{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:36:15Z","timestamp":1772044575013,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61573143"],"award-info":[{"award-number":["61573143"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773255"],"award-info":[{"award-number":["61773255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61673176"],"award-info":[{"award-number":["61673176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Projects Sponsored by the Development Fund for Shanghai Talents"},{"DOI":"10.13039\/100007219","name":"Shanghai Natural Science Foundation","doi-asserted-by":"publisher","award":["18ZR1409700"],"award-info":[{"award-number":["18ZR1409700"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Programme of Introducing Talents of Discipline to Universities","award":["B17017"],"award-info":[{"award-number":["B17017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. II"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/tcsii.2019.2928558","type":"journal-article","created":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T23:44:28Z","timestamp":1563234268000},"page":"1254-1258","source":"Crossref","is-referenced-by-count":39,"title":["Security Analysis of a Distributed Networked System Under Eavesdropping Attacks"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4943-7919","authenticated-orcid":false,"given":"Wen","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8214-0861","authenticated-orcid":false,"given":"Ziqian","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1381-7418","authenticated-orcid":false,"given":"Guanrong","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2750-8029","authenticated-orcid":false,"given":"Yang","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0295-2462","authenticated-orcid":false,"given":"Xiaofan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2539280"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s16050721"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2013.2251949"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2013.2291075"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2486772"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.07.021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2328757"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5399","DOI":"10.1038\/srep05399","article-title":"Controllability and observability analysis for vertex domination centrality in directed networks","volume":"4","author":"wang","year":"2014","journal-title":"Sci Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.121"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref3","first-page":"1","article-title":"Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control","volume":"6","author":"lipi","year":"2017","journal-title":"Electronics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2409905"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2756259"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2017.2690843"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2011.0064"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.109"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426257"},{"key":"ref22","first-page":"443","article-title":"Controllability and observability conditions of linear autonomous systems","volume":"72","author":"hautus","year":"1969","journal-title":"Koninklijke Akademie Van Wetenschappen"},{"key":"ref21","article-title":"Toward cyber-secure and resilient networked control systems","author":"teixeira","year":"2014"},{"key":"ref23","first-page":"201","article-title":"Structural controllability","volume":"ac 19","author":"lin","year":"1974","journal-title":"IEEE Trans Autom Control"}],"container-title":["IEEE Transactions on Circuits and Systems II: Express Briefs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8920\/9127218\/08762185.pdf?arnumber=8762185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:51:40Z","timestamp":1651078300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8762185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":23,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsii.2019.2928558","relation":{},"ISSN":["1549-7747","1558-3791"],"issn-type":[{"value":"1549-7747","type":"print"},{"value":"1558-3791","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}