{"id":"https://openalex.org/W4400189328","doi":"https://doi.org/10.1109/iccae59995.2024.10569963","title":"A Reinforcement Adversarial Framework Targeting Endogenous Functional Safety in ICS: Applied to Tennessee Eastman Process","display_name":"A Reinforcement Adversarial Framework Targeting Endogenous Functional Safety in ICS: Applied to Tennessee Eastman Process","publication_year":2024,"publication_date":"2024-03-14","ids":{"openalex":"https://openalex.org/W4400189328","doi":"https://doi.org/10.1109/iccae59995.2024.10569963"},"language":"en","primary_location":{"id":"doi:10.1109/iccae59995.2024.10569963","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccae59995.2024.10569963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100860192","display_name":"Xinyi Wu","orcid":"https://orcid.org/0009-0009-9933-7298"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyi Wu","raw_affiliation_strings":["Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101652173","display_name":"Yulong Ding","orcid":"https://orcid.org/0000-0002-7159-5107"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Ding","raw_affiliation_strings":["Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010240403","display_name":"Shuang\u2010Hua Yang","orcid":"https://orcid.org/0000-0003-0717-5009"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"education","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shuang-Hua Yang","raw_affiliation_strings":["Southern University of Science and Technology, University of Reading Berkshire,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science,UK"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, University of Reading Berkshire,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science,UK","institution_ids":["https://openalex.org/I71052956"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100860192"],"corresponding_institution_ids":["https://openalex.org/I3045169105"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10440279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"187","last_page":"192"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.789900004863739,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.789900004863739,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.7875999808311462,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.7125999927520752,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7963478565216064},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5716463327407837},{"id":"https://openalex.org/keywords/reinforcement","display_name":"Reinforcement","score":0.5386910438537598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5086294412612915},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.42894247174263},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.36889803409576416},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28287163376808167},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06615060567855835},{"id":"https://openalex.org/keywords/structural-engineering","display_name":"Structural engineering","score":0.05994507670402527}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7963478565216064},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5716463327407837},{"id":"https://openalex.org/C67203356","wikidata":"https://www.wikidata.org/wiki/Q1321905","display_name":"Reinforcement","level":2,"score":0.5386910438537598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5086294412612915},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.42894247174263},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.36889803409576416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28287163376808167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06615060567855835},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.05994507670402527}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccae59995.2024.10569963","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccae59995.2024.10569963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4825958713","display_name":null,"funder_award_id":"92067109,61873119,62211530106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2004186751","https://openalex.org/W2134400676","https://openalex.org/W2143288231","https://openalex.org/W2736601468","https://openalex.org/W2743384360","https://openalex.org/W2899478755","https://openalex.org/W2963679616","https://openalex.org/W2974878761","https://openalex.org/W2990602094","https://openalex.org/W3080311931","https://openalex.org/W3126321819","https://openalex.org/W3190644151","https://openalex.org/W3195968524","https://openalex.org/W4206167132","https://openalex.org/W4210294974","https://openalex.org/W4224931310","https://openalex.org/W4281608743","https://openalex.org/W4285102237","https://openalex.org/W4324028661","https://openalex.org/W4365520086","https://openalex.org/W6741471465"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W2058303877"],"abstract_inverted_index":{"Endogenous":[0],"Safety":[1],"and":[2,76,103,126,147,165,183],"Security":[3],"(ESS)":[4],"of":[5,17,49],"Industrial":[6],"Control":[7],"Systems":[8],"(ICS)":[9],"has":[10,28],"gained":[11],"great":[12],"attention":[13],"with":[14,21,51,90,145],"the":[15,45,68,119,131,140],"advent":[16],"Industry":[18,186],"4.0.":[19,187],"However,":[20],"rising":[22],"cyber":[23],"threats,":[24],"most":[25],"current":[26],"research":[27,40],"focused":[29],"mainly":[30],"on":[31,44,55],"cybersecurity":[32],"aspects.":[33],"Our":[34,128,150],"study":[35,129],"aims":[36],"to":[37,66,107,118],"fill":[38],"this":[39,82],"gap":[41],"by":[42],"focusing":[43],"endogenous":[46],"functional":[47,69,177],"safety":[48],"ICS,":[50],"a":[52,62,84,91,100,136],"particular":[53],"emphasis":[54],"key":[56],"control":[57],"parameters":[58],"\u201csetpoints\u201d.":[59],"We":[60],"propose":[61],"reinforcement":[63,86],"adversarial":[64],"framework":[65],"investigate":[67],"security":[70,184],"issues":[71],"arising":[72],"from":[73],"unexpected":[74,113],"operations":[75],"malicious":[77],"tampering":[78],"against":[79],"setpoints.":[80],"In":[81],"framework,":[83],"deep":[85],"learning(DRL)":[87],"agent":[88],"interacts":[89],"custom":[92],"input":[93,120],"rule":[94,121],"model,":[95,122],"which":[96],"serves":[97],"as":[98,135,162],"both":[99],"dynamic":[101],"validator":[102],"an":[104],"adversary,":[105],"aiming":[106],"explore":[108],"previously":[109],"unforeseen":[110],"behaviors.":[111],"Explored":[112],"behaviors":[114],"are":[115],"continuously":[116],"updated":[117],"enhancing":[123,180],"system":[124,181],"adaptability":[125],"robustness.":[127],"employed":[130],"Tennessee":[132],"Eastman":[133],"Process":[134],"case":[137],"study,":[138],"using":[139],"proximal":[141],"policy":[142],"optimization(PPO)":[143],"algorithm":[144],"Beta":[146],"Gaussian":[148],"distributions.":[149],"approach":[151],"exhibited":[152],"significant":[153],"advantages":[154],"in":[155,174,185],"exploration":[156],"efficiency":[157],"over":[158],"baseline":[159],"methods":[160],"such":[161],"random":[163],"agents":[164],"simulated":[166],"annealing.":[167],"These":[168],"findings":[169],"underscore":[170],"DRL's":[171],"important":[172],"role":[173],"augmenting":[175],"ICS":[176],"safety,":[178],"thereby":[179],"resilience":[182]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
