{"id":"https://openalex.org/W3047708717","doi":"https://doi.org/10.1109/cns48642.2020.9162219","title":"DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games","display_name":"DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3047708717","doi":"https://doi.org/10.1109/cns48642.2020.9162219","mag":"3047708717"},"language":"en","primary_location":{"id":"doi:10.1109/cns48642.2020.9162219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043192390","display_name":"Alireza Tahsini","orcid":"https://orcid.org/0000-0002-1103-1879"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alireza Tahsini","raw_affiliation_strings":["Department of Computer Science, Texas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas State University","institution_ids":["https://openalex.org/I13511017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037601467","display_name":"Noah Dunstatter","orcid":"https://orcid.org/0000-0001-9600-0432"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Noah Dunstatter","raw_affiliation_strings":["Department of Computer Science, Texas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas State University","institution_ids":["https://openalex.org/I13511017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071514799","display_name":"Mina Guirguis","orcid":"https://orcid.org/0000-0003-2629-6172"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mina Guirguis","raw_affiliation_strings":["Department of Computer Science, Texas State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas State University","institution_ids":["https://openalex.org/I13511017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077409980","display_name":"Chuadhry Mujeeb Ahmed","orcid":"https://orcid.org/0000-0003-3644-0465"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chuadhry Mujeeb Ahmed","raw_affiliation_strings":["Singapore University of Technology and Design"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043192390"],"corresponding_institution_ids":["https://openalex.org/I13511017"],"apc_list":null,"apc_paid":null,"fwci":0.2942,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55089146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"36","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8460748791694641},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7072250247001648},{"id":"https://openalex.org/keywords/reinforcement","display_name":"Reinforcement","score":0.45864254236221313},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4307194948196411},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3563985526561737},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.33694761991500854},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13047492504119873},{"id":"https://openalex.org/keywords/structural-engineering","display_name":"Structural engineering","score":0.06047031283378601}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8460748791694641},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7072250247001648},{"id":"https://openalex.org/C67203356","wikidata":"https://www.wikidata.org/wiki/Q1321905","display_name":"Reinforcement","level":2,"score":0.45864254236221313},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4307194948196411},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3563985526561737},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33694761991500854},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13047492504119873},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.06047031283378601}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns48642.2020.9162219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W260232723","https://openalex.org/W1537521045","https://openalex.org/W1542941925","https://openalex.org/W1571323288","https://openalex.org/W1651728063","https://openalex.org/W1757796397","https://openalex.org/W1973039793","https://openalex.org/W1978666674","https://openalex.org/W1978956894","https://openalex.org/W2005028112","https://openalex.org/W2022406843","https://openalex.org/W2069038223","https://openalex.org/W2111404412","https://openalex.org/W2144274908","https://openalex.org/W2145339207","https://openalex.org/W2148834754","https://openalex.org/W2158930753","https://openalex.org/W2164522996","https://openalex.org/W2168708442","https://openalex.org/W2212142413","https://openalex.org/W2291986326","https://openalex.org/W2435203810","https://openalex.org/W2439424908","https://openalex.org/W2535751405","https://openalex.org/W2562505269","https://openalex.org/W2612172766","https://openalex.org/W2885265914","https://openalex.org/W2908471618","https://openalex.org/W2963937357","https://openalex.org/W2964164283","https://openalex.org/W4293663082","https://openalex.org/W4297789683","https://openalex.org/W4298857966","https://openalex.org/W6637967152","https://openalex.org/W6681187623","https://openalex.org/W6683791438","https://openalex.org/W6685189216","https://openalex.org/W6688192702","https://openalex.org/W6696772115","https://openalex.org/W6718803878","https://openalex.org/W6743367460"],"related_works":["https://openalex.org/W4310083477","https://openalex.org/W2328553770","https://openalex.org/W2920061524","https://openalex.org/W1977959518","https://openalex.org/W2038908348","https://openalex.org/W2107890255","https://openalex.org/W2106552856","https://openalex.org/W2145821588","https://openalex.org/W2086122291","https://openalex.org/W1987513656"],"abstract_inverted_index":{"One":[0],"important":[1],"aspect":[2],"in":[3,95,105,161,169],"protecting":[4],"Cyber":[5],"Physical":[6],"System":[7],"(CPS)":[8],"is":[9,60],"ensuring":[10],"that":[11,37,159,240,245],"the":[12,21,42,69,73,81,85,126,131,140,154,192,195,208,211,217,222],"proper":[13,127],"control":[14,22,43,70,86,223],"and":[15,121,144,194,198,229,249],"measurement":[16],"signals":[17,47,78,213],"are":[18,175],"propagated":[19,212],"within":[20,41,68],"loop.":[23,87,224],"The":[24,186],"CPS":[25,163,196],"research":[26],"community":[27],"has":[28],"been":[29],"developing":[30,165],"a":[31,112,119,134,230,234],"large":[32],"set":[33],"of":[34,51,84,97,107,114,133,181,210],"check":[35,46,141,182,204],"blocks":[36,90,142,183,205],"can":[38,138],"be":[39],"integrated":[40],"loop":[44,71],"to":[45,63,124,177,184,206,216],"against":[48,110],"various":[49],"types":[50],"attacks":[52],"(e.g.,":[53],"false":[54],"data":[55],"injection":[56],"attacks).":[57],"Unfortunately,":[58],"it":[59,117],"not":[61,92],"possible":[62],"integrate":[64],"all":[65],"these":[66,89],"\u201cchecks\u201d":[67],"as":[72,100],"overhead":[74],"introduced":[75],"when":[76],"checking":[77],"may":[79],"violate":[80],"delay":[82],"constraints":[83,219],"Moreover,":[88],"do":[91],"completely":[93],"operate":[94],"isolation":[96],"each":[98],"other":[99,247],"dependencies":[101],"exist":[102],"among":[103],"them":[104],"terms":[106],"their":[108],"effectiveness":[109],"detecting":[111],"subset":[113],"attacks.":[115],"Thus,":[116],"becomes":[118],"challenging":[120],"complex":[122],"problem":[123],"assign":[125],"checks,":[128],"especially":[129],"with":[130],"presence":[132],"rational":[135],"adversary":[136,193],"who":[137],"observe":[139],"assigned":[143],"optimizes":[145],"her":[146],"own":[147],"attack":[148],"strategies":[149,201,244,248],"accordingly.":[150],"This":[151],"paper":[152],"tackles":[153],"inherent":[155],"state-action":[156],"space":[157],"explosion":[158],"arises":[160],"securing":[162],"through":[164],"DeepBLOC":[166],"(DB)-a":[167],"framework":[168,187],"which":[170],"Deep":[171],"Reinforcement":[172],"Learning":[173],"algorithms":[174],"utilized":[176],"provide":[178],"optimal/sub-optimal":[179],"assignments":[180],"signals.":[185],"models":[188],"stochastic":[189],"games":[190],"between":[191],"defender":[197],"derives":[199],"mixed":[200],"for":[202],"assigning":[203],"ensure":[207],"integrity":[209],"while":[214],"abiding":[215],"real-time":[218],"dictated":[220],"by":[221],"Through":[225],"extensive":[226],"simulation":[227],"experiments":[228],"real":[231],"implementation":[232],"on":[233],"water":[235],"purification":[236],"system,":[237],"we":[238],"show":[239],"DB":[241],"achieves":[242],"assignment":[243],"outperform":[246],"heuristics.":[250]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
