{"entities":{"Q6925441":{"pageid":21055684,"ns":120,"title":"Item:Q6925441","lastrevid":75761332,"modified":"2026-04-20T22:25:23Z","type":"item","id":"Q6925441","labels":{"en":{"language":"en","value":"Optimal sequence tampering attack strategy in FIR system identification with binary-valued observations"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 8097906"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$C0F10C02-3C1A-4DAC-B767-03BD654D6715","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"eeb223256a99248c1974cb2c38f5c2f73b746edf","datavalue":{"value":{"text":"Optimal sequence tampering attack strategy in FIR system identification with binary-valued observations","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q6925441$7CF50D8E-07AA-4913-ADB4-752FAA280525","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"05343c2fa8d868d273e99a9285dde5c9759937bf","datavalue":{"value":"1572.93017","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6925441$74077C87-63E9-40BA-9619-CB57E62EADC3","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"8bde4ee7f4784aeea8c81a692bc3d74192ca6b11","datavalue":{"value":"10.1016/J.EJCON.2025.101342","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6925441$F3F65A4F-0E40-46E8-B98D-E2E06FF0507D","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"48a6dd83c34417d76b7b5a957f74d281610cc43d","datavalue":{"value":{"entity-type":"item","numeric-id":6884140,"id":"Q6884140"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$E4A9459F-33A6-4F01-AD78-5E2CBF71F274","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"bbefaa992e489282b385bdf7c8b34e2d2bcc23cd","datavalue":{"value":{"entity-type":"item","numeric-id":6884139,"id":"Q6884139"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$5BE1FC6D-8720-433A-901A-BF51C08A0B4E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"adb0e48f5c6d5cb3a94f30f69d40e24d33e84d95","datavalue":{"value":{"entity-type":"item","numeric-id":700724,"id":"Q700724"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$3C8EADB8-32A3-4EF5-9E4B-36608BBC1481","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"3df6b275fb84723127058a1b537210fe2f9badf0","datavalue":{"value":{"entity-type":"item","numeric-id":2687752,"id":"Q2687752"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$B5E16A89-8E67-48B7-964F-ED0AC607D78C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"92b8f972a7616316c8ae64ebef3ccc9da331c2b7","datavalue":{"value":{"entity-type":"item","numeric-id":6542618,"id":"Q6542618"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$3B45F47D-E207-4E04-A423-74A5767DB211","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"45f20bc078972fb8087b47a09eeaa25cf327dd63","datavalue":{"value":{"entity-type":"item","numeric-id":285794,"id":"Q285794"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$4372229C-E996-4749-9CB6-E50BF5FD509B","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"e4d35ab81cabaf95bc563e9fb08a1e3335319aee","datavalue":{"value":{"time":"+2025-09-25T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q6925441$3409B24C-9549-4369-BA49-0615720FB649","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"f47b8551cfcd2e27e18ae083a8521741e193efcd","datavalue":{"value":"93B30","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6925441$BE63ABC6-ACF4-4C19-956C-E3047C55437B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"fb72774828da6ac907fb496ca5dd850f508f271f","datavalue":{"value":"93C27","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6925441$81073BBC-C2AF-4536-82D6-0B51792DC951","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"7ceb7d92fd5bdf2d7691c9d397ca6d573b2e9af4","datavalue":{"value":"8097906","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6925441$2A87A145-C5EE-4C1A-AD73-BE1255537127","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"b385040e90edc7b8a9f740abaf07b61d0deef5d7","datavalue":{"value":"FIR system","type":"string"},"datatype":"string"},"type":"statement","id":"Q6925441$D96EEC52-7F10-436E-8CDE-F22216533F0E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"a933197b9047a6f0039913a8e393bbe195f037cc","datavalue":{"value":"binary quantized measurements","type":"string"},"datatype":"string"},"type":"statement","id":"Q6925441$8D6EEC44-0DD3-46A7-A3F1-2C5CA26FC9AE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"6dc563fc43d66c4b86381bd08a8a28438ef30294","datavalue":{"value":"sequence data tampering attack","type":"string"},"datatype":"string"},"type":"statement","id":"Q6925441$F5E6C14E-3E47-465B-8651-8939F1245D49","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"7540fd0fc50207105f73474ca38cd222de64e2e2","datavalue":{"value":"optimal attack strategy","type":"string"},"datatype":"string"},"type":"statement","id":"Q6925441$892A2DDA-7F62-4514-82FA-B15B76028C53","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"a0698f2324441432a596688d8b307f5f1a1541ee","datavalue":{"value":"optimal attack implementation","type":"string"},"datatype":"string"},"type":"statement","id":"Q6925441$96735B52-B5AE-49A9-8818-26AD923AFE12","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6925441$83A3F0D1-2511-4447-A369-3104A668C494","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Optimal sequence tampering attack strategy in FIR system identification with binary-valued observations","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Optimal_sequence_tampering_attack_strategy_in_FIR_system_identification_with_binary-valued_observations"}}}}}