Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities

Y Luo, Y Xiao, L Cheng, G Peng, D Yao - ACM Computing Surveys …, 2021 - dl.acm.org
Anomaly detection is crucial to ensure the security of cyber-physical systems (CPS).
However, due to the increasing complexity of CPSs and more sophisticated attacks …

Certified robustness to adversarial examples with differential privacy

M Lecuyer, V Atlidakis, R Geambasu… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Adversarial examples that fool machine learning models, particularly deep neural networks,
have been a topic of intense research interest, with attacks and defenses being developed …

Edge and fog computing in critical infrastructures: Analysis, security threats, and research challenges

P Tedeschi, S Sciancalepore - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
The increasing integration of information and communication technologies has undoubtedly
boosted the efficiency of Critical Infrastructures (CI). However, the first wave of IoT devices …

Building complex event processing capability for intelligent environmental monitoring

AY Sun, Z Zhong, H Jeong, Q Yang - Environmental modelling & software, 2019 - Elsevier
Rapid evolution of Internet-of-Things is driving the increased deployment of smart sensors in
environmental applications, contributing to many big data characteristics of environmental …

A systematic analysis of enhancing cyber security using deep learning for cyber physical systems

S Gaba, I Budhiraja, V Kumar, S Martha, J Khurmi… - IEEE …, 2024 - ieeexplore.ieee.org
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …

Do you know existing accuracy metrics overrate time-series anomaly detections?

WS Hwang, JH Yun, J Kim, BG Min - Proceedings of the 37th ACM …, 2022 - dl.acm.org
An anomaly coincides with a time range in time-series data, and a detection method usually
detects part of this range. Existing works assume that an expert can detect the whole …

Should i raise the red flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms

Z Zohrevand, U Glässer - arXiv preprint arXiv:1904.06646, 2019 - arxiv.org
Nowadays, advanced intrusion detection systems (IDSs) rely on a combination of anomaly
detection and signature-based methods. An IDS gathers observations, analyzes behavioral …

Dynamic attack scoring using distributed local detectors

Z Zohrevand, U Glässer - ICASSP 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, continuously operating critical services increasingly rely on complex cyber-
physical systems, which are also known as high-profile targets of cyberattacks, potentially …

Risk prediction of peer-to-peer lending market by a LSTM model with macroeconomic factor

Y Wang, XS Ni - Proceedings of the 2020 ACM Southeast Conference, 2020 - dl.acm.org
In the peer to peer (P2P) lending platform, investors hope to maximize their return while
minimizing the risk through a comprehensive understanding of the P2P market. A low and …

[PDF][PDF] On the connection between differential privacy and adversarial robustness in machine learning

M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana - stat, 2018 - researchgate.net
Adversarial examples in machine learning has been a topic of intense research interest, with
attacks and defenses being developed in a tight back-and-forth. Most past defenses are best …