[HTML][HTML] The role of deep learning in urban water management: A critical review

G Fu, Y Jin, S Sun, Z Yuan, D Butler - Water Research, 2022 - Elsevier
Deep learning techniques and algorithms are emerging as a disruptive technology with the
potential to transform global economies, environments and societies. They have been …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

A systematic review of the state of cyber-security in water systems

N Tuptuk, P Hazell, J Watson, S Hailes - Water, 2021 - mdpi.com
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …

Joint adversarial example and false data injection attacks for state estimation in power systems

J Tian, B Wang, Z Wang, K Cao, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although state estimation using a bad data detector (BDD) is a key procedure employed in
power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial …

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges

AMY Koay, RKL Ko, H Hettema, K Radke - Journal of Intelligent …, 2023 - Springer
The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems
and processes, particularly on Industrial Control Systems (ICS). These systems are …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)

PH Mirzaee, M Shojafar, H Cruickshank… - IEEE access, 2022 - ieeexplore.ieee.org
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of
energy and information between customers and suppliers. The integration of power …

[HTML][HTML] Adversarial machine learning in industry: A systematic literature review

FV Jedrzejewski, L Thode, J Fischbach, T Gorschek… - Computers & …, 2024 - Elsevier
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …