| [1] | Derler P, Lee E A, Vincentelli A S. Modeling cyber-physical systems. Proceedings of the IEEE, 2012, 100(1): 13−28 doi:  10.1109/JPROC.2011.2160929 | 
		
				| [2] | 李洪阳, 魏慕恒, 黄洁, 邱伯华, 赵晔, 骆文城, 等. 信息物理系统技术综述. 自动化学报, 2019, 45(1): 37−50 doi:  10.16383/j.aas.2018.c180362Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, et al. Review of information physical systems technology. Acta Automatica Sinica, 2019, 45(1): 37−50 doi:  10.16383/j.aas.2018.c180362 | 
		
				| [3] | Kim S, Park K J, Lu C Y. A survey on network security for cyber-physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 2022, 24(3): 1534−1573 | 
		
				| [4] | 刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 等. 信息物理融合系统综合安全威胁与防御研究. 自动化学报, 2019, 45(1): 5−24Liu Ting, Tian Jue, Wang Jia-Zhou, Wu Hong-Yu, Sun Li-Min, Zhou Ya-Dong, et al. Research on integrated security threat and defense of information physical fusion system. Acta Automatica Sinica, 2019, 45(1): 5−24 | 
		
				| [5] | Duo W L, Zhou M C, Abusorrah A, Valente J, Faisal M, Ruths J, et al. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 2022, 9(5): 784−800 doi:  10.1109/JAS.2022.105548 | 
		
				| [6] | Giraldo J, Urbina D, Cardenas A. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys, 2018, 51(4): Article No. 76 | 
		
				| [7] | Tan S, Guerrero J M, Xie P L, Han R K, Vasquez J C. Brief survey on attack detection methods for cyber-physical systems. IEEE Systems Journal, 2020, 14(4): 5329−5339 doi:  10.1109/JSYST.2020.2991258 | 
		
				| [8] | 杨超群, 张恒. 基于CBMeMBer滤波器的多攻击检测方法. 控制工程, 2022, 29(6): 1033−1039Yang Chao-Qun, Zhang Heng. Multi-attack detection approach based on CBMeMBer filt. Control Engineering of China, 2022, 29(6): 1033−1039 | 
		
				| [9] | 穆超, 王鑫, 杨明, 张恒, 陈振娅, 吴晓明. 面向物联网设备固件的硬编码漏洞检测方法. 网络与信息安全学报, 2022, 8(5): 98−110Mu Chao, Wang Xin, Yang Ming, Zhang Heng, Chen Zhen-Ya, Wu Xiao-Ming. Hard-coded vulnerability detection approach for IoT device firmware. Chinese Journal of Network and Information, 2022, 8(5): 98−110 | 
		
				| [10] | Zhang Q R, Liu K, Teixeira A, Li Y Z, Chai S C, Xia Y Q. An online Kullback-Leibler divergence-based stealthy attack against cyber-physical systems. IEEE Transactions on Automatic Control, 2022, 68(6): 3672−3679 doi:  10.1109/TAC.2022.3192201 | 
		
				| [11] | Zhang Q R, Liu K, Xia Y Q, Ma A Y. Optimal stealthy deception attack against cyber-physical systems. IEEE Transactions on Cybernetics, 2020, 50(9): 3963−3972 doi:  10.1109/TCYB.2019.2912622 | 
		
				| [12] | Zhang Q R, Liu K, Han D Y, Su G Z, Xia Y Q. Design of stealthy deception attacks with partial system knowledge. IEEE Transactions on Automatic Control, 2023, 68(2): 1069−1076 doi:  10.1109/TAC.2022.3146079 | 
		
				| [13] | Guo Z Y, Shi D W, Johansson K H, Shi L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 2018, 89: 117−124 doi:  10.1016/j.automatica.2017.11.018 | 
		
				| [14] | Mo Y L, Sinopoli B. False data injection attacks in control systems. In: Proceedings of the 1st Workshop on Secure Control Systems. Stockholm, Sweden: IEEE, 2010. 1−6 | 
		
				| [15] | Kwon C, Liu W Y, Hwang I. Analysis and design of stealthy cyber attacks on unmanned aerial systems. Journal of Aerospace Information Systems, 2014, 11(8): 525−539 doi:  10.2514/1.I010201 | 
		
				| [16] | Sui T J, Mo Y L, Marelli D, Sun X M, Fu M Y. The vulnerability of cyber-physical system under stealthy attacks. IEEE Transactions on Automatic Control, 2020, 66(2): 637−650 | 
		
				| [17] | Sui T J, Sun X M. The vulnerability of distributed state estimator under stealthy attacks. Automatica, 2021, 133: Article No. 109869 doi:  10.1016/j.automatica.2021.109869 | 
		
				| [18] | Hu L, Wang Z D, Han Q L, Liu X H. State estimation under false data injection attacks: Security analysis and system protection. Automatica, 2018, 87: 176−183 doi:  10.1016/j.automatica.2017.09.028 | 
		
				| [19] | Xu W Y, Wang Z D, Hu L, Kurths J. State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Transactions on Automatic Control, 2022, 62 (2): 6745−6753 | 
		
				| [20] | Jovanov I, Pajic M. Relaxing integrity requirements for attack-resilient cyber-physical systems. IEEE Transactions on Automa-tic Control, 2019, 64(12): 4843−4858 doi:  10.1109/TAC.2019.2898510 | 
		
				| [21] | Zhang T Y, Ye D. False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach. Automatica, 2020, 120: Article No. 109117 doi:  10.1016/j.automatica.2020.109117 | 
		
				| [22] | Mo Y L, Sinopoli B. On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 2015, 61(9): 2618−2624 | 
		
				| [23] | Murguia C, Shames I, Ruths J. Security metrics and synthesis of secure control systems. Automatica, 2020, 115: Article No. 108757 doi:  10.1016/j.automatica.2019.108757 | 
		
				| [24] | Kwon C, Hwang I. Reachability analysis for safety assurance of cyber-physical systems against cyber attacks. IEEE Transactions on Automatic Control, 2018, 63(7): 2272−2279 doi:  10.1109/TAC.2017.2761762 | 
		
				| [25] | Liu H, Niu B, Qin J H. Reachability analysis for linear discrete-time systems under stealthy cyber attacks. IEEE Transactions on Automatic Control, 2021, 66(9): 4444−4451 doi:  10.1109/TAC.2021.3050549 | 
		
				| [26] | Zhang Q R, Liu K, Pang Z H, Xia Y Q, Liu T. Reachability analysis of cyber-physical systems under stealthy attacks. IEEE Transactions on Cybernetics, 2022, 52(6): 4926−4934 doi:  10.1109/TCYB.2020.3025307 | 
		
				| [27] | Hashemi N, Ruths J. Co-design for resilience and performance. IEEE Transactions on Control of Network Systems, 2022, 10(3): 1387−1399 doi:  10.1109/TCNS.2022.3229774 | 
		
				| [28] | Bai C Z, Pasqualetti F, Gupta V. Data-injection attacks in stochastic control systems: Detectability and performance trade-offs. Automatica, 2017, 82: 251−260 doi:  10.1016/j.automatica.2017.04.047 | 
		
				| [29] | Fang C R, Qi Y F, Chen J M, Tan R, Zheng W X. Stealthy actuator signal attacks in stochastic control systems: Performance and limitations. IEEE Transactions on Automatic Control, 2020, 65(9): 3927−3934 doi:  10.1109/TAC.2019.2950072 | 
		
				| [30] | Kullback S. Information Theory and Statistics. Chelmsford: Courier Corporation, 1997. | 
		
				| [31] | Boyd S, El Ghaoui L, Feron E, Balakrishnan V. Linear Matrix Inequalities in System and Control Theory. Philadelphia: Society for Industry and Applied Mathematics, 1994. | 
		
				| [32] | Diananda P H. A simple proof of the arithmetic mean geometric mean inequality. The American Mathematical Monthly, 1960, 67(10): Article No. 1007 doi:  10.2307/2309236 | 
		
				| [33] | 夏元清. 云控制系统及其面临的挑战. 自动化学报, 2016, 42(1): 1−12Xia Yuan-Qing. Cloud control systems and their challenges. Acta Automatica Sinica, 2016, 42(1): 1−12 |