{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:01:29Z","timestamp":1751860889785,"version":"3.41.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/acc.2018.8431459","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:16:10Z","timestamp":1534536970000},"page":"5737-5743","source":"Crossref","is-referenced-by-count":8,"title":["Linear Quadratic Gaussian Control Under False Data Injection Attacks"],"prefix":"10.23919","author":[{"given":"Andrew","family":"Clark","sequence":"first","affiliation":[]},{"given":"Luyao","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"355","article-title":"Attacks against process control systems: risk assessment, detection, and response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref13","article-title":"Cyber physical attacks with control objectives","author":"chen","year":"2017","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref16","volume":"1","author":"bertsekas","year":"1995","journal-title":"Dynamic Programming and Optimal Control"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SysTol.2013.6693850"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282993"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403027"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-06218-1","author":"kezunovic","year":"2014","journal-title":"Application of Time-Synchronized Measurements in Power System Transmission Networks"},{"journal-title":"Drone hijacking? thats just the start of gps troubles","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2211873"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","article-title":"Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks","volume":"5","author":"shepard","year":"2012","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/HAVE.2002.1106916","article-title":"Teleoperation of a mobile robot through haptic feedback","author":"diolaiti","year":"2002","journal-title":"Haptic Virtual Environments and Their Applications IEEE International Workshop 2002 HAVE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"journal-title":"Aided Navigation GPS with High Rate Sensors","year":"2008","author":"farrell","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6858733"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks.","volume":"5469","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control (HSCC)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-1354(98)00301-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982135"}],"event":{"name":"2018 Annual American Control Conference (ACC)","start":{"date-parts":[[2018,6,27]]},"location":"Milwaukee, WI","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Annual American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410068\/8430677\/08431459.pdf?arnumber=8431459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T11:48:26Z","timestamp":1751802506000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8431459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/acc.2018.8431459","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}