","year":"2017","journal-title":"IFAC 2017 World Congress"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2167789"},{"journal-title":"Amazon Amazon prime air","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364725"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.878169"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2013.6696850"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.844177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479119"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461460"}],"event":{"name":"2017 American Control Conference (ACC)","start":{"date-parts":[[2017,5,24]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951530\/7962914\/07963229.pdf?arnumber=7963229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T19:59:52Z","timestamp":1624478392000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7963229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/acc.2017.7963229","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}