{"id":"https://openalex.org/W3188987123","doi":"https://doi.org/10.1109/tii.2021.3103765","title":"Data Guardian: A Data Protection Scheme for Industrial Monitoring Systems","display_name":"Data Guardian: A Data Protection Scheme for Industrial Monitoring Systems","publication_year":2021,"publication_date":"2021-08-10","ids":{"openalex":"https://openalex.org/W3188987123","doi":"https://doi.org/10.1109/tii.2021.3103765","mag":"3188987123"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3103765","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3103765","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102951858","display_name":"Yue Zhuo","orcid":"https://orcid.org/0000-0003-2159-8980"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yue Zhuo","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China","The authors are with the State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"The authors are with the State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492","https://openalex.org/I4391767838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067726465","display_name":"Zhiqiang Ge","orcid":"https://orcid.org/0000-0002-2071-4380"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Ge","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China","The authors are with the State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"The authors are with the State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492","https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102951858"],"corresponding_institution_ids":["https://openalex.org/I4210136793","https://openalex.org/I4391767838","https://openalex.org/I55712492"],"apc_list":null,"apc_paid":null,"fwci":1.385,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.81437487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"18","issue":"4","first_page":"2550","last_page":"2559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5824247002601624},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5631492137908936},{"id":"https://openalex.org/keywords/guardian","display_name":"Guardian","score":0.5274308323860168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3907736837863922},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10059013962745667}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5824247002601624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5631492137908936},{"id":"https://openalex.org/C2776680780","wikidata":"https://www.wikidata.org/wiki/Q15964604","display_name":"Guardian","level":2,"score":0.5274308323860168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3907736837863922},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10059013962745667},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2021.3103765","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3103765","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5600000023841858}],"awards":[{"id":"https://openalex.org/G1987348790","display_name":null,"funder_award_id":"61833014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7655635370","display_name":null,"funder_award_id":"LR18F030001","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G7875806344","display_name":null,"funder_award_id":"61722310","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1540273789","https://openalex.org/W1553622981","https://openalex.org/W1673923490","https://openalex.org/W1883420340","https://openalex.org/W1945616565","https://openalex.org/W1981670729","https://openalex.org/W2004186751","https://openalex.org/W2010973666","https://openalex.org/W2115247187","https://openalex.org/W2119001152","https://openalex.org/W2128765501","https://openalex.org/W2133068391","https://openalex.org/W2135764410","https://openalex.org/W2159294971","https://openalex.org/W2173776306","https://openalex.org/W2408211519","https://openalex.org/W2640329709","https://openalex.org/W2747673131","https://openalex.org/W2789254838","https://openalex.org/W2893554781","https://openalex.org/W2956566815","https://openalex.org/W2962700793","https://openalex.org/W2970504098","https://openalex.org/W2985020889","https://openalex.org/W3035032188","https://openalex.org/W3037405620","https://openalex.org/W3102460956","https://openalex.org/W3123899295","https://openalex.org/W4256648168","https://openalex.org/W4297573953","https://openalex.org/W6632208920","https://openalex.org/W6633130854","https://openalex.org/W6639568328","https://openalex.org/W6683272254","https://openalex.org/W6733645847","https://openalex.org/W6755038706","https://openalex.org/W6767354759","https://openalex.org/W6774681163"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2495989387","https://openalex.org/W1964935100","https://openalex.org/W3183704944","https://openalex.org/W1671742159","https://openalex.org/W4231486762","https://openalex.org/W646220697","https://openalex.org/W2360859308"],"abstract_inverted_index":{"Recently,":[0],"data-driven":[1,22,92],"industrial":[2,15,25,39,86,131],"monitoring":[3,16,93,141],"systems":[4],"have":[5],"been":[6],"rapidly":[7],"developed":[8],"and":[9,84,133,196],"significantly":[10,32],"improved":[11,163],"the":[12,19,34,49,58,63,102,119,129,140,145,165,177,184,187,192,214,222],"performance":[13],"on":[14,57,91,108,191],"tasks.":[17],"However,":[18],"widely":[20],"deployed":[21],"models":[23,190],"expose":[24],"data":[26,60,74,87,103,125,166],"to":[27,61,82,186],"more":[28],"unsecured":[29],"links,":[30],"which":[31,144],"increase":[33],"safety":[35],"risk":[36,147],"of":[37,154,217],"safe-critical":[38],"systems.":[40,94],"The":[41,124,151,205],"research":[42],"about":[43],"adversarial":[44,218],"attacks":[45,90,185],"has":[46],"shown":[47],"that":[48,208],"potential":[50,89],"attackers":[51],"can":[52,211],"utilize":[53],"tiny":[54],"crafted":[55],"perturbations":[56],"input":[59,138],"mislead":[62],"machine":[64],"learning":[65],"models\u2019":[66],"output.":[67],"In":[68,176],"this":[69],"article,":[70],"a":[71,170],"novel":[72],"cross-domain":[73],"protection":[75],"scheme":[76],"named":[77],"\u201cData":[78,95,179,209],"Guardian\u201d":[79,96,180,210],"is":[80,148,162,181,226],"proposed":[81,172],"authenticate":[83],"correct":[85],"under":[88,183],"embeds":[97],"designed":[98],"redundancy":[99],"information":[100],"into":[101,139],"least":[104],"significant":[105],"bits,":[106],"based":[107],"<inline-formula":[109,155],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[110,156],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[111,157],"notation=\"LaTeX\">$q$</tex-math></inline-formula>":[112,158],"-ary":[113,159],"low-density":[114],"parity-check":[115],"(LDPC)":[116],"codes":[117,161],"over":[118],"Galois":[120],"field":[121],"(finite":[122],"field).":[123],"are":[126],"encoded":[127],"at":[128],"secured":[130],"sites":[132],"then":[134],"decoded":[135],"before":[136],"being":[137],"systems,":[142],"in":[143],"security":[146],"usually":[149],"higher.":[150],"decoding":[152],"capability":[153],"LDPC":[160],"by":[164],"statistical":[167],"characteristics,":[168],"with":[169],"new":[171],"prior":[173],"estimation":[174],"method.":[175],"experiments,":[178],"tested":[182],"fault":[188],"diagnosis":[189],"Tennessee":[193],"Eastman":[194],"process":[195],"rolling":[197],"element":[198],"bearing":[199],"from":[200],"Case":[201],"Western":[202],"Reserve":[203],"University.":[204],"results":[206],"show":[207],"efficiently":[212],"reduce":[213],"success":[215],"rate":[216],"attacks,":[219],"especially":[220],"when":[221],"attack":[223],"variable":[224],"ratio":[225],"small.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
