{"id":"https://openalex.org/W3081909340","doi":"https://doi.org/10.1109/med48518.2020.9182971","title":"Machine Learning-Based Cyber-attack Detection and Resilient Operation via Economic Model Predictive Control for Nonlinear Processes","display_name":"Machine Learning-Based Cyber-attack Detection and Resilient Operation via Economic Model Predictive Control for Nonlinear Processes","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3081909340","doi":"https://doi.org/10.1109/med48518.2020.9182971","mag":"3081909340"},"language":"en","primary_location":{"id":"doi:10.1109/med48518.2020.9182971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/med48518.2020.9182971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 28th Mediterranean Conference on Control and Automation (MED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044587014","display_name":"Scarlett Chen","orcid":"https://orcid.org/0000-0002-2456-9360"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Scarlett Chen","raw_affiliation_strings":["Department of Chemical and Biomolecular Engineering, University of California, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Chemical and Biomolecular Engineering, University of California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015091824","display_name":"Zhe Wu","orcid":"https://orcid.org/0000-0002-2923-149X"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhe Wu","raw_affiliation_strings":["Department of Chemical and Biomolecular Engineering, University of California, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Chemical and Biomolecular Engineering, University of California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002367171","display_name":"Panagiotis D. Christofides","orcid":"https://orcid.org/0000-0002-8772-4348"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Panagiotis D. Christofides","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of California, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044587014"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":0.1471,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44971349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"794","last_page":"801"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10791","display_name":"Advanced Control Systems Optimization","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6565008163452148},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5966275334358215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5879821181297302},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5792239904403687},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.5429579615592957},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4981870651245117},{"id":"https://openalex.org/keywords/model-predictive-control","display_name":"Model predictive control","score":0.4979722499847412},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4867522716522217},{"id":"https://openalex.org/keywords/process-control","display_name":"Process control","score":0.46641385555267334},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4652460813522339},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.45526933670043945},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4449229836463928},{"id":"https://openalex.org/keywords/lyapunov-stability","display_name":"Lyapunov stability","score":0.4118919372558594},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3188436031341553},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.310310959815979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2405165135860443},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19481131434440613},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11760279536247253}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6565008163452148},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5966275334358215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5879821181297302},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5792239904403687},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.5429579615592957},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4981870651245117},{"id":"https://openalex.org/C172205157","wikidata":"https://www.wikidata.org/wiki/Q1782962","display_name":"Model predictive control","level":3,"score":0.4979722499847412},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4867522716522217},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.46641385555267334},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4652460813522339},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.45526933670043945},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4449229836463928},{"id":"https://openalex.org/C2776829284","wikidata":"https://www.wikidata.org/wiki/Q1341651","display_name":"Lyapunov stability","level":3,"score":0.4118919372558594},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3188436031341553},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.310310959815979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2405165135860443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19481131434440613},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11760279536247253},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/med48518.2020.9182971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/med48518.2020.9182971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 28th Mediterranean Conference on Control and Automation (MED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1528140509","https://openalex.org/W2018291128","https://openalex.org/W2056451850","https://openalex.org/W2061328016","https://openalex.org/W2102357064","https://openalex.org/W2107528096","https://openalex.org/W2111877895","https://openalex.org/W2613480438","https://openalex.org/W2894370906","https://openalex.org/W2903010511","https://openalex.org/W2926587972","https://openalex.org/W2940512533","https://openalex.org/W2997517829","https://openalex.org/W3000215758","https://openalex.org/W3150282872"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2275843868","https://openalex.org/W2974890647","https://openalex.org/W2060165215","https://openalex.org/W4321484089","https://openalex.org/W1973471600","https://openalex.org/W4385452087","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045"],"abstract_inverted_index":{"This":[0],"work":[1],"proposes":[2],"resilient":[3,90,137],"operation":[4,79,148],"strategies":[5],"for":[6],"nonlinear":[7,32],"processes":[8],"that":[9,82],"are":[10,100,111],"vulnerable":[11,71],"to":[12,53,72],"targeted":[13],"cyber-attacks,":[14,73],"as":[15,17],"well":[16],"detection":[18,140],"and":[19,45,78,88,108,114,139,145],"handling":[20],"of":[21,24,31,94,120,135,152],"standard":[22],"types":[23,93],"cyber-attacks.":[25,96,153],"Working":[26],"with":[27],"a":[28,34,58,124],"general":[29],"class":[30],"systems,":[33],"modified":[35],"Lyapunov-based":[36],"Economic":[37],"Model":[38],"Predictive":[39],"Controller":[40],"(LEMPC)":[41],"using":[42,102],"combined":[43],"closed-loop":[44,63],"open-loop":[46],"control":[47,138],"action":[48],"implementation":[49],"schemes":[50],"is":[51],"proposed":[52,75],"optimize":[54],"economic":[55],"benefits":[56],"in":[57,117,142,149],"time-varying":[59],"manner":[60],"while":[61],"maintaining":[62,143],"process":[64,84,121],"stability.":[65],"Although":[66],"sensor":[67,103],"measurements":[68],"may":[69],"be":[70],"the":[74,83,118,133,136,150],"controller":[76],"design":[77],"strategy":[80,141],"ensure":[81],"will":[85],"maintain":[86],"stability":[87],"stay":[89],"against":[91],"particular":[92],"destabilizing":[95],"Data-based":[97],"cyber-attack":[98],"detectors":[99,110],"developed":[101],"data":[104],"via":[105],"machine-learning":[106],"methods,":[107],"these":[109],"periodically":[112],"activated":[113],"applied":[115],"online":[116],"context":[119],"operation.":[122],"Using":[123],"continuously":[125],"stirred":[126],"tank":[127],"reactor":[128],"example,":[129],"simulation":[130],"results":[131],"demonstrate":[132],"effectiveness":[134],"stable":[144],"economically":[146],"optimal":[147],"presence":[151]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
