{"id":"https://openalex.org/W4393656110","doi":"https://doi.org/10.1109/aiccsa59173.2023.10479279","title":"Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems","display_name":"Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4393656110","doi":"https://doi.org/10.1109/aiccsa59173.2023.10479279"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa59173.2023.10479279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa59173.2023.10479279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053615189","display_name":"Likai Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Likai Yao","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052686108","display_name":"Sicong Shao","orcid":"https://orcid.org/0000-0003-1205-3890"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sicong Shao","raw_affiliation_strings":["University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057335897","display_name":"Salim Hariri","orcid":"https://orcid.org/0000-0003-3956-3401"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Salim Hariri","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053615189"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":0.7006,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77155755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9646000266075134,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8605462908744812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6921528577804565},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.507796585559845},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5007283687591553},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4898650348186493},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.46502068638801575},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4134387671947479}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8605462908744812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6921528577804565},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.507796585559845},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5007283687591553},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4898650348186493},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.46502068638801575},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4134387671947479}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa59173.2023.10479279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa59173.2023.10479279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320322064","display_name":"Korea Institute for Advancement of Technology","ror":"https://ror.org/015w1qa96"},{"id":"https://openalex.org/F4320332369","display_name":"National Nuclear Security Administration","ror":"https://ror.org/03sk1we31"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1480420193","https://openalex.org/W1487325610","https://openalex.org/W1634257591","https://openalex.org/W1899810124","https://openalex.org/W1951703194","https://openalex.org/W1971290403","https://openalex.org/W1973941703","https://openalex.org/W1977555035","https://openalex.org/W2000950897","https://openalex.org/W2006861272","https://openalex.org/W2020524857","https://openalex.org/W2041460271","https://openalex.org/W2114780867","https://openalex.org/W2129360963","https://openalex.org/W2151172350","https://openalex.org/W2162796604","https://openalex.org/W2167710876","https://openalex.org/W2180612164","https://openalex.org/W2517617279","https://openalex.org/W2524655848","https://openalex.org/W2552047646","https://openalex.org/W2603766943","https://openalex.org/W2758551931","https://openalex.org/W2763975932","https://openalex.org/W2792868529","https://openalex.org/W2896370767","https://openalex.org/W2900589168","https://openalex.org/W2903442125","https://openalex.org/W2908665597","https://openalex.org/W2936538270","https://openalex.org/W2946442045","https://openalex.org/W2963764569","https://openalex.org/W2997121960","https://openalex.org/W3011853793","https://openalex.org/W3036294592","https://openalex.org/W3097615084","https://openalex.org/W3099321002","https://openalex.org/W3104227430","https://openalex.org/W3127943761","https://openalex.org/W3164186389","https://openalex.org/W3169283052","https://openalex.org/W4206038443","https://openalex.org/W4210481850","https://openalex.org/W4231903159","https://openalex.org/W4235077744","https://openalex.org/W4301880089","https://openalex.org/W4317600302","https://openalex.org/W4317600352","https://openalex.org/W4319300189","https://openalex.org/W4320013936","https://openalex.org/W4378800853","https://openalex.org/W4386742382","https://openalex.org/W4392943591"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W2900159906","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W2899811703","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Machine":[0],"learning":[1,49,172],"(ML)":[2],"algorithms":[3,50],"have":[4,40,103],"been":[5],"widely":[6],"used":[7,201,283],"in":[8,17,43,186],"many":[9],"critical":[10],"automated":[11],"systems,":[12],"including":[13],"as":[14,28,149,222],"a":[15,169],"technique":[16,225],"Dynamic":[18],"Data":[19],"Driven":[20],"Applications":[21],"Systems":[22,247],"(DDDAS)-based":[23],"methods":[24,147],"and":[25,33,73,87,98,106,116,156,159,161,183,199,202,250,276],"areas":[26],"such":[27,148,189],"financial":[29],"trading,":[30],"autonomous":[31],"vehicles,":[32],"intrusion":[34],"detection":[35],"systems.":[36],"However,":[37],"malicious":[38],"adversaries":[39,125,192],"strong":[41],"interests":[42],"manipulating":[44,208],"the":[45,84,113,124,130,151,163,191,196,209,213,218,232,243,251,257,268],"operations":[46,211],"of":[47,55,83,93,234],"machine":[48,171],"to":[51,110,127,230,284],"achieve":[52],"their":[53,71],"objectives":[54],"gaining":[56],"financial,":[57],"social,":[58],"or":[59,135],"political":[60],"influence.":[61],"Adversarial":[62],"ML":[63,85,94,114,152,164,187,210,281],"(AML)":[64],"users":[65],"can":[66,142,271],"be":[67,143],"classified":[68],"based":[69],"on":[70],"capabilities":[72],"goals":[74],"into":[75],"three":[76],"types:":[77],"Adversary":[78],"who":[79,100],"has":[80],"full":[81],"knowledge":[82,92,105,194],"models":[86,95,282],"parameters":[88,118],"(white-box":[89],"scenario),":[90,97],"partial":[91],"(gray-box":[96],"one":[99],"does":[101],"not":[102],"any":[104],"uses":[107],"guessing":[108],"techniques":[109],"figure":[111],"out":[112],"model":[115,153,184,200],"its":[117],"(black-box":[119],"scenario).":[120],"In":[121,215],"these":[122,139],"scenarios,":[123],"attempt":[126],"maliciously":[128,207],"manipulate":[129],"model/data":[131],"either":[132],"during":[133,212],"training":[134],"testing.":[136],"Defending":[137],"against":[138,174],"AML":[140],"attacks":[141,176,273,279],"successful":[144],"by":[145,177],"following":[146],"making":[150],"robust,":[154],"validating":[155],"verifying":[157],"inputs":[158],"outputs,":[160],"changing":[162],"architecture.":[165],"This":[166],"paper":[167],"presents":[168],"resilient":[170],"(rML)":[173],"adversarial":[175,235,253,278],"dynamically":[178],"conducting":[179],"feature":[180,197,228],"space":[181,198,229],"anonymization":[182,224],"randomization":[185],"services":[188],"that":[190,267],"lack":[193],"about":[195],"consequently":[203],"prevent":[204,277],"them":[205],"from":[206],"runtime.":[214],"our":[216],"approach,":[217],"rML":[219,238],"utilizes":[220],"autoencoders":[221],"an":[223],"for":[226],"encoding":[227],"minimize":[231],"effect":[233],"samples.":[236],"The":[237,264],"method":[239],"is":[240],"evaluated":[241],"using":[242,256],"benchmarking":[244],"Industrial":[245],"Control":[246],"(ICS)":[248],"data":[249,254],"corresponding":[252],"generated":[255],"Jacobian-based":[258],"Saliency":[259],"Map":[260],"Attack":[261],"(JSMA)":[262],"method.":[263],"experiment":[265],"demonstrated":[266],"proposed":[269],"approach":[270],"detect":[272],"targeting":[274],"ICS":[275],"compromising":[280],"secure":[285],"ICS.":[286]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
