{"id":"https://openalex.org/W4381786264","doi":"https://doi.org/10.1109/tii.2023.3288221","title":"Imperceptible Attacks on Fault Detection and Diagnosis Systems in Smart Buildings","display_name":"Imperceptible Attacks on Fault Detection and Diagnosis Systems in Smart Buildings","publication_year":2023,"publication_date":"2023-06-23","ids":{"openalex":"https://openalex.org/W4381786264","doi":"https://doi.org/10.1109/tii.2023.3288221"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2023.3288221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3288221","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003538946","display_name":"Ismail Alkhouri","orcid":"https://orcid.org/0000-0002-5754-5509"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ismail R. Alkhouri","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"raw_orcid":"https://orcid.org/0000-0002-5754-5509","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030159767","display_name":"Akram S. Awad","orcid":"https://orcid.org/0009-0002-6410-3132"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akram S. Awad","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"raw_orcid":"https://orcid.org/0009-0002-6410-3132","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041088605","display_name":"Wei Sun","orcid":"https://orcid.org/0000-0002-8668-8891"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qun Z. Sun","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"raw_orcid":"https://orcid.org/0000-0002-8668-8891","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003612688","display_name":"George Atia","orcid":"https://orcid.org/0000-0001-7958-9855"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George K. Atia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA"],"raw_orcid":"https://orcid.org/0000-0001-7958-9855","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003538946"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":1.0225,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80734626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"20","issue":"2","first_page":"2167","last_page":"2176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6540769338607788},{"id":"https://openalex.org/keywords/solver","display_name":"Solver","score":0.6001542806625366},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.520453929901123},{"id":"https://openalex.org/keywords/convex-optimization","display_name":"Convex optimization","score":0.4536716938018799},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41006767749786377},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4087325632572174},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.371846079826355},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3474547266960144},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2918844223022461},{"id":"https://openalex.org/keywords/regular-polygon","display_name":"Regular polygon","score":0.2716662585735321},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20836102962493896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.186469167470932},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10791537165641785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6540769338607788},{"id":"https://openalex.org/C2778770139","wikidata":"https://www.wikidata.org/wiki/Q1966904","display_name":"Solver","level":2,"score":0.6001542806625366},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.520453929901123},{"id":"https://openalex.org/C157972887","wikidata":"https://www.wikidata.org/wiki/Q463359","display_name":"Convex optimization","level":3,"score":0.4536716938018799},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41006767749786377},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4087325632572174},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.371846079826355},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3474547266960144},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2918844223022461},{"id":"https://openalex.org/C112680207","wikidata":"https://www.wikidata.org/wiki/Q714886","display_name":"Regular polygon","level":2,"score":0.2716662585735321},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20836102962493896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.186469167470932},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10791537165641785},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2023.3288221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3288221","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1986080131","https://openalex.org/W2001019870","https://openalex.org/W2072857564","https://openalex.org/W2163759100","https://openalex.org/W2184192902","https://openalex.org/W2258884143","https://openalex.org/W2516427203","https://openalex.org/W2563097732","https://openalex.org/W2607521821","https://openalex.org/W2685386887","https://openalex.org/W2735910455","https://openalex.org/W2883193586","https://openalex.org/W2902260055","https://openalex.org/W2909549633","https://openalex.org/W2962763344","https://openalex.org/W2964043206","https://openalex.org/W2975486888","https://openalex.org/W2987372462","https://openalex.org/W2988480725","https://openalex.org/W2997532515","https://openalex.org/W3083630455","https://openalex.org/W3161111820","https://openalex.org/W3212673094","https://openalex.org/W4285268790","https://openalex.org/W4292363360","https://openalex.org/W4297825594","https://openalex.org/W6696497002","https://openalex.org/W6726235853","https://openalex.org/W6758170011"],"related_works":["https://openalex.org/W2186864281","https://openalex.org/W4255427455","https://openalex.org/W1966025497","https://openalex.org/W68941528","https://openalex.org/W4206451355","https://openalex.org/W1553604823","https://openalex.org/W8322802","https://openalex.org/W314331466","https://openalex.org/W3120490799","https://openalex.org/W2049545441"],"abstract_inverted_index":{"Automated":[0],"fault":[1,101,202],"detection":[2,74,102,203],"and":[3,10,25,75,103,108,170,184,204],"diagnosis":[4,105,126,206],"systems":[5,54],"are":[6,37,86,130,158],"critical":[7],"to":[8,27,88,113,122,181,198],"safe":[9],"efficient":[11],"operation":[12],"of":[13,19,52,60,65,136,147,164,175,186],"smart":[14],"buildings.":[15],"A":[16],"significant":[17],"amount":[18],"building":[20,29],"data":[21,35,67,90],"can":[22],"be":[23],"collected":[24],"analyzed":[26],"detect":[28],"component":[30],"failures.":[31],"Attacks":[32],"against":[33],"such":[34,53,66],"that":[36,192],"contaminated":[38],"with":[39,120,179],"small":[40],"additive":[41],"disturbances":[42,199],"(i.e.,":[43],"adversarial":[44,89],"perturbation":[45,91],"attacks)":[46],"could":[47],"dreadfully":[48],"impact":[49],"the":[50,118,137,153,173,176,187,193],"performance":[51],"while":[55],"maintaining":[56],"a":[57,98,110,123],"high":[58],"level":[59],"imperceptibility.":[61],"The":[62],"vulnerability":[63],"studies":[64],"attacks":[68,116,178],"is":[69,150,195],"lacking.":[70],"Specifically,":[71],"most":[72],"existing":[73],"classification":[76],"models":[77],"have":[78],"flat":[79],"structures,":[80],"regarded":[81],"as":[82],"single-stage":[83],"classifiers":[84],"(SSCs),":[85],"prone":[87],"attacks.":[92,142],"In":[93],"this":[94],"article,":[95],"we":[96],"present":[97],"coarse-to-fine":[99],"hierarchical":[100],"multilevel":[104,205],"(HFDD)":[106],"model,":[107],"formulate":[109],"mathematical":[111],"program":[112,139],"derive":[114],"targeted":[115],"on":[117,133],"model":[119],"respect":[121],"prespecified":[124],"target":[125],"level.":[127],"Two":[128],"algorithms":[129],"developed":[131,151],"based":[132],"convex":[134,154],"relaxations":[135],"formulated":[138],"for":[140,152],"nontargeted":[141],"An":[143],"alternating":[144],"direction":[145],"method":[146],"multipliers-based":[148],"solver":[149],"programs.":[155],"Extensive":[156],"experiments":[157],"conducted":[159],"using":[160],"two":[161],"real-world":[162],"datasets":[163],"measurements":[165],"from":[166],"air":[167],"handling":[168],"units":[169],"chillers,":[171],"demonstrating":[172],"feasibility":[174],"proposed":[177],"regard":[180],"misclassification":[182],"rate":[183],"imperceptibility":[185],"attack.":[188],"We":[189],"also":[190],"show":[191],"HFDD":[194],"more":[196],"robust":[197],"than":[200],"SSC-based":[201],"systems.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
