Outlier‐resistant state estimation for complex networks with random false data injection attacks under encoding–decoding mechanism
Summary This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data injection attacks (FDIAs) under an encoding–decoding mechanism (EDM). From the perspective of information security, a uniform‐quantization‐b...
        Saved in:
      
    
          | Published in | International journal of adaptive control and signal processing Vol. 38; no. 8; pp. 2833 - 2854 | 
|---|---|
| Main Authors | , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Bognor Regis
          Wiley Subscription Services, Inc
    
        01.08.2024
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0890-6327 1099-1115  | 
| DOI | 10.1002/acs.3833 | 
Cover
| Abstract | Summary
This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data injection attacks (FDIAs) under an encoding–decoding mechanism (EDM). From the perspective of information security, a uniform‐quantization‐based EDM is employed to encrypt the transmitted data. During the data transmission process, a set of independent random variables governed by Bernoulli distribution is introduced to characterize the occurrence of random FDIAs. For the purpose of alleviating the passive impact of potential measurement outliers, a saturation structure is adopted during the estimator design. The gain matrix is given by minimizing the upper bound of estimation error covariance. According to the stochastic analysis method, it is shown that the state estimation error is bounded exponentially in mean‐square sense by providing new sufficient condition. It should be noted that we make the first attempt to develop new outlier‐resistant state estimation method with performance evolution criterion in the time‐varying perspective for TVCNs with random FDIAs under EDM. Finally, a simulation example with comparative experiment is presented to illustrate the effectiveness of the newly presented outlier‐resistant estimation algorithm. | 
    
|---|---|
| AbstractList | This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data injection attacks (FDIAs) under an encoding–decoding mechanism (EDM). From the perspective of information security, a uniform‐quantization‐based EDM is employed to encrypt the transmitted data. During the data transmission process, a set of independent random variables governed by Bernoulli distribution is introduced to characterize the occurrence of random FDIAs. For the purpose of alleviating the passive impact of potential measurement outliers, a saturation structure is adopted during the estimator design. The gain matrix is given by minimizing the upper bound of estimation error covariance. According to the stochastic analysis method, it is shown that the state estimation error is bounded exponentially in mean‐square sense by providing new sufficient condition. It should be noted that we make the first attempt to develop new outlier‐resistant state estimation method with performance evolution criterion in the time‐varying perspective for TVCNs with random FDIAs under EDM. Finally, a simulation example with comparative experiment is presented to illustrate the effectiveness of the newly presented outlier‐resistant estimation algorithm. Summary This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data injection attacks (FDIAs) under an encoding–decoding mechanism (EDM). From the perspective of information security, a uniform‐quantization‐based EDM is employed to encrypt the transmitted data. During the data transmission process, a set of independent random variables governed by Bernoulli distribution is introduced to characterize the occurrence of random FDIAs. For the purpose of alleviating the passive impact of potential measurement outliers, a saturation structure is adopted during the estimator design. The gain matrix is given by minimizing the upper bound of estimation error covariance. According to the stochastic analysis method, it is shown that the state estimation error is bounded exponentially in mean‐square sense by providing new sufficient condition. It should be noted that we make the first attempt to develop new outlier‐resistant state estimation method with performance evolution criterion in the time‐varying perspective for TVCNs with random FDIAs under EDM. Finally, a simulation example with comparative experiment is presented to illustrate the effectiveness of the newly presented outlier‐resistant estimation algorithm.  | 
    
| Author | Chen, Cai Hu, Jun Chi, Kun Jia, Chaoqing Liu, Yufeng  | 
    
| Author_xml | – sequence: 1 givenname: Yufeng surname: Liu fullname: Liu, Yufeng organization: Harbin University of Science and Technology – sequence: 2 givenname: Jun orcidid: 0000-0002-7852-5064 surname: Hu fullname: Hu, Jun email: jhu@hrbust.edu.cn organization: Harbin University of Science and Technology – sequence: 3 givenname: Chaoqing orcidid: 0000-0003-4875-2618 surname: Jia fullname: Jia, Chaoqing email: chaoqingjia@hrbust.edu.cn organization: Harbin University of Science and Technology – sequence: 4 givenname: Cai surname: Chen fullname: Chen, Cai organization: Harbin University of Science and Technology – sequence: 5 givenname: Kun surname: Chi fullname: Chi, Kun organization: Harbin University of Science and Technology  | 
    
| BookMark | eNp1kE1LAzEQhoNUsFbBnxDw4mVrsul-5FiKX1DoQT2HdDNrU7tJTbLU3nryLPgP-0tMu169zLwwz8zwvueoZ6wBhK4oGVJC0ltZ-SErGTtBfUo4TyilWQ_1SclJkrO0OEPn3i8JiTPK-uhr1oaVBrfffTvw2gdpAo41AAYfdCODtgbX1uHKNusVfGIDYWPdu8cbHRbYSaNsg2u58oCVDBJrs4TquCVDkFUEW6PAYTCVVdq87Xc_CjqJG6gW0mjfXKDT44nLvz5Ar_d3L5PHZDp7eJqMp0mVZiOW0EKWRcZSUnPF65EEUqaUFQWnxZwD5NF3OmeFknWes5pkCqKKIGFcUcprNkDX3d21sx9tdCiWtnUmvhSMcDpKi4yXkbrpqMpZ7x3UYu1iFG4rKBGHlEVMWRxSjmjSoRu9gu2_nBhPno_8L5MWhFQ | 
    
| Cites_doi | 10.1109/TNNLS.2019.2946290 10.1109/TSMC.2022.3164792 10.1016/j.jfranklin.2022.05.026 10.1109/TNNLS.2020.2991151 10.1109/TCYB.2023.3234452 10.1109/JAS.2022.105845 10.1109/TCYB.2020.3034456 10.1109/TIFS.2022.3175617 10.1109/TAC.2021.3131145 10.1109/TNNLS.2023.3308192 10.1080/00207721.2022.2122905 10.1016/j.jfranklin.2022.07.050 10.1109/9.754809 10.1016/j.automatica.2023.111100 10.1080/00207721.2023.2209887 10.1080/21642583.2023.2247007 10.1109/TCSII.2022.3182123 10.1109/TCYB.2021.3089375 10.1109/TCYB.2020.3016093 10.53941/ijndi0201007 10.1016/j.amc.2017.09.048 10.1109/TAC.2020.3016767 10.1016/j.automatica.2021.109684 10.53941/ijndi0201003 10.1016/j.ins.2020.07.047 10.1109/TAC.2017.2756259 10.1016/j.ins.2023.118950 10.1002/rnc.3623 10.1109/TFUZZ.2022.3189394 10.1109/JAS.2017.7510727 10.1109/TSP.2020.3042944 10.1109/TSMC.2022.3221641 10.1109/TCNS.2021.3049361 10.1109/TCYB.2021.3057545 10.1109/TSIPN.2017.2749959 10.1109/TCYB.2019.2944074 10.1016/j.neucom.2022.05.062 10.1002/asjc.2262 10.1109/JAS.2023.123558 10.1109/TCYB.2021.3067822 10.1109/TASE.2023.3236102 10.1109/TCYB.2021.3110587 10.1109/TCYB.2022.3209820 10.1016/j.automatica.2016.01.015 10.1109/MIS.2022.3173427 10.1016/j.amc.2021.126844 10.1016/j.ins.2022.10.023 10.1109/TFUZZ.2021.3111453  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2024 John Wiley & Sons Ltd. | 
    
| Copyright_xml | – notice: 2024 John Wiley & Sons Ltd. | 
    
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D  | 
    
| DOI | 10.1002/acs.3833 | 
    
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Technology Research Database CrossRef  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1099-1115 | 
    
| EndPage | 2854 | 
    
| ExternalDocumentID | 10_1002_acs_3833 ACS3833  | 
    
| Genre | researchArticle | 
    
| GrantInformation_xml | – fundername: Natural Science Foundation of Heilongjiang Province of China funderid: ZD2022F003 – fundername: National Natural Science Foundation of China funderid: 12171124; 12301567 – fundername: Alexander von Humboldt Foundation of Germany – fundername: National High‐end Foreign Experts Recruitment Plan of China funderid: G2023012004L – fundername: Fundamental Research Foundation for Universities of Heilongjiang Province of China funderid: 2022‐KYYWF‐0141  | 
    
| GroupedDBID | -~X .3N .GA .Y3 05W 0R~ 10A 1L6 1OB 1OC 31~ 33P 3EH 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAYOK AAZKR ABCQN ABCUV ABEML ABIJN ABJNI ACAHQ ACBWZ ACCFJ ACCZN ACGFO ACGFS ACIWK ACPOU ACRPL ACSCC ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AIAGR AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CMOOK CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS EJD F00 F01 F04 F5P FEDTE G-S G.N GNP GODZA H.T H.X HBH HF~ HGLYW HHY HHZ HVGLF HZ~ I-F IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES M59 MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- OIG P2P P2W P2X P4D PALCI PQQKQ Q.N Q11 QB0 QRW R.K RIWAO RJQFR ROL RWI RX1 SAMSI SUPJJ TUS UB1 V2E W8V W99 WBKPD WIH WIK WJL WLBEL WOHZO WQJ WRC WWI WXSBR WYISQ XG1 XPP XV2 ZZTAW ~IA ~WT AAMMB AAYXX AEFGJ AEYWJ AGHNM AGQPQ AGXDD AGYGG AIDQK AIDYY AIQQE AMVHM CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D  | 
    
| ID | FETCH-LOGICAL-c2543-17a875320f9d9f4ae0821377917b9ee68332b37daf663f05deaf69f4039d119f3 | 
    
| IEDL.DBID | DR2 | 
    
| ISSN | 0890-6327 | 
    
| IngestDate | Wed Aug 13 07:12:02 EDT 2025 Wed Oct 01 04:20:01 EDT 2025 Wed Jan 22 17:17:09 EST 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 8 | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c2543-17a875320f9d9f4ae0821377917b9ee68332b37daf663f05deaf69f4039d119f3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0002-7852-5064 0000-0003-4875-2618  | 
    
| PQID | 3091427598 | 
    
| PQPubID | 996374 | 
    
| PageCount | 22 | 
    
| ParticipantIDs | proquest_journals_3091427598 crossref_primary_10_1002_acs_3833 wiley_primary_10_1002_acs_3833_ACS3833  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | August 2024 2024-08-00 20240801  | 
    
| PublicationDateYYYYMMDD | 2024-08-01 | 
    
| PublicationDate_xml | – month: 08 year: 2024 text: August 2024  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Bognor Regis | 
    
| PublicationPlace_xml | – name: Bognor Regis | 
    
| PublicationTitle | International journal of adaptive control and signal processing | 
    
| PublicationYear | 2024 | 
    
| Publisher | Wiley Subscription Services, Inc | 
    
| Publisher_xml | – name: Wiley Subscription Services, Inc | 
    
| References | 2023; 53 2023; 31 2021; 69 2023; 54 2023; 10 2021; 8 2018; 320 2023; 11 2021; 23 2021; 66 2021; 544 2017; 27 2021; 129 2022; 67 2022; 69 1999; 44 2018; 63 2022; 418 2023; 2 2022; 615 2022; 359 2021; 52 2021; 51 2023; 21 2021; 32 2018; 5 2018; 4 2023 2020; 31 2023; 154 2022; 37 2022; 30 2022; 52 2023; 637 2022; 500 2022; 17 2016; 67 e_1_2_9_30_1 e_1_2_9_31_1 e_1_2_9_11_1 e_1_2_9_34_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_12_1 e_1_2_9_33_1 e_1_2_9_15_1 e_1_2_9_38_1 e_1_2_9_14_1 e_1_2_9_39_1 e_1_2_9_17_1 e_1_2_9_36_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_19_1 e_1_2_9_18_1 e_1_2_9_41_1 e_1_2_9_42_1 e_1_2_9_20_1 e_1_2_9_40_1 e_1_2_9_22_1 e_1_2_9_45_1 e_1_2_9_21_1 e_1_2_9_46_1 e_1_2_9_24_1 e_1_2_9_43_1 e_1_2_9_23_1 e_1_2_9_44_1 e_1_2_9_8_1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_5_1 e_1_2_9_4_1 e_1_2_9_3_1 e_1_2_9_2_1 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_49_1 e_1_2_9_25_1 e_1_2_9_28_1 e_1_2_9_47_1 e_1_2_9_27_1 e_1_2_9_48_1 e_1_2_9_29_1  | 
    
| References_xml | – volume: 359 start-page: 6503 issue: 12 year: 2022 end-page: 6522 article-title: Dynamic event‐based recursive filtering for networked systems under the encoding‐decoding mechanism publication-title: J Franklin Inst – volume: 52 start-page: 3733 issue: 5 year: 2022 end-page: 3744 article-title: Distributed maximum correntropy filtering for stochastic nonlinear systems under deception attacks publication-title: IEEE Trans Cybern – volume: 10 start-page: 1252 issue: 5 year: 2023 end-page: 1262 article-title: Adaptive fixed‐time control of nonlinear MASs with actuator faults publication-title: IEEE/CAA J Autom Sin – volume: 52 start-page: 11121 issue: 10 year: 2022 end-page: 11132 article-title: Recursive minimum‐variance filter design for state‐saturated complex networks with uncertain coupling strengths subject to deception attacks publication-title: IEEE Trans Cybern – volume: 52 start-page: 11504 issue: 11 year: 2022 end-page: 11515 article-title: Energy‐to‐peak state estimation with intermittent measurement outliers: the single‐output case publication-title: IEEE Trans Cybern – volume: 5 start-page: 3 issue: 1 year: 2018 end-page: 18 article-title: Encoding‐decoding‐based control and filtering of networked systems: insights, developments and opportunities publication-title: IEEE/CAA J Autom Sin – volume: 500 start-page: 868 year: 2022 end-page: 876 article-title: Dynamic event‐triggered state estimation for time‐delayed spatial‐temporal networks under encoding‐decoding scheme publication-title: Neurocomputing – volume: 23 start-page: 871 issue: 2 year: 2021 end-page: 881 article-title: Unscented Kalman filtering for nonlinear systems with sensor saturation and randomly occurring false data injection attacks publication-title: Asian J Control – volume: 27 start-page: 1194 issue: 7 year: 2017 end-page: 1208 article-title: Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks publication-title: Int J Robust Nonlinear Control – volume: 37 start-page: 98 issue: 3 year: 2022 end-page: 107 article-title: Deep fusion for travel time estimation based on road network topology publication-title: IEEE Intell Syst – volume: 69 start-page: 4904 issue: 12 year: 2022 end-page: 4908 article-title: Encoding‐decoding‐based distributed filtering for time‐varying saturated systems with constrained bit rate publication-title: IEEE Trans Circuits Syst II Express Briefs – volume: 129 year: 2021 article-title: Distributed set‐membership filtering for time‐varying systems: a coding‐decoding‐based approach publication-title: Automatica – volume: 67 start-page: 85 year: 2016 end-page: 93 article-title: Moving‐horizon estimation with guaranteed robustness for discrete‐time linear systems and measurements subject to outliers publication-title: Automatica – volume: 4 start-page: 48 issue: 1 year: 2018 end-page: 59 article-title: Distributed attack detection and secure estimation of networked cyber‐physical systems against false data injection attacks and jamming attacks publication-title: IEEE Trans Signal Inf Process Netw – volume: 51 start-page: 3845 issue: 7 year: 2021 end-page: 3857 article-title: Finite‐time passivity and synchronization of complex dynamical networks with state and derivative coupling publication-title: IEEE Trans Cybern – volume: 54 start-page: 371 issue: 2 year: 2023 end-page: 390 article-title: Distributed fusion filtering for uncertain systems with coupled noises, random delays and packet loss prediction compensation publication-title: Int J Syst Sci – volume: 2 issue: 2 year: 2023 article-title: A survey on recent advances in distributed filtering over sensor networks subject to communication constraints publication-title: Int J Netw Dyn Intell – volume: 54 start-page: 1729 issue: 8 year: 2023 end-page: 1745 article-title: Distributed recursive filtering for multi‐rate uniform sampling systems with packet losses in sensor networks publication-title: Int J Syst Sci – volume: 53 start-page: 3042 issue: 5 year: 2023 end-page: 3052 article-title: Event‐triggered finite‐time dissipative filtering for interval type‐2 fuzzy complex dynamical networks with cyber attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 31 start-page: 825 issue: 3 year: 2023 end-page: 834 article-title: Stochastic data‐based denial‐of‐service attack strategy design against remote state estimation in interval type‐2 T‐S fuzzy systems publication-title: IEEE Trans Fuzzy Syst – volume: 32 start-page: 2266 issue: 5 year: 2021 end-page: 2273 article-title: Outlier‐resistant remote state estimation for recurrent neural networks with mixed time‐delays publication-title: IEEE Trans Neural Netw Learn Syst – volume: 66 start-page: 3274 issue: 7 year: 2021 end-page: 3281 article-title: Probability‐guaranteed envelope‐constrained filtering for nonlinear systems subject to measurement outliers publication-title: IEEE Trans Automat Contr – volume: 53 start-page: 416 issue: 1 year: 2023 end-page: 427 article-title: Distributed set‐membership fusion filtering for nonlinear 2‐D systems over sensor networks: an encoding‐decoding scheme publication-title: IEEE Trans Cybern – volume: 67 start-page: 6745 issue: 12 year: 2022 end-page: 6753 article-title: State estimation under joint false data injection attacks: dealing with constraints and insecurity publication-title: IEEE Trans Automat Contr – volume: 44 start-page: 714 issue: 4 year: 1999 end-page: 728 article-title: Stochastic stability of the discrete‐time extended Kalman filter publication-title: IEEE Trans Automat Contr – volume: 11 issue: 1 year: 2023 article-title: Collaborative‐prediction‐based recursive filtering for nonlinear systems with sensor saturation under duty cycle scheduling publication-title: Syst Sci Control Eng – volume: 30 start-page: 3257 issue: 8 year: 2022 end-page: 3259 article-title: Robust asynchronous filtering for discrete‐time T‐S fuzzy complex dynamical networks against deception attacks publication-title: IEEE Trans Fuzzy Syst – year: 2023 article-title: Optimized distributed filtering for saturated systems with amplify‐and‐forward relays over sensor networks: a dynamic event‐triggered approach publication-title: IEEE Trans Neural Netw Learn Syst – volume: 17 start-page: 1959 year: 2022 end-page: 1969 article-title: A secure encoding mechanism against deception attacks on multisensor remote state estimation publication-title: IEEE Trans Inf Forensics Secur – year: 2023 article-title: Security analysis of distributed consensus filtering under replay attacks publication-title: IEEE Trans Cybern – volume: 8 start-page: 951 issue: 2 year: 2021 end-page: 963 article-title: Probability‐guaranteed distributed filtering for nonlinear systems with innovation constraints over sensor networks publication-title: IEEE Trans Control Netw Syst – volume: 544 start-page: 298 year: 2021 end-page: 307 article-title: Particle filtering for a class of cyber‐physical systems under round‐robin protocol subject to randomly occurring deception attacks publication-title: Inform Sci – volume: 53 start-page: 38 issue: 1 year: 2023 end-page: 48 article-title: Synchronization for complex networks with multiple state or delayed state couplings under recoverable attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 637 year: 2023 article-title: Distributed resilient fusion filtering for nonlinear systems with multiple missing measurements via dynamic event‐triggered mechanism publication-title: Inform Sci – volume: 52 start-page: 12805 issue: 12 year: 2021 end-page: 12817 article-title: Attacks on formation control for multiagent systems publication-title: IEEE Trans Cybern – volume: 69 start-page: 357 year: 2021 end-page: 369 article-title: Robust variational‐based Kalman filter for outlier rejection with correlated measurements publication-title: IEEE Trans Signal Process – volume: 2 issue: 2 year: 2023 article-title: Information fusion over network dynamics with unknown correlations: an overview publication-title: Int J Netw Dyn Intell – volume: 31 start-page: 3788 issue: 10 year: 2020 end-page: 3800 article-title: State‐saturated recursive filter design for stochastic time‐varying nonlinear complex networks under deception attacks publication-title: IEEE Trans Neural Netw Learn Syst – year: 2023 article-title: Recursive filtering under probabilistic encoding‐decoding schemes: handling randomly occurring measurement outliers publication-title: IEEE Trans Cybern – volume: 10 start-page: 1234 issue: 5 year: 2023 end-page: 1251 article-title: Resilient and safe platooning control of connected automated vehicles against intermittent denial‐of‐service attacks publication-title: IEEE/CAA J Autom Sin – volume: 52 start-page: 6901 issue: 7 year: 2022 end-page: 6910 article-title: Event‐triggered distributed state estimation for multiagent systems under DoS attacks publication-title: IEEE Trans Cybern – volume: 154 year: 2023 article-title: Deception attacks on event‐triggered distributed consensus estimation for nonlinear systems publication-title: Automatica – volume: 359 start-page: 10510 issue: 18 year: 2022 end-page: 10524 article-title: Finite‐time attack detection for nonlinear complex cyber‐physical networks under false data injection attacks publication-title: J Franklin Inst – volume: 418 year: 2022 article-title: Optimal distributed filtering for nonlinear saturated systems with random access protocol and missing measurements: the uncertain probabilities case publication-title: Appl Math Comput – volume: 615 start-page: 348 year: 2022 end-page: 367 article-title: Recursive filtering for complex networks with time‐correlated fading channels: an outlier‐resistant approach publication-title: Inform Sci – volume: 21 start-page: 881 year: 2023 end-page: 894 article-title: Toward data integrity attacks against distributed dynamic state estimation in smart grid publication-title: IEEE Trans Autom Sci Eng – volume: 320 start-page: 710 year: 2018 end-page: 730 article-title: Coevolution of cooperation and network structure in social dilemmas in evolutionary dynamic complex network publication-title: Appl Math Comput – volume: 63 start-page: 1648 issue: 6 year: 2018 end-page: 1663 article-title: Optimal denial‐of‐service attack scheduling with energy constraint over packet‐dropping networks publication-title: IEEE Trans Automat Contr – ident: e_1_2_9_30_1 doi: 10.1109/TNNLS.2019.2946290 – ident: e_1_2_9_5_1 doi: 10.1109/TSMC.2022.3164792 – ident: e_1_2_9_13_1 doi: 10.1016/j.jfranklin.2022.05.026 – ident: e_1_2_9_42_1 doi: 10.1109/TNNLS.2020.2991151 – ident: e_1_2_9_48_1 doi: 10.1109/TCYB.2023.3234452 – ident: e_1_2_9_26_1 doi: 10.1109/JAS.2022.105845 – ident: e_1_2_9_33_1 doi: 10.1109/TCYB.2020.3034456 – ident: e_1_2_9_16_1 doi: 10.1109/TIFS.2022.3175617 – ident: e_1_2_9_38_1 doi: 10.1109/TAC.2021.3131145 – ident: e_1_2_9_7_1 doi: 10.1109/TNNLS.2023.3308192 – ident: e_1_2_9_20_1 doi: 10.1080/00207721.2022.2122905 – ident: e_1_2_9_39_1 doi: 10.1016/j.jfranklin.2022.07.050 – ident: e_1_2_9_49_1 doi: 10.1109/9.754809 – ident: e_1_2_9_40_1 doi: 10.1016/j.automatica.2023.111100 – ident: e_1_2_9_21_1 doi: 10.1080/00207721.2023.2209887 – ident: e_1_2_9_8_1 doi: 10.1080/21642583.2023.2247007 – ident: e_1_2_9_14_1 doi: 10.1109/TCSII.2022.3182123 – ident: e_1_2_9_36_1 doi: 10.1109/TCYB.2021.3089375 – ident: e_1_2_9_31_1 doi: 10.1109/TCYB.2020.3016093 – ident: e_1_2_9_18_1 doi: 10.53941/ijndi0201007 – ident: e_1_2_9_4_1 doi: 10.1016/j.amc.2017.09.048 – ident: e_1_2_9_43_1 doi: 10.1109/TAC.2020.3016767 – ident: e_1_2_9_17_1 doi: 10.1016/j.automatica.2021.109684 – ident: e_1_2_9_19_1 doi: 10.53941/ijndi0201003 – ident: e_1_2_9_29_1 doi: 10.1016/j.ins.2020.07.047 – ident: e_1_2_9_34_1 doi: 10.1109/TAC.2017.2756259 – ident: e_1_2_9_10_1 doi: 10.1016/j.ins.2023.118950 – ident: e_1_2_9_28_1 doi: 10.1002/rnc.3623 – ident: e_1_2_9_32_1 doi: 10.1109/TFUZZ.2022.3189394 – ident: e_1_2_9_11_1 doi: 10.1109/JAS.2017.7510727 – ident: e_1_2_9_41_1 doi: 10.1109/TSP.2020.3042944 – ident: e_1_2_9_23_1 doi: 10.1109/TSMC.2022.3221641 – ident: e_1_2_9_44_1 doi: 10.1109/TCNS.2021.3049361 – ident: e_1_2_9_46_1 doi: 10.1109/TCYB.2021.3057545 – ident: e_1_2_9_25_1 doi: 10.1109/TSIPN.2017.2749959 – ident: e_1_2_9_6_1 doi: 10.1109/TCYB.2019.2944074 – ident: e_1_2_9_12_1 doi: 10.1016/j.neucom.2022.05.062 – ident: e_1_2_9_37_1 doi: 10.1002/asjc.2262 – ident: e_1_2_9_22_1 doi: 10.1109/JAS.2023.123558 – ident: e_1_2_9_27_1 doi: 10.1109/TCYB.2021.3067822 – ident: e_1_2_9_3_1 doi: 10.1109/TASE.2023.3236102 – ident: e_1_2_9_15_1 doi: 10.1109/TCYB.2021.3110587 – ident: e_1_2_9_35_1 doi: 10.1109/TCYB.2022.3209820 – ident: e_1_2_9_45_1 doi: 10.1016/j.automatica.2016.01.015 – ident: e_1_2_9_2_1 doi: 10.1109/MIS.2022.3173427 – ident: e_1_2_9_9_1 doi: 10.1016/j.amc.2021.126844 – ident: e_1_2_9_47_1 doi: 10.1016/j.ins.2022.10.023 – ident: e_1_2_9_24_1 doi: 10.1109/TFUZZ.2021.3111453  | 
    
| SSID | ssj0009913 | 
    
| Score | 2.386251 | 
    
| Snippet | Summary
This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data... This article focuses on the outlier‐resistant state estimation problem for discrete time‐varying complex networks (TVCNs) affected by random false data...  | 
    
| SourceID | proquest crossref wiley  | 
    
| SourceType | Aggregation Database Index Database Publisher  | 
    
| StartPage | 2833 | 
    
| SubjectTerms | Algorithms Coding complex networks Data analysis Data transmission Decoding encoding–decoding mechanism Error analysis exponential boundedness in mean‐square sense Impact analysis Independent variables Outliers (statistics) random false data injection attacks Random variables State estimation Upper bounds  | 
    
| Title | Outlier‐resistant state estimation for complex networks with random false data injection attacks under encoding–decoding mechanism | 
    
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Facs.3833 https://www.proquest.com/docview/3091427598  | 
    
| Volume | 38 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 1099-1115 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0009913 issn: 0890-6327 databaseCode: AMVHM dateStart: 20120601 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 0890-6327 databaseCode: DR2 dateStart: 19960101 customDbUrl: isFulltext: true eissn: 1099-1115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009913 providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LSsNAFB1EN7rwLVarjCDuUpNJMuksS7EUoQq-EFyEzCOg0ihtCuLKlWvBP-yXeO9MY1UQxFUGMgPJvO65k3NOCNnX3CgecN9jXMZeJJmAfVBlnpYqyiMldGIt83snvHsZHV_H1xNWJWphnD_E54Ebrgy7X-MCz-TwcGoamqlhA9IrNPoMQm6zqbOpcxTAHvtxuSkgOwpZUvnO-uywavg9Ek3h5VeQaqNMZ4ncVM_nyCX3jVEpG-r5h3Xj_15gmSxOwCdtudmyQmZMsUoWvlgSrpHX01EJsHQwfnmDRBzBZVFSqzqi6MfhhI4UkC61ZHTzRAtHJB9SPNKlEPr0Q5_mMKsNRfopvS3uLN2roFlZoqKfom5tQNFBEwPn-OVdG1ekfYNC5Nthf51cdo4u2l1v8q8GT6Gc3guSDDMf5udCizzKDEALa2YYJFIYw-E9mQwTneUAcXI_1gZKUNEPhQ4CkYcbZLZ4KMwmoc3Y5L5Bp3iAd5wFGcccUTGfKyWVljWyV41b-ugsOVJnvsxS6NMU-7RG6tWAppNFCTcAG0UsiUWzRg7syPzaPm21z_G69deK22SeAdxx1MA6mS0HI7MDcKWUu2Su1bvq9nbtBP0A8SztQQ | 
    
| linkProvider | Wiley-Blackwell | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS-RAEMcLH4fVw65PnF1XW5C9ZUw6SWeaPYmsjG9wFTwIIf0IqEyUmQwse_LkWdhv6CfZqu7JjisI4ikN6YakX_WrTtU_AJtGWC0iEQZcqDRIFJe4D-oiMEonZaKlyZxk_tGx6J4n-xfpxQR8b3JhvD7EvwM3Whluv6YFTgfSW2PV0EIP2uhfxZMwnQh0U4iITsfaUQg-7vNyR6J_FPOsUZ4N-VbT8n9bNAbM55jq7MzuJ7hsntCHl9y0h7Vq698vxBvf-Qpz8HHEn2zbT5h5mLDVAsw-UyVchIeTYY1k2n-6f0RfnPiyqplLPGIkyeFzHRnCLnPx6PYXq3ws-YDRqS5D62due6zEiW0ZRaCyq-raRXxVrKhrSupnlLrWZySiSbbz6f6Psb7IepZyka8GvSU43_1xttMNRr9rCDRl1AdRVpDzw8NSGlkmhUW6cHqGUaaktQLfk6s4M0WJlFOGqbFYwophLE0UyTJehqnqtrIrwDqpLUNLYvFIeIJHhSA3UfNQaK20US3YaAYuv_OqHLnXX-Y59mlOfdqC1WZE89G6xBuIRwnPUtlpwTc3NK-2z7d3ftL181srrsOH7tnRYX64d3zwBWY40o-PFFyFqbo_tF-RXmq15mbpX0I_78Y | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PSxwxFH5YhdIeqrYVt_5oCqW3WWcyM5kNnkRdtLW2tBU8FIbJL9Cyo-zOgnjy5FnwP_Qv8b1kx7WFQulpApPAJHnJ-17yvW8A3hthtUhEHHGh8ihTXOI-qKvIKJ25TEtTeMn8z4di7yj7eJwfz8BmmwsT9CEeDtxoZfj9mha4PTduY6oaWulRF-Or9AnMZbnsEZ9v59tUOwqBj79e7kmMj1JetMqzMd9oW_7ui6YA8zFM9X6mPw8_2y8M9JJf3XGjuvryD_HG_-zCAryY4E-2FQxmEWZs_RKeP1IlfAXXX8YNItPh3dUNxuKEL-uG-cQjRpIcIdeRIdhlno9uL1gduOQjRqe6DL2fORswh4ZtGTFQ2Ul96hlfNauahpL6GaWuDRmJaJLvvLu6NTYU2cBSLvLJaPAajvq7P7b3osnvGiJNGfVRUlQU_PDYSSNdVllEF17PMCmUtFZgP7lKC1M5RDkuzo3FElaMU2mSRLp0CWbrs9ouA-vl1sWWxOIR4QmeVILCRM1jobXSRnXgXTtx5XlQ5SiD_jIvcUxLGtMOrLYzWk7WJb5AeJTxAs2lAx_81Py1fbm1_Z2eb_614lt4-nWnXx7sH35agWccwU8gCq7CbDMc2zUEL41a90Z6DwJF70o | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Outlier%E2%80%90resistant+state+estimation+for+complex+networks+with+random+false+data+injection+attacks+under+encoding%E2%80%93decoding+mechanism&rft.jtitle=International+journal+of+adaptive+control+and+signal+processing&rft.au=Liu%2C+Yufeng&rft.au=Hu%2C+Jun&rft.au=Jia%2C+Chaoqing&rft.au=Chen%2C+Cai&rft.date=2024-08-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=0890-6327&rft.eissn=1099-1115&rft.volume=38&rft.issue=8&rft.spage=2833&rft.epage=2854&rft_id=info:doi/10.1002%2Facs.3833&rft.externalDBID=NO_FULL_TEXT | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0890-6327&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0890-6327&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0890-6327&client=summon |