Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks

This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed t...

Full description

Saved in:
Bibliographic Details
Published inAutomatica (Oxford) Vol. 103; pp. 503 - 514
Main Authors Lu, An-Yang, Yang, Guang-Hong
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.05.2019
Subjects
Online AccessGet full text
ISSN0005-1098
1873-2836
DOI10.1016/j.automatica.2019.02.016

Cover

Abstract This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed to estimate the state. The computational complexity is reduced through improving the convergence rate, reducing the number of candidates to be searched, reducing the search times, and reducing the computing resources consumed by each incorrect candidate selection simultaneously. Second, based on the proposed switched gradient descent algorithm, an observer-based algorithm is proposed to efficiently update the state estimation while new measurements are available. Compared with the existing methods, the computational complexity is reduced greatly without introducing any constraint except the basic observability assumption by adopting the proposed algorithms.
AbstractList This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses a switched gradient descent technique to harness the intrinsic combinatorial complexity of the secure state estimation problem, is proposed to estimate the state. The computational complexity is reduced through improving the convergence rate, reducing the number of candidates to be searched, reducing the search times, and reducing the computing resources consumed by each incorrect candidate selection simultaneously. Second, based on the proposed switched gradient descent algorithm, an observer-based algorithm is proposed to efficiently update the state estimation while new measurements are available. Compared with the existing methods, the computational complexity is reduced greatly without introducing any constraint except the basic observability assumption by adopting the proposed algorithms.
Author Lu, An-Yang
Yang, Guang-Hong
Author_xml – sequence: 1
  givenname: An-Yang
  surname: Lu
  fullname: Lu, An-Yang
  email: luanyang1991@stumail.neu.edu.cn
  organization: College of Information Science and Engineering, Northeastern University, Shenyang 110819, PR China
– sequence: 2
  givenname: Guang-Hong
  surname: Yang
  fullname: Yang, Guang-Hong
  email: yangguanghong@ise.neu.edu.cn
  organization: College of Information Science and Engineering, Northeastern University, Shenyang 110819, PR China
BookMark eNqNkNtKAzEQhoNUsK2-Q15g12SPyY2gxRMIXqjXYTaZbVPbTUlSxbc3awXBG72aGf6Zf2a-GZkMbkBCKGc5Z7w5X-ewj24L0WrIC8Zlzoo8CUdkykVbZoUomwmZMsbqjDMpTsgshHUqKy6KKemf3m3UKzR0590adUzZ0oOxOERqMOgxwmbpvI2rbaC98zSg3nukIUJEiiHacbsb6H4wmNQd-JBUHELqhRhBv4ZTctzDJuDZd5yTl5vr58Vd9vB4e7-4fMh0yUXMTNNo2TOoatlyAFn3dd03YCphug5RdqVouJBVJ6AVHLCWdcNkhaaoWuwKKOdEHHy1dyF47NXOp_P8h-JMjbzUWv3wUiMvxQqVhDR68WtU2_j1WPRgN_8xuDoYYHrwzaJXQSeMGo31Cawyzv5t8gkhTZPQ
CitedBy_id crossref_primary_10_1002_oca_3096
crossref_primary_10_1109_TSMC_2022_3213516
crossref_primary_10_1002_rnc_6428
crossref_primary_10_1109_TCYB_2020_2975042
crossref_primary_10_1109_TIFS_2022_3206419
crossref_primary_10_1109_TSMC_2020_2970040
crossref_primary_10_1002_acs_3720
crossref_primary_10_1016_j_automatica_2023_110999
crossref_primary_10_1016_j_automatica_2022_110759
crossref_primary_10_1109_TSMC_2020_3035768
crossref_primary_10_1016_j_cja_2020_07_037
crossref_primary_10_3934_era_2023340
crossref_primary_10_1109_TCNS_2023_3247562
crossref_primary_10_1109_TFUZZ_2020_2990772
crossref_primary_10_1080_21642583_2020_1834465
crossref_primary_10_1002_mde_3551
crossref_primary_10_1109_TCNS_2021_3112774
crossref_primary_10_1109_TCSII_2023_3311786
crossref_primary_10_1016_j_neucom_2024_127272
crossref_primary_10_1002_rnc_4890
crossref_primary_10_1016_j_jfranklin_2022_09_001
crossref_primary_10_1109_TSMC_2023_3344876
crossref_primary_10_1016_j_automatica_2022_110388
crossref_primary_10_1016_j_automatica_2022_110740
crossref_primary_10_1109_TCSI_2021_3090402
crossref_primary_10_1109_TCSII_2020_2964650
crossref_primary_10_1109_TSMC_2020_3041121
crossref_primary_10_1016_j_amc_2020_125284
crossref_primary_10_1016_j_automatica_2023_110927
crossref_primary_10_1109_TCYB_2021_3049508
crossref_primary_10_1002_rnc_6481
crossref_primary_10_1109_TASE_2023_3319334
crossref_primary_10_1109_TCNS_2022_3203356
crossref_primary_10_1109_TICPS_2024_3435648
crossref_primary_10_1049_iet_cta_2019_1140
crossref_primary_10_1002_acs_3094
crossref_primary_10_1007_s11071_020_05905_y
crossref_primary_10_1016_j_ins_2023_119452
crossref_primary_10_1002_rnc_6144
crossref_primary_10_1109_TAC_2023_3275965
crossref_primary_10_1109_TAC_2023_3307391
Cites_doi 10.1109/CDC.2011.6160641
10.1109/TAC.2010.2088690
10.1109/TCST.2015.2462741
10.1049/iet-cta.2014.1013
10.1109/TCST.2013.2280899
10.1109/MCS.2014.2364725
10.1016/j.amc.2015.10.062
10.1109/TAC.2016.2565062
10.1016/j.ins.2017.07.029
10.1109/JPROC.2011.2161428
10.1109/TAC.2013.2266831
10.1109/MSP.2011.67
10.1049/iet-cta.2015.1147
10.1109/CDC.2015.7403131
10.1109/ACC.2015.7171098
10.1109/JAS.2016.7373757
10.1109/TCAD.2016.2523937
10.1109/TAC.2017.2676679
10.1109/TAC.2014.2363897
10.1145/3078621
10.1007/978-3-642-40349-1_4
10.1109/MCS.2014.2364709
10.1109/TSG.2016.2581588
10.1016/j.automatica.2017.09.028
10.1109/TAC.2014.2303233
10.1109/TAC.2015.2492159
ContentType Journal Article
Copyright 2019 Elsevier Ltd
Copyright_xml – notice: 2019 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.automatica.2019.02.016
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-2836
EndPage 514
ExternalDocumentID 10_1016_j_automatica_2019_02_016
S0005109819300597
GrantInformation_xml – fundername: Funds of National Science of China
  grantid: 61621004; 61420106016; 61773097
– fundername: Research Fund of State Key Laboratory of Synthetical Automation for Process Industries
  grantid: 2018ZCX03
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
23N
3R3
4.4
457
4G.
5GY
5VS
6TJ
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
ABDEX
ABFNM
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADIYS
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHPGS
AI.
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
APLSM
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
K-O
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSB
SSD
SST
SSZ
T5K
T9H
TAE
TN5
VH1
WH7
WUQ
X6Y
XFK
XPP
ZMT
~G-
77I
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c318t-d66c9f0a45971aa95f55f6ad48dbbee9b3861894b8a781ae5956094ed247eb2a3
IEDL.DBID .~1
ISSN 0005-1098
IngestDate Wed Oct 01 05:20:21 EDT 2025
Thu Apr 24 22:57:11 EDT 2025
Fri Feb 23 02:23:48 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Switched gradient descent algorithm
Secure state estimation
Cyber–physical systems
Pre-processing method
Luenberger observer
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c318t-d66c9f0a45971aa95f55f6ad48dbbee9b3861894b8a781ae5956094ed247eb2a3
PageCount 12
ParticipantIDs crossref_primary_10_1016_j_automatica_2019_02_016
crossref_citationtrail_10_1016_j_automatica_2019_02_016
elsevier_sciencedirect_doi_10_1016_j_automatica_2019_02_016
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2019
2019-05-00
PublicationDateYYYYMMDD 2019-05-01
PublicationDate_xml – month: 05
  year: 2019
  text: May 2019
PublicationDecade 2010
PublicationTitle Automatica (Oxford)
PublicationYear 2019
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Mo, Chabukswar, Sinopoli (b15) 2014; 22
Shoukry, Tabuada (b25) 2016; 61
Pasqualetti, F., Dörfler, F., & Bullo, F. (2015b). A divide-and-conquer approach to distributed attack identification. In
Pasqualetti, Dorfler, Bullo (b19) 2015; 35
Zheng, Deng, Anguluri, Zhu, Pasqualetti (b30) 2016; 35
An, Yang (b2) 2017
(pp. 2439–2444).
(pp. 55–72).
Mo, Kim, Brancik, Dickinson, Lee, Perrig, Sinopoli (b16) 2012; 100
Farraj, Hammad, Kundur (b6) 2018; 9
Sundaram, Hadjicostis (b26) 2011; 56
Shoukry, Chong, Wakaiki, Nuzzo, Sangiovanni-Vincentelli, Seshia, Hespanha, Tabuada (b22) 2018; 2
Pasqualetti, F., Dörfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In
Teixeira, Sou, Sandberg, Johansson (b27) 2015; 35
Lu, Yang (b12) 2017; 417
Shoukry, Y., Martin, P. D., Tabuada, P., & Srivastava, M. B. (2013). Non-invasive spoofing attacks for anti-lock braking systems. In
(pp. 5801–5807).
Persis, Postoyan (b21) 2017; 62
An, Yang (b1) 2017
Kwon, Hwang (b10) 2016; 10
Pasqualetti, Dörfler, Bullo (b18) 2013; 58
Shoukry, Nuzzo, Puggelli, Sangiovanni-Vincentelli, Seshia, Tabuada (b24) 2017; 62
Guan, Yang, Chen, Dai, Y. (b8) 2016; 3
(pp. 2195–2201).
Lu, Yang (b13) 2018
Zhang, Cheng, Shi, Chen (b29) 2016; 24
Antsaklis (b3) 2014; 59
Chong, M. S., Wakaiki, M., & Hespanha, J. P. (2015). Observability of linear systems under adversarial attacks. In
Manandhar, Cao, Hu, Liu (b14) 2014; 1
Hu, Wang, Han, Liu (b9) 2018; 87
Zhai, Lu, Li, Zhang (b28) 2016; 273
Ao, Song, Wen (b4) 2016; 10
Fawzi, Tabuada, Diggavi (b7) 2014; 59
Langner (b11) 2011; 9
Teixeira (10.1016/j.automatica.2019.02.016_b27) 2015; 35
Persis (10.1016/j.automatica.2019.02.016_b21) 2017; 62
Shoukry (10.1016/j.automatica.2019.02.016_b24) 2017; 62
Antsaklis (10.1016/j.automatica.2019.02.016_b3) 2014; 59
Zhang (10.1016/j.automatica.2019.02.016_b29) 2016; 24
Langner (10.1016/j.automatica.2019.02.016_b11) 2011; 9
An (10.1016/j.automatica.2019.02.016_b1) 2017
Zhai (10.1016/j.automatica.2019.02.016_b28) 2016; 273
10.1016/j.automatica.2019.02.016_b5
Kwon (10.1016/j.automatica.2019.02.016_b10) 2016; 10
Pasqualetti (10.1016/j.automatica.2019.02.016_b18) 2013; 58
Farraj (10.1016/j.automatica.2019.02.016_b6) 2018; 9
Pasqualetti (10.1016/j.automatica.2019.02.016_b19) 2015; 35
10.1016/j.automatica.2019.02.016_b20
Lu (10.1016/j.automatica.2019.02.016_b13) 2018
Fawzi (10.1016/j.automatica.2019.02.016_b7) 2014; 59
10.1016/j.automatica.2019.02.016_b23
Guan (10.1016/j.automatica.2019.02.016_b8) 2016; 3
Hu (10.1016/j.automatica.2019.02.016_b9) 2018; 87
Ao (10.1016/j.automatica.2019.02.016_b4) 2016; 10
Lu (10.1016/j.automatica.2019.02.016_b12) 2017; 417
Mo (10.1016/j.automatica.2019.02.016_b15) 2014; 22
Shoukry (10.1016/j.automatica.2019.02.016_b25) 2016; 61
Shoukry (10.1016/j.automatica.2019.02.016_b22) 2018; 2
An (10.1016/j.automatica.2019.02.016_b2) 2017
Zheng (10.1016/j.automatica.2019.02.016_b30) 2016; 35
Sundaram (10.1016/j.automatica.2019.02.016_b26) 2011; 56
Manandhar (10.1016/j.automatica.2019.02.016_b14) 2014; 1
Mo (10.1016/j.automatica.2019.02.016_b16) 2012; 100
10.1016/j.automatica.2019.02.016_b17
References_xml – volume: 87
  start-page: 176
  year: 2018
  end-page: 183
  ident: b9
  article-title: State estimation under false data injection attacks: security analysis and system protection
  publication-title: Automatica
– reference: (pp. 2195–2201).
– volume: 2
  year: 2018
  ident: b22
  article-title: Smt-based observer design for cyber-physical systems under sensor attacks
  publication-title: ACM Transactions on Cyber-Physical Systems
– volume: 35
  start-page: 699
  year: 2016
  end-page: 711
  ident: b30
  article-title: Cross-layer codesign for secure cyber-physical systems
  publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
– reference: (pp. 5801–5807).
– volume: 61
  start-page: 2079
  year: 2016
  end-page: 2091
  ident: b25
  article-title: Event-triggered state observers for sparse sensor noise/attacks
  publication-title: IEEE Transactions on Automatic Control
– volume: 24
  start-page: 843
  year: 2016
  end-page: 852
  ident: b29
  article-title: Optimal dos attack scheduling in wireless networked control system
  publication-title: IEEE Transactions on Control Systems Technology
– reference: (pp. 2439–2444).
– volume: 35
  start-page: 24
  year: 2015
  end-page: 45
  ident: b27
  article-title: Secure control systems: a quantitative risk management approach
  publication-title: IEEE Control Systems
– year: 2017
  ident: b2
  article-title: Distributed secure state estimation under sensor attacks: vote-location nonconvex optimization approach
  publication-title: Automatica
– volume: 10
  start-page: 1458
  year: 2016
  end-page: 1468
  ident: b4
  article-title: Adaptive cyber-physical system attack detection and reconstruction with application to power systems
  publication-title: IET Control Theory Applications
– year: 2018
  ident: b13
  article-title: Secure switched observers for cyber-physical systems under sparse sensor attacks: a set cover approach
  publication-title: IEEE Transactions on Automatic Control
– volume: 35
  start-page: 110
  year: 2015
  end-page: 127
  ident: b19
  article-title: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems
  publication-title: IEEE Control Systems
– reference: Shoukry, Y., Martin, P. D., Tabuada, P., & Srivastava, M. B. (2013). Non-invasive spoofing attacks for anti-lock braking systems. In
– volume: 273
  start-page: 767
  year: 2016
  end-page: 792
  ident: b28
  article-title: Simultaneous fault detection and control for switched linear systems with mode-dependent average dwell-time
  publication-title: Applied Mathematics and Computation
– volume: 62
  start-page: 4917
  year: 2017
  end-page: 4932
  ident: b24
  article-title: Secure state estimation for cyber physical systems under sensor attacks: a satisfiability modulo theory approach
  publication-title: IEEE Transactions on Automatic Control
– volume: 62
  start-page: 808
  year: 2017
  end-page: 823
  ident: b21
  article-title: A lyapunov redesign of coordination algorithms for cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
– volume: 9
  start-page: 1205
  year: 2018
  end-page: 1215
  ident: b6
  article-title: A cyber-physical control framework for transient stability in smart grids
  publication-title: IEEE Transactions on Smart Grid
– reference: Pasqualetti, F., Dörfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In
– volume: 9
  start-page: 49
  year: 2011
  end-page: 51
  ident: b11
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Security Privacy
– volume: 22
  start-page: 1369
  year: 2014
  end-page: 1407
  ident: b15
  article-title: Detecting integrity attacks on scada systems
  publication-title: IEEE Transactions on Control Systems Technology
– reference: Pasqualetti, F., Dörfler, F., & Bullo, F. (2015b). A divide-and-conquer approach to distributed attack identification. In
– volume: 1
  start-page: 370
  year: 2014
  end-page: 379
  ident: b14
  article-title: Detection of faults and attacks including false data injection attack in smart grid using kalman filter
  publication-title: IEEE Transactions on Control Systems Technology
– reference: Chong, M. S., Wakaiki, M., & Hespanha, J. P. (2015). Observability of linear systems under adversarial attacks. In
– year: 2017
  ident: b1
  article-title: Supervisory nonlinear state observers for location-varying sparse attacks
  publication-title: Automatica
– volume: 417
  start-page: 454
  year: 2017
  end-page: 464
  ident: b12
  article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer
  publication-title: Information Sciences
– volume: 59
  start-page: 1454
  year: 2014
  end-page: 1467
  ident: b7
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic Control
– volume: 58
  start-page: 2715
  year: 2013
  end-page: 2729
  ident: b18
  article-title: Attack detection and identification in cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
– volume: 100
  start-page: 195
  year: 2012
  end-page: 209
  ident: b16
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proceedings of the IEEE
– volume: 3
  start-page: 1
  year: 2016
  end-page: 14
  ident: b8
  article-title: A comprehensive overview of cyber-physical systems: from perspective of feedback system
  publication-title: IEEE/CAA Journal of Automatica Sinica
– volume: 56
  start-page: 1495
  year: 2011
  end-page: 1508
  ident: b26
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 55–72).
– volume: 59
  start-page: 3117
  year: 2014
  end-page: 3119
  ident: b3
  article-title: Goals and challenges in cyber-physical systems research editorial of the editor in chief
  publication-title: IEEE Transactions on Automatic Control
– volume: 10
  start-page: 731
  year: 2016
  end-page: 741
  ident: b10
  article-title: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design
  publication-title: IET Control Theory Applications
– ident: 10.1016/j.automatica.2019.02.016_b17
  doi: 10.1109/CDC.2011.6160641
– volume: 56
  start-page: 1495
  issue: 7
  year: 2011
  ident: 10.1016/j.automatica.2019.02.016_b26
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2010.2088690
– volume: 24
  start-page: 843
  issue: 3
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b29
  article-title: Optimal dos attack scheduling in wireless networked control system
  publication-title: IEEE Transactions on Control Systems Technology
  doi: 10.1109/TCST.2015.2462741
– volume: 10
  start-page: 731
  issue: 7
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b10
  article-title: Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design
  publication-title: IET Control Theory Applications
  doi: 10.1049/iet-cta.2014.1013
– volume: 22
  start-page: 1369
  issue: 4
  year: 2014
  ident: 10.1016/j.automatica.2019.02.016_b15
  article-title: Detecting integrity attacks on scada systems
  publication-title: IEEE Transactions on Control Systems Technology
  doi: 10.1109/TCST.2013.2280899
– volume: 35
  start-page: 110
  issue: 1
  year: 2015
  ident: 10.1016/j.automatica.2019.02.016_b19
  article-title: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems
  publication-title: IEEE Control Systems
  doi: 10.1109/MCS.2014.2364725
– volume: 273
  start-page: 767
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b28
  article-title: Simultaneous fault detection and control for switched linear systems with mode-dependent average dwell-time
  publication-title: Applied Mathematics and Computation
  doi: 10.1016/j.amc.2015.10.062
– volume: 62
  start-page: 808
  issue: 2
  year: 2017
  ident: 10.1016/j.automatica.2019.02.016_b21
  article-title: A lyapunov redesign of coordination algorithms for cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2016.2565062
– volume: 417
  start-page: 454
  year: 2017
  ident: 10.1016/j.automatica.2019.02.016_b12
  article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2017.07.029
– volume: 100
  start-page: 195
  issue: 1
  year: 2012
  ident: 10.1016/j.automatica.2019.02.016_b16
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2011.2161428
– volume: 58
  start-page: 2715
  issue: 11
  year: 2013
  ident: 10.1016/j.automatica.2019.02.016_b18
  article-title: Attack detection and identification in cyber-physical systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2013.2266831
– volume: 9
  start-page: 49
  issue: 3
  year: 2011
  ident: 10.1016/j.automatica.2019.02.016_b11
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Security Privacy
  doi: 10.1109/MSP.2011.67
– volume: 10
  start-page: 1458
  issue: 12
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b4
  article-title: Adaptive cyber-physical system attack detection and reconstruction with application to power systems
  publication-title: IET Control Theory Applications
  doi: 10.1049/iet-cta.2015.1147
– year: 2017
  ident: 10.1016/j.automatica.2019.02.016_b1
  article-title: Supervisory nonlinear state observers for location-varying sparse attacks
  publication-title: Automatica
– ident: 10.1016/j.automatica.2019.02.016_b20
  doi: 10.1109/CDC.2015.7403131
– ident: 10.1016/j.automatica.2019.02.016_b5
  doi: 10.1109/ACC.2015.7171098
– volume: 3
  start-page: 1
  issue: 1
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b8
  article-title: A comprehensive overview of cyber-physical systems: from perspective of feedback system
  publication-title: IEEE/CAA Journal of Automatica Sinica
  doi: 10.1109/JAS.2016.7373757
– volume: 35
  start-page: 699
  issue: 5
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b30
  article-title: Cross-layer codesign for secure cyber-physical systems
  publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  doi: 10.1109/TCAD.2016.2523937
– volume: 62
  start-page: 4917
  issue: 10
  year: 2017
  ident: 10.1016/j.automatica.2019.02.016_b24
  article-title: Secure state estimation for cyber physical systems under sensor attacks: a satisfiability modulo theory approach
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2017.2676679
– volume: 59
  start-page: 3117
  issue: 12
  year: 2014
  ident: 10.1016/j.automatica.2019.02.016_b3
  article-title: Goals and challenges in cyber-physical systems research editorial of the editor in chief
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2014.2363897
– volume: 2
  issue: 1
  year: 2018
  ident: 10.1016/j.automatica.2019.02.016_b22
  article-title: Smt-based observer design for cyber-physical systems under sensor attacks
  publication-title: ACM Transactions on Cyber-Physical Systems
  doi: 10.1145/3078621
– year: 2017
  ident: 10.1016/j.automatica.2019.02.016_b2
  article-title: Distributed secure state estimation under sensor attacks: vote-location nonconvex optimization approach
  publication-title: Automatica
– ident: 10.1016/j.automatica.2019.02.016_b23
  doi: 10.1007/978-3-642-40349-1_4
– volume: 35
  start-page: 24
  issue: 1
  year: 2015
  ident: 10.1016/j.automatica.2019.02.016_b27
  article-title: Secure control systems: a quantitative risk management approach
  publication-title: IEEE Control Systems
  doi: 10.1109/MCS.2014.2364709
– volume: 9
  start-page: 1205
  issue: 2
  year: 2018
  ident: 10.1016/j.automatica.2019.02.016_b6
  article-title: A cyber-physical control framework for transient stability in smart grids
  publication-title: IEEE Transactions on Smart Grid
  doi: 10.1109/TSG.2016.2581588
– year: 2018
  ident: 10.1016/j.automatica.2019.02.016_b13
  article-title: Secure switched observers for cyber-physical systems under sparse sensor attacks: a set cover approach
  publication-title: IEEE Transactions on Automatic Control
– volume: 1
  start-page: 370
  issue: 4
  year: 2014
  ident: 10.1016/j.automatica.2019.02.016_b14
  article-title: Detection of faults and attacks including false data injection attack in smart grid using kalman filter
  publication-title: IEEE Transactions on Control Systems Technology
– volume: 87
  start-page: 176
  year: 2018
  ident: 10.1016/j.automatica.2019.02.016_b9
  article-title: State estimation under false data injection attacks: security analysis and system protection
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.09.028
– volume: 59
  start-page: 1454
  issue: 6
  year: 2014
  ident: 10.1016/j.automatica.2019.02.016_b7
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2014.2303233
– volume: 61
  start-page: 2079
  issue: 8
  year: 2016
  ident: 10.1016/j.automatica.2019.02.016_b25
  article-title: Event-triggered state observers for sparse sensor noise/attacks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2492159
SSID ssj0004182
Score 2.4934244
Snippet This paper investigates the secure state estimation problem of cyber–physical systems (CPSs) under sparse sensor attacks. First, a novel algorithm, which uses...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 503
SubjectTerms Cyber–physical systems
Luenberger observer
Pre-processing method
Secure state estimation
Switched gradient descent algorithm
Title Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks
URI https://dx.doi.org/10.1016/j.automatica.2019.02.016
Volume 103
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: AKRWK
  dateStart: 19630101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA5jXvQg_sSfIwevdUubtgmexnBMxV10sFtJmmRO5ja2DG_-7ealrZsgKHhrmz4oL2nee-H7vofQlck5CRNFg5AKHVATxQEzoQkiTSLKNJHMiz0_9pPegN4P42ENdSouDMAqy72_2NP9bl0-aZbebM7HY-D4woLiLqSB5DoHRjmlKXQxuP5YwzwoYYViuFfc5KxE8xQYL7GyM6-MCgpEhHv1Tuh8_lOI2gg73T20W-aLuF180j6q6ekB2tlQETxE5ul9DL5XuDxWcVejhYdyWawKuSYsJqPZYmxf3pbYpal4CcfsGns6EQahjYLBiIFS5kbnrtx1o67Ede8Ka4GIf4QG3dvnTi8o2ycEuftRbaCSJOemJajzDRGCxyaOTSIUZUpKrbmMWEIYp5KJlBGhYyiVONUqpKmrt0V0jOrT2VSfIJxzbaTLnEwunYsNYYaRhOeKAk-XKnOK0spjWV5qi0OLi0lWgches7WvM_B11gozN3CKyJflvNDX-IPNTTUp2be1krkw8Kv12b-sz9E23BWQxwtUt4uVvnRpiZUNv-4aaKt999DrfwIeRuaW
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZKGYAB8RTl6YE1tE6cxBYTqqgKtF1opW6WE9slqLRVm4qN344vD1okJJDYolxOii4X3531fZ8RujYxJ26gqONSqR1qPN9hxjWOp4lHmSYRy8Seu72gPaCPQ39YQc2SCwOwymLtz9f0bLUu7tSLaNZnSQIcX0gobksaSK7zcANtUt8NYQK7-VjhPChhuWR4JrnJWQHnyUFecplOM2lUkCAiPJPvhKPPf6pRa3WntYd2i4YR3-XvtI8qenKAdtZkBA-ReX5PIPgKF_sq9mo0z7BcKVa5XhOW49F0nqQvbwts-1S8gH12jTM-EQaljZzCiIFTZq0zO-9aq51x7bMyTYGJf4QGrft-s-0U5yc4sf1TU0cFQcxNQ1IbHCIl943vm0AqylQUac0jjwWEcRoxGTIitQ-zEqdauTS0A7f0jlF1Mp3oE4Rjrk1kWycTR5SGhjDDSMBjRYGoS5WpobCMmIgLcXE442IsShTZq1jFWkCsRcMV1lBD5Mtzlgts_MHntvwo4luyCFsHfvU-_Zf3Fdpq97sd0XnoPZ2hbbDk-MdzVE3nS31he5Q0usxy8BOC5ugr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Switched+projected+gradient+descent+algorithms+for+secure+state+estimation+under+sparse+sensor+attacks&rft.jtitle=Automatica+%28Oxford%29&rft.au=Lu%2C+An-Yang&rft.au=Yang%2C+Guang-Hong&rft.date=2019-05-01&rft.issn=0005-1098&rft.volume=103&rft.spage=503&rft.epage=514&rft_id=info:doi/10.1016%2Fj.automatica.2019.02.016&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_automatica_2019_02_016
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon