“…One line of work is based on the use of unknown input observers (e.g., [34], [27]) and non-convex optimization for resilient estimation (e.g., [4], [25]), while another focuses on attackdetection and estimation guarantees in systems with standard Kalman filter-based state estimators (e.g., [22], [21], [11], [12], [24], [23], [10]). In the later works, estimation residuebased failure detectors, such as χ 2 [22], [23] and sequential probability ratio test (SPRT) detectors [12], are employed for intrusion detection. Still, irrelevant of the utilized attack detection mechanism, after compromising a suitable subset of sensors, an intelligent attacker can significantly degrade control performance while remaining undetected (i.e., stealthy).…”