{"id":"https://openalex.org/W7124163270","doi":"https://doi.org/10.48550/arxiv.2601.08481","title":"Baiting AI: Deceptive Adversary Against AI-Protected Industrial Infrastructures","display_name":"Baiting AI: Deceptive Adversary Against AI-Protected Industrial Infrastructures","publication_year":2026,"publication_date":"2026-01-13","ids":{"openalex":"https://openalex.org/W7124163270","doi":"https://doi.org/10.48550/arxiv.2601.08481"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.08481","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08481","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.08481","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027511205","display_name":"Aryan Mohammadi Pasikhani","orcid":"https://orcid.org/0000-0003-3181-4026"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pasikhani, Aryan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123028987","display_name":"Prosanta Gope","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gope, Prosanta","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123048551","display_name":"Yang Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032020253","display_name":"Shagufta Mehnaz","orcid":"https://orcid.org/0000-0001-5850-4568"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mehnaz, Shagufta","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123033632","display_name":"Biplab Sikdar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sikdar, Biplab","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027511205"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8460000157356262,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8460000157356262,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.11400000005960464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.008799999952316284,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7483000159263611},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7210000157356262},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6258999705314636},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.447299987077713},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.3962000012397766},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.3582000136375427},{"id":"https://openalex.org/keywords/biological-warfare","display_name":"Biological warfare","score":0.33379998803138733}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7483000159263611},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7210000157356262},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7168999910354614},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6258999705314636},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5871999859809875},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.447299987077713},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3953999876976013},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C59411770","wikidata":"https://www.wikidata.org/wiki/Q8242560","display_name":"Biological warfare","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3319000005722046},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.33090001344680786},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3294999897480011},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.29319998621940613},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.27079999446868896}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.08481","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08481","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.08481","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.08481","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5618592500686646}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,47],"paper":[1],"explores":[2],"a":[3,19],"new":[4,20],"cyber-attack":[5],"vector":[6],"targeting":[7],"Industrial":[8],"Control":[9],"Systems":[10],"(ICS),":[11],"particularly":[12],"focusing":[13],"on":[14,61,107],"water":[15],"treatment":[16],"facilities.":[17],"Developing":[18],"multi-agent":[21],"Deep":[22],"Reinforcement":[23],"Learning":[24],"(DRL)":[25],"approach,":[26],"adversaries":[27],"craft":[28],"stealthy,":[29],"strategically":[30],"timed,":[31],"wear-out":[32],"attacks":[33],"designed":[34],"to":[35,55,66,113],"subtly":[36],"degrade":[37],"product":[38],"quality":[39],"and":[40,58,76,126,134,142],"reduce":[41],"the":[42,80,99,108],"lifespan":[43],"of":[44,101],"field":[45],"actuators.":[46],"sophisticated":[48],"method":[49],"leverages":[50],"DRL":[51,111],"methodology":[52],"not":[53],"only":[54],"execute":[56],"precise":[57],"detrimental":[59],"impacts":[60],"targeted":[62],"infrastructure":[63],"but":[64],"also":[65],"evade":[67],"detection":[68],"by":[69],"contemporary":[70],"AI-driven":[71],"defence":[72],"systems.":[73],"By":[74],"developing":[75],"implementing":[77],"tailored":[78],"policies,":[79],"attackers":[81],"ensure":[82],"their":[83],"hostile":[84],"actions":[85],"blend":[86],"seamlessly":[87],"with":[88],"normal":[89],"operational":[90],"patterns,":[91],"circumventing":[92],"integrated":[93],"security":[94],"measures.":[95],"Our":[96,119],"research":[97,120],"reveals":[98],"robustness":[100],"this":[102],"attack":[103],"strategy,":[104],"shedding":[105],"light":[106],"potential":[109],"for":[110,116],"models":[112],"be":[114],"manipulated":[115],"adversarial":[117],"purposes.":[118],"has":[121],"been":[122],"validated":[123],"through":[124],"testing":[125],"analysis":[127],"in":[128],"an":[129],"industry-level":[130],"setup.":[131],"For":[132],"reproducibility":[133],"further":[135],"study,":[136],"all":[137],"related":[138],"materials,":[139],"including":[140],"datasets":[141],"documentation,":[143],"are":[144],"publicly":[145],"accessible.":[146]},"counts_by_year":[],"updated_date":"2026-01-15T23:21:31.212559","created_date":"2026-01-15T00:00:00"}
