{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:54Z","timestamp":1776926334776,"version":"3.51.2"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065946","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:39:26Z","timestamp":1750135166000},"page":"4539-4561","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Optimized Attack and Detection on Multi-Sensor Cyber-Physical System"],"prefix":"10.32604","volume":"84","author":[{"given":"Fangju","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hanbo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Ren","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security\u2014a survey","volume":"4","author":"Humayed","year":"2017 Dec","journal-title":"IEEE Internet Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","article-title":"Secure estimation and control for cyber-physical systems under adversarial attacks","volume":"59","author":"Fawzi","year":"2014 Jun","journal-title":"IEEE Trans Automat Contr"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3616","DOI":"10.1109\/TCYB.2019.2956137","article-title":"Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks","volume":"50","author":"Zhang","year":"2020 Aug","journal-title":"IEEE Trans Cybern"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1049\/iet-cta.2019.1140","article-title":"Sensor attack detection for cyber-physical systems based on frequency domain partition","volume":"14","author":"Gu","year":"2020 Jul","journal-title":"IET Control Theory Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.31127\/tuje.640282","article-title":"A brief review on attack design and detection strategies for networked cyber-physical systems","volume":"5","author":"Ayas","year":"2021","journal-title":"Turkish J Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"103540","DOI":"10.1016\/j.jnca.2022.103540","article-title":"Review on cyber-physical and cyber-security system in smart grid: standards, protocols, constraints, and recommendations","volume":"209","author":"Hasan","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref7","series-title":"1st ACM International Conference on High Confidence Networked Systems","first-page":"55","article-title":"Attack models and scenarios for networked control systems","author":"Teixeira","year":"2012 Apr 17\u201319"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1109\/TCYB.2019.2915124","article-title":"Summation detector for false data-injection attack in cyber-physical systems","volume":"50","author":"Ye","year":"2020 Jun","journal-title":"IEEE Trans Cybern"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1002\/rnc.7146","article-title":"Binary observation-based FIR system identification under sequence denial of service attacks","volume":"34","author":"Wei","year":"2024 Mar","journal-title":"Int J Robust Nonlinear Control"},{"key":"ref10","first-page":"811","article-title":"Event-triggered control for networked systems under denial of service attacks and applications","volume":"69","author":"Zhao","year":"2022 Feb","journal-title":"IEEE Trans Circuits Syst I: Regular Papers"},{"key":"ref11","series-title":"Proceeding of the 47th Annual Allerton Conference on Communication, Control, and Computing","article-title":"Secure control against replay attacks","author":"Mo","year":"2009 Sep"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"110926","DOI":"10.1016\/j.automatica.2023.110926","article-title":"A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems","volume":"151","author":"Li","year":"2023","journal-title":"Automatica"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1941","DOI":"10.1109\/TAC.2022.3174004","article-title":"Sequential detection of replay attacks","volume":"68","author":"Naha","year":"2023 Mar","journal-title":"IEEE Trans Automat Contr"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/TAC.2019.2914655","article-title":"On the performance analysis of reset attack in cyber-physical systems","volume":"65","author":"Ni","year":"2020 Jan","journal-title":"IEEE Trans Automat Contr"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TAC.2020.2980730","article-title":"Remote state estimation in the presence of an active eavesdropper","volume":"66","author":"Ding","year":"2021 Jan","journal-title":"IEEE Trans Automat Contr"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4529","DOI":"10.1109\/TAC.2022.3161259","article-title":"False data injection attacks against state estimation without knowledge of estimators","volume":"67","author":"Lu","year":"2022 Sep","journal-title":"IEEE Trans Automat Contr"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"111523","DOI":"10.1016\/j.automatica.2024.111523","article-title":"Scheduler-pointed false data injection attack for event-based remote state estimation","volume":"162","author":"Xu","year":"2024","journal-title":"Automatica"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1049\/iet-cta.2018.5954","article-title":"State estimation for linear systems with unknown input and random false data injection attack","volume":"13","author":"Li","year":"2019 Apr","journal-title":"IET Control Theory Appl"},{"key":"ref19","first-page":"873","article-title":"A deep learning-based frechet and dirichlet model for intrusion detection in IWSN","volume":"42","author":"Alzubi","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1007\/s10586-022-03686-0","article-title":"Fusion of deep learning based cyberattack detection and classification model for intelligent systems","volume":"26","author":"Alzubi","year":"2023","journal-title":"Cluster Comput"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.automatica.2017.11.018","article-title":"Worst-case stealthy innovation-based linear attack on remote state estimation","volume":"89","author":"Guo","year":"2018 Mar","journal-title":"Automatica"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"110079","DOI":"10.1016\/j.automatica.2021.110079","article-title":"How vulnerable is innovation-based remote state estimation: fundamental limits under linear attacks","volume":"136","author":"Liu","year":"2022 Feb","journal-title":"Automatica"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TCNS.2017.2648508","article-title":"Detection against linear deception attacks on multi-sensor remote state estimation","volume":"5","author":"Li","year":"Jan 2017","journal-title":"IEEE Trans Control Netw Syst"},{"key":"ref24","first-page":"4096","article-title":"Deception attacks on remote estimation with disclosure and disruption resources","volume":"68","author":"Li","year":"2023 Jul","journal-title":"IEEE Trans Automat Contr"},{"key":"ref25","series-title":"IEEE International Symposium on Information Theory (ISIT)","first-page":"3068","article-title":"Quickest detection of false data injection attack in remote state estimation","author":"Gupta","year":"2021 Jul 12\u201320"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"110461","DOI":"10.1016\/j.automatica.2022.110461","article-title":"Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis","volume":"144","author":"Li","year":"2022 Oct","journal-title":"Automatica"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCNS.2016.2570003","article-title":"Optimal linear cyber-attack on remote state estimation","volume":"4","author":"Guo","year":"2017 Mar","journal-title":"IEEE Trans Control Netw Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TSP.2018.2879037","article-title":"Secure state estimation against integrity attacks: a gaussian mixture model approach","volume":"67","author":"Guo","year":"2019 Jan","journal-title":"IEEE Trans Signal Process"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ifacol.2020.12.1719","article-title":"An optimal linear attack strategy on remote state estimation","volume":"53","author":"Liu","year":"2020","journal-title":"IFAC-PapersOnLine"},{"key":"ref30","first-page":"301","author":"Pandey","year":"2025","journal-title":"Optimized energy management strategies for electric vehicles"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65946\/TSP_CMC_65946.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:23Z","timestamp":1776923123000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065946","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}