{"id":"https://openalex.org/W4294672448","doi":"https://doi.org/10.1109/icccn54977.2022.9868845","title":"Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems","display_name":"Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4294672448","doi":"https://doi.org/10.1109/icccn54977.2022.9868845"},"language":"en","primary_location":{"id":"doi:10.1109/icccn54977.2022.9868845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn54977.2022.9868845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080148923","display_name":"Zahra Jadidi","orcid":"https://orcid.org/0000-0002-6694-7753"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zahra Jadidi","raw_affiliation_strings":["School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043613674","display_name":"Shantanu Pal","orcid":"https://orcid.org/0000-0002-8784-0154"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shantanu Pal","raw_affiliation_strings":["School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046488195","display_name":"Nithesh Nayak K","orcid":null},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nithesh Nayak K","raw_affiliation_strings":["School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054255116","display_name":"Arawinkumaar Selvakkumar","orcid":"https://orcid.org/0000-0002-5056-2947"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Arawinkumaar Selvakkumar","raw_affiliation_strings":["School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110678194","display_name":"Chih-Chia Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chih-Chia Chang","raw_affiliation_strings":["School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Queensland University of Technology,Brisbane,QLD,Australia,4000","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006451244","display_name":"Maedeh Beheshti","orcid":null},"institutions":[{"id":"https://openalex.org/I2801686373","display_name":"Critical Path Institute","ror":"https://ror.org/02mgtg880","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I2801686373"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maedeh Beheshti","raw_affiliation_strings":["Critical Path Institute,Tucson,AZ,USA,85718"],"affiliations":[{"raw_affiliation_string":"Critical Path Institute,Tucson,AZ,USA,85718","institution_ids":["https://openalex.org/I2801686373"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045461052","display_name":"Alireza Jolfaei","orcid":"https://orcid.org/0000-0001-7818-459X"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Alireza Jolfaei","raw_affiliation_strings":["School of Computer Science, Macquarie University,Sydney,NSW,Australia,2109"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Macquarie University,Sydney,NSW,Australia,2109","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5080148923"],"corresponding_institution_ids":["https://openalex.org/I160993911"],"apc_list":null,"apc_paid":null,"fwci":2.7601,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91607181,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7788635492324829},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7271466851234436},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7236686944961548},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6573494076728821},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6029497981071472},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5679747462272644},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5463564395904541},{"id":"https://openalex.org/keywords/modbus","display_name":"Modbus","score":0.5283371210098267},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5252642035484314},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.4285825490951538},{"id":"https://openalex.org/keywords/deep-belief-network","display_name":"Deep belief network","score":0.41792091727256775},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.416675865650177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3107297420501709},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10403889417648315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7788635492324829},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7271466851234436},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7236686944961548},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6573494076728821},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6029497981071472},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5679747462272644},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5463564395904541},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.5283371210098267},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5252642035484314},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.4285825490951538},{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.41792091727256775},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.416675865650177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3107297420501709},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10403889417648315},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icccn54977.2022.9868845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn54977.2022.9868845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/420539","is_oa":false,"landing_page_url":"http://hdl.handle.net/10072/420539","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W1966180580","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2789603667","https://openalex.org/W2810611310","https://openalex.org/W2853623529","https://openalex.org/W2901312569","https://openalex.org/W2913497771","https://openalex.org/W2963748489","https://openalex.org/W2963857521","https://openalex.org/W3009195050","https://openalex.org/W3020687048","https://openalex.org/W3022162782","https://openalex.org/W3037405620","https://openalex.org/W3039748308","https://openalex.org/W3041006851","https://openalex.org/W3042739153","https://openalex.org/W3085955590","https://openalex.org/W3112314931","https://openalex.org/W3113163052","https://openalex.org/W3115360974","https://openalex.org/W3115696055","https://openalex.org/W3120847116","https://openalex.org/W3132882316","https://openalex.org/W3134889673","https://openalex.org/W3149093307","https://openalex.org/W3158507034","https://openalex.org/W3164160032","https://openalex.org/W3168193358","https://openalex.org/W3172336096","https://openalex.org/W3175852918","https://openalex.org/W3184499527","https://openalex.org/W3186399922","https://openalex.org/W3206087679","https://openalex.org/W3206784242","https://openalex.org/W4210264345","https://openalex.org/W4287663661","https://openalex.org/W6640425456","https://openalex.org/W6641835129","https://openalex.org/W6752931940","https://openalex.org/W6783776192","https://openalex.org/W6793622442"],"related_works":["https://openalex.org/W2394363056","https://openalex.org/W2362216025","https://openalex.org/W2371014880","https://openalex.org/W3015293401","https://openalex.org/W2357768347","https://openalex.org/W4223430807","https://openalex.org/W2379048028","https://openalex.org/W2371067528","https://openalex.org/W2389411834","https://openalex.org/W2379052219"],"abstract_inverted_index":{"With":[0],"the":[1,4,17,22,59,90,100,112,129,136,147,166,176,184,259,268,275,278,285,292,295,299,303],"emergence":[2],"of":[3,6,24,61,69,149,215,287,294,301],"Internet":[5],"Things":[7],"(IoT)":[8],"and":[9,14,33,107,131,160,178,193,206,217,248,297],"Artificial":[10,235],"Intelligence":[11],"(AI)":[12],"services":[13],"applications":[15],"in":[16,64,104,157,231],"Cyber":[18],"Physical":[19],"Systems":[20],"(CPS),":[21],"methods":[23,53],"protecting":[25],"CPS":[26,43,65,158,186],"against":[27,165,308],"cyber":[28,46],"threats":[29],"is":[30,71,82,118,239],"becoming":[31],"more":[32,34],"challenging.":[35],"Various":[36],"security":[37],"solutions":[38],"are":[39,202],"implemented":[40],"to":[41,57,84,95,98,127,138,182,306],"protect":[42],"networks":[44,159],"from":[45,204,277],"attacks.":[47,86,233,310],"For":[48,110],"instance,":[49],"Machine":[50],"Learning":[51],"(ML)":[52],"have":[54],"been":[55,77],"deployed":[56],"automate":[58],"process":[60],"anomaly":[62,155],"detection":[63,156],"environments.":[66],"The":[67,220,252,281],"core":[68],"ML":[70],"deep":[72,80,153,190,221],"learning.":[73],"However,":[74],"it":[75],"has":[76,255],"found":[78],"that":[79,122],"learning":[81,191,222],"vulnerable":[83],"adversarial":[85,150,172,195,265,289,309],"Attackers":[87],"can":[88],"launch":[89],"attack":[91,121,167,218],"by":[92,134,168],"applying":[93],"perturbations":[94,133],"input":[96,243],"samples":[97,196,214,266,290],"mislead":[99],"model,":[101],"which":[102],"results":[103],"incorrect":[105],"predictions":[106,296],"low":[108],"accuracy.":[109],"example,":[111],"Fast":[113],"Gradient":[114],"Sign":[115],"Method":[116],"(FGSM)":[117],"a":[119,162,272],"white-box":[120],"calculates":[123],"gradient":[124,137],"descent":[125],"oppositely":[126],"maximize":[128],"loss":[130],"generates":[132],"adding":[135],"unpolluted":[139],"data.":[140],"In":[141],"this":[142],"study,":[143],"we":[144,270],"focus":[145],"on":[146,152,291],"impact":[148],"attacks":[151],"learning-based":[154],"implement":[161],"mitigation":[163],"approach":[164],"retraining":[169],"models":[170,192],"using":[171,197,302],"samples.":[173],"We":[174,188],"use":[175],"Bot-IoT":[177],"Modbus":[179],"IoT":[180,205,208],"datasets":[181,201,227],"represent":[183],"two":[185,256],"networks.":[187,210],"train":[189],"generate":[194,264],"these":[198,226],"datasets.":[199],"These":[200],"captured":[203],"Industrial":[207],"(IIoT)":[209],"They":[211],"both":[212],"provide":[213],"normal":[216],"activities.":[219],"model":[223,305],"trained":[224],"with":[225,241],"showed":[228],"high":[229],"accuracy":[230,293],"detecting":[232],"An":[234],"Neural":[236],"Network":[237],"(ANN)":[238],"adopted":[240],"one":[242,249],"layer,":[244],"four":[245],"intermediate":[246],"layers,":[247],"output":[250,253],"layer.":[251],"layer":[254],"nodes":[257],"representing":[258],"binary":[260],"classification":[261],"results.":[262],"To":[263],"for":[267],"experiment,":[269],"used":[271],"function":[273],"called":[274],"'fast_gradient_method\u2019":[276],"Cleverhans":[279],"library.":[280],"experimental":[282],"result":[283],"demonstrates":[284],"influence":[286],"FGSM":[288],"proves":[298],"effectiveness":[300],"retrained":[304],"defend":[307]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
