Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems | IEEE Conference Publication | IEEE Xplore