{"id":"https://openalex.org/W4391216339","doi":"https://doi.org/10.1109/jiot.2024.3358798","title":"Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach","display_name":"Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach","publication_year":2024,"publication_date":"2024-01-25","ids":{"openalex":"https://openalex.org/W4391216339","doi":"https://doi.org/10.1109/jiot.2024.3358798"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3358798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3358798","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101786267","display_name":"Zedong Li","orcid":"https://orcid.org/0009-0004-5931-7114"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zedong Li","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100638657","display_name":"Xin Chen","orcid":"https://orcid.org/0000-0002-0747-1361"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Chen","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100752256","display_name":"Yuqi Chen","orcid":"https://orcid.org/0000-0001-9769-1167"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqi Chen","raw_affiliation_strings":["School of Information Science and Technology, ShanghaiTech University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China","institution_ids":["https://openalex.org/I30809798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458979","display_name":"Shijie Li","orcid":"https://orcid.org/0009-0000-6967-2639"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Li","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101619712","display_name":"Hangyu Wang","orcid":"https://orcid.org/0009-0004-8234-2940"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hangyu Wang","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102025291","display_name":"Shichao Lv","orcid":"https://orcid.org/0000-0002-0549-0999"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shichao Lv","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101786267"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":7.2598,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.98111281,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"10","first_page":"17602","last_page":"17614"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10188","display_name":"Advanced machining processes and optimization","score":0.9333999752998352,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.768061637878418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6749597787857056},{"id":"https://openalex.org/keywords/machining","display_name":"Machining","score":0.5312228798866272},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47811049222946167},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.44814062118530273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3753316402435303},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1456362009048462},{"id":"https://openalex.org/keywords/mechanical-engineering","display_name":"Mechanical engineering","score":0.13082224130630493},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09157559275627136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.085234135389328}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.768061637878418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6749597787857056},{"id":"https://openalex.org/C523214423","wikidata":"https://www.wikidata.org/wiki/Q192047","display_name":"Machining","level":2,"score":0.5312228798866272},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47811049222946167},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.44814062118530273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3753316402435303},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1456362009048462},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.13082224130630493},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09157559275627136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.085234135389328},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3358798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3358798","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1967320885","https://openalex.org/W2075514563","https://openalex.org/W2128160875","https://openalex.org/W2320204756","https://openalex.org/W2517723570","https://openalex.org/W2537385619","https://openalex.org/W2579357702","https://openalex.org/W2587059979","https://openalex.org/W2599858443","https://openalex.org/W2884884892","https://openalex.org/W2891240227","https://openalex.org/W2952743424","https://openalex.org/W2966397528","https://openalex.org/W3036600965","https://openalex.org/W3097224309","https://openalex.org/W3115308930","https://openalex.org/W3116706230","https://openalex.org/W3152917068","https://openalex.org/W3205548033","https://openalex.org/W3215405599","https://openalex.org/W3216165772","https://openalex.org/W4200515817","https://openalex.org/W4205383071","https://openalex.org/W4206553219","https://openalex.org/W4256613398","https://openalex.org/W4288061996","https://openalex.org/W4307964214","https://openalex.org/W4307964238","https://openalex.org/W4312696313","https://openalex.org/W4321484089","https://openalex.org/W6743887323"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2803338891","https://openalex.org/W2112229447","https://openalex.org/W2043267898","https://openalex.org/W2063119839","https://openalex.org/W2036155574","https://openalex.org/W2053955898","https://openalex.org/W2355268135","https://openalex.org/W2369113923","https://openalex.org/W2963445270"],"abstract_inverted_index":{"The":[0,162],"era":[1],"of":[2,6,14,24,63,75,111,169],"the":[3,22,57,61,72,76,103,109,112,137,141,165],"Industrial":[4],"Internet":[5],"Things":[7],"has":[8,29],"led":[9],"to":[10,19,42,49,115,144,182],"an":[11,85,93],"escalating":[12],"menace":[13],"Cyber-Physical":[15],"Manufacturing":[16],"Systems":[17],"(CPMS)":[18],"cyber-attacks.":[20],"Presently,":[21],"field":[23],"intrusion":[25,94],"detection":[26,44,87,95,128,142,185],"for":[27,38],"CPMS":[28,77,138,180],"significant":[30,36],"advancements.":[31],"However,":[32],"current":[33],"methodologies":[34],"require":[35],"costs":[37],"collecting":[39],"historical":[40],"data":[41],"train":[43],"models,":[45],"which":[46,83,124],"are":[47],"tailored":[48],"specific":[50],"machining":[51,54,73,81,104,113,117,160,190],"scenarios.":[52,161],"Evolving":[53],"scenarios":[55],"in":[56,102,176],"real":[58,159],"world":[59],"challenge":[60],"adaptability":[62,167],"these":[64],"methods.":[65],"In":[66],"this":[67],"paper,":[68],"We":[69],"found":[70],"that":[71],"code":[74],"contains":[78],"a":[79],"complete":[80],"process,":[82],"is":[84],"excellent":[86],"basis.":[88],"Therefore":[89],"we":[90],"propose":[91],"MPI-CNC,":[92],"approach":[96],"based":[97],"on":[98],"Machining":[99],"Process":[100],"Invariant":[101],"code.":[105],"Specifically,":[106],"MPI-CNC":[107,131,148,172],"automates":[108],"analysis":[110],"codes":[114],"extract":[116],"process":[118],"rules":[119,143],"and":[120,139],"key":[121],"parameter":[122],"rules,":[123],"serve":[125],"as":[126],"essential":[127],"rules.":[129],"Then,":[130],"actively":[132],"acquires":[133],"runtime":[134],"status":[135],"from":[136],"matches":[140],"identify":[145],"cyber-attacks":[146,178],"behavior.":[147],"was":[149],"evaluated":[150],"using":[151],"two":[152],"FANUC":[153],"CNC":[154],"machine":[155],"tools":[156],"across":[157],"ten":[158],"experiment":[163],"demonstrated":[164],"exceptional":[166],"capability":[168],"MPI-CNC.":[170],"Furthermore,":[171],"showed":[173],"superior":[174],"accuracy":[175],"detecting":[177],"against":[179],"compared":[181],"existing":[183],"state-of-the-art":[184],"methods":[186],"while":[187],"ensuring":[188],"normal":[189],"operations.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
