{"entities":{"Q7007571":{"pageid":21548385,"ns":120,"title":"Item:Q7007571","lastrevid":76520955,"modified":"2026-04-24T09:30:30Z","type":"item","id":"Q7007571","labels":{"en":{"language":"en","value":"Optimal tampering attack strategy for FIR system identification with multi-level quantized observations"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 8016735"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$F348E12E-A2DB-4AC3-8796-546C778CF6E4","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"a6fa67b24c4d75dc5d548bde2f4ef0663ee8ca07","datavalue":{"value":{"text":"Optimal tampering attack strategy for FIR system identification with multi-level quantized observations","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q7007571$3FEA142E-CF81-48A7-B446-A8BE3866AFD1","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"6804d6bf1b2f9519cc076da9b98e48bfe4083836","datavalue":{"value":"1560.93039","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q7007571$AC870D6D-B576-4EFF-AAA2-3A263B8E01A6","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"6fd010078642939228487195150e02c50766e303","datavalue":{"value":"10.1002/RNC.7729","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q7007571$051E186C-1917-488E-ADC5-93501D35F7BA","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"e036791a0051af4cfe226586c48e735ec678522b","datavalue":{"value":{"entity-type":"item","numeric-id":5009244,"id":"Q5009244"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$5994BAF2-7DE3-4461-A4CD-60564DED9608","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"3df6b275fb84723127058a1b537210fe2f9badf0","datavalue":{"value":{"entity-type":"item","numeric-id":2687752,"id":"Q2687752"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$FA694334-BDFC-403B-A896-E49EEEF3173D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"e6ad58e566229d8fa177b4e26a76f13e2b3da581","datavalue":{"value":{"entity-type":"item","numeric-id":1633637,"id":"Q1633637"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$ABF370FF-122D-4953-B8D1-83D097F50F3F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"92b8f972a7616316c8ae64ebef3ccc9da331c2b7","datavalue":{"value":{"entity-type":"item","numeric-id":6542618,"id":"Q6542618"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$4F1D1702-593D-4830-8D2E-B1D3C65EDCF2","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"50b8674a675fb6cb1ce5f58b071e4afdb153e2c6","datavalue":{"value":{"entity-type":"item","numeric-id":2710025,"id":"Q2710025"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$FF8230E3-9EAB-443E-92B0-623EC7C36CC8","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"73717b0f7e6b2acea0ec4925c9882191b5fb6c53","datavalue":{"value":{"time":"+2025-03-26T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q7007571$E9CBA41A-EB31-446D-85A3-C6A30E2B1AFF","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"f47b8551cfcd2e27e18ae083a8521741e193efcd","datavalue":{"value":"93B30","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q7007571$E26AF8B5-8FCB-4EBE-BAE4-F2B6240260D4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"fb72774828da6ac907fb496ca5dd850f508f271f","datavalue":{"value":"93C27","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q7007571$0FCC3FFA-97B2-4C3D-B7BC-1D8596AAB36B","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"8a29083bed6c166e63a2116e21702961a6fcb626","datavalue":{"value":"8016735","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q7007571$B25FCCF2-6A36-45A5-B5E5-FB52429A3CC8","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c20d68450ba23dcb293b5a8400c5f5aea1c54bee","datavalue":{"value":"data tampering","type":"string"},"datatype":"string"},"type":"statement","id":"Q7007571$5A3EACA7-2264-4B6A-9D35-E0C0A7851A7A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3f0d3e4906408304b4a2da423ee77193cef107d5","datavalue":{"value":"multi-valued quantization","type":"string"},"datatype":"string"},"type":"statement","id":"Q7007571$DABF7628-FA27-43E0-8889-E13208CB0D7D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"7540fd0fc50207105f73474ca38cd222de64e2e2","datavalue":{"value":"optimal attack strategy","type":"string"},"datatype":"string"},"type":"statement","id":"Q7007571$93AD4D3F-6796-4C43-86B7-678AE18A0361","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9849827e83b757ceaea7e4ead19cebc299ae297b","datavalue":{"value":"system identification","type":"string"},"datatype":"string"},"type":"statement","id":"Q7007571$A37AE7EE-647E-48D1-B78C-0E703385F1A2","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q7007571$7724DF25-CA7B-4FE7-BC01-2196EB60926B","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Optimal tampering attack strategy for FIR system identification with multi-level quantized observations","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Optimal_tampering_attack_strategy_for_FIR_system_identification_with_multi-level_quantized_observations"}}}}}