{"id":"https://openalex.org/W4413679277","doi":"https://doi.org/10.1109/csr64739.2025.11130074","title":"Feature-Enhanced Deep Learning Models for Cyber-Physical System Security","display_name":"Feature-Enhanced Deep Learning Models for Cyber-Physical System Security","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679277","doi":"https://doi.org/10.1109/csr64739.2025.11130074"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113355173","display_name":"Javeyon Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Javeyon Vaughn","raw_affiliation_strings":["North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084021148","display_name":"Yaa Takyiwaa Acquaah","orcid":"https://orcid.org/0009-0005-0473-4751"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yaa Takyiwaa Acquaah","raw_affiliation_strings":["North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070531407","display_name":"Kaushik Roy","orcid":"https://orcid.org/0000-0002-9026-5322"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaushik Roy","raw_affiliation_strings":["North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,USA","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113355173"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3005643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"875","last_page":"880"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9452000260353088,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.757470965385437},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.608012318611145},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5333245992660522},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47831323742866516},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.445883184671402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3414982259273529},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06934896111488342}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.757470965385437},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.608012318611145},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5333245992660522},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47831323742866516},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.445883184671402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3414982259273529},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06934896111488342},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W1930624869","https://openalex.org/W2062132646","https://openalex.org/W2064675550","https://openalex.org/W2081544377","https://openalex.org/W2112796928","https://openalex.org/W2122111042","https://openalex.org/W2617899155","https://openalex.org/W2771827368","https://openalex.org/W2921750014","https://openalex.org/W3010490819","https://openalex.org/W3084891222","https://openalex.org/W3096575214","https://openalex.org/W3165946426","https://openalex.org/W3196299211","https://openalex.org/W4224298651","https://openalex.org/W4310584312","https://openalex.org/W4316658087","https://openalex.org/W4316661052","https://openalex.org/W4328101188","https://openalex.org/W4375928432","https://openalex.org/W4379984620","https://openalex.org/W4387925112","https://openalex.org/W4388948083","https://openalex.org/W4388995045","https://openalex.org/W4401991265","https://openalex.org/W4403390106"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"The":[0,139],"growing":[1],"reliance":[2],"on":[3,151,171],"cyber-physical":[4],"systems":[5],"(CPS)":[6],"in":[7,37,193,198],"critical":[8],"infrastructure":[9],"has":[10],"highlighted":[11],"the":[12,28,44,60,75,78,118,131,148,152,163,168,172,184],"need":[13],"for":[14,186,201],"accurate":[15],"and":[16,30,85,101,113,127,204],"efficient":[17],"intrusion":[18],"detection":[19,23],"methods.":[20],"Traditional":[21],"anomaly":[22],"techniques":[24,106],"struggle":[25],"to":[26,58,73,136],"handle":[27],"complexity":[29],"variability":[31],"of":[32,46,62,120,159,178,189],"CPS":[33,69],"data,":[34],"often":[35],"resulting":[36],"high":[38],"false-positive":[39],"rates.":[40],"This":[41,181],"study":[42],"investigates":[43],"use":[45,188],"genetic":[47],"algorithms":[48],"(GA)":[49],"with":[50,105,144,175],"dynamic":[51],"thresholding":[52],"as":[53,108],"a":[54,157],"feature":[55,194],"selection":[56,195],"method":[57],"improve":[59],"performance":[61,158],"deep":[63],"learning":[64,90],"models.":[65],"Three":[66],"publicly":[67],"available":[68],"datasets":[70],"were":[71,103],"used":[72],"validate":[74],"approach,":[76],"including":[77,92],"water":[79],"distribution":[80],"testbed":[81],"(WDT),":[82],"power":[83],"system,":[84],"gas":[86,153],"pipeline":[87,154],"datasets.":[88],"Deep":[89],"models,":[91],"Long":[93],"Short-Term":[94],"Memory":[95],"(LSTM),":[96],"Convolutional":[97],"Neural":[98],"Network":[99],"(CNN),":[100],"Autoencoders,":[102],"enhanced":[104],"such":[107],"attention":[109],"mechanisms,":[110],"evolving":[111,164],"filters,":[112],"GA-based":[114],"weight":[115],"pruning.":[116],"Overall,":[117],"integration":[119],"GAdriven":[121],"optimization":[122],"significantly":[123],"boosted":[124],"model":[125,142,166],"accuracy":[126,150,177],"reduced":[128],"loss":[129],"across":[130],"board,":[132],"average":[133],"between":[134],"one":[135],"three":[137],"percent.":[138],"Hybrid":[140],"CNN":[141],"optimized":[143],"Genetic":[145],"Algorithms":[146],"achieved":[147],"highest":[149],"dataset,":[155,174],"attaining":[156],"$94.61":[160],"\\%$.":[161,180],"Likewise,":[162],"filter":[165],"yielded":[167],"best":[169],"results":[170],"WDT":[173],"an":[176],"$94.13":[179],"work":[182],"lays":[183],"foundation":[185],"broader":[187],"GA":[190],"not":[191],"only":[192],"but":[196],"also":[197],"hyperparameter":[199],"tuning":[200],"adaptive,":[202],"efficient,":[203],"robust":[205],"security":[206],"systems.":[207]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
