Blockchain-based ai-enabled industry 4.0 cps protection against advanced persistent threat

Z Rahman, X Yi, I Khalil - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Industry 4.0 is all about doing things in a concurrent, secure, and fine-grained manner.
Internet of Things edge sensors and their associated data play a predominant role in today's …

What distributions are robust to indiscriminate poisoning attacks for linear learners?

F Suya, X Zhang, Y Tian… - Advances in neural …, 2024 - proceedings.neurips.cc
We study indiscriminate poisoning for linear learners where an adversary injects a few
crafted examples into the training data with the goal of forcing the induced model to incur …

When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?

F Suya, X Zhang, Y Tian, D Evans - arXiv preprint arXiv:2307.01073, 2023 - arxiv.org
We study indiscriminate poisoning for linear learners where an adversary injects a few
crafted examples into the training data with the goal of forcing the induced model to incur …

Research on SQL injection attack and defense technology of power dispatching data network: Based on data mining

J Sheng - Mobile Information Systems, 2022 - Wiley Online Library
In the process of SQL injection attack and defense of power dispatching data network, in
order to ensure the accuracy of identification and defense, it is often necessary to build a …

Manipulating supply chain demand forecasting with targeted poisoning attacks

J Chen, Y Gao, J Shan, K Peng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Demand forecasting (DF) plays an essential role in supply chain management, as it provides
an estimate of the goods that customers are expected to purchase in the foreseeable future …

[Retracted] PKPM Architectural Engineering Software System Based on Architectural BIM Technology

Y Fu - Journal of Sensors, 2022 - Wiley Online Library
In order to solve the problems in practical application of Building Information Modeling (BIM)
as an innovative tool and production method, the author proposes a method for simulating …

Machine learning based ids for cyberattack classification

A Mayes, A Anwar - Explainable Artificial Intelligence for Cyber Security …, 2022 - Springer
The emergence of cybersecurity attacks as commonplace within the digital age calls for the
development of cybersecurity defence capacities in both private and public organisations …

Design of Discrete IMC Controller for Mitigation of Cyber-Attacks

AK Badavath, YV Hote - 2022 IEEE 10th Power India …, 2022 - ieeexplore.ieee.org
This paper proposes the Internal model control (IMC) design technique to mitigate cyber-
attacks such as gain attacks, deception attacks, or man-in-middle (MITM) attacks. The plant …

Optimised Learning Models for Defending Against Cyber Attacks in Cyber-Physical Systems

W Yamany - 2023 - unsworks.unsw.edu.au
This research thesis focuses on the security of Cyber-Physical Systems (CPS) in critical
infrastructure. With the increasing use of CPS, security has become a crucial challenge. It is …

[PDF][PDF] Model Residuals as Shields: A Bilevel Formulation to Defend Smart Grids from Poisoning Attacks

TW Lin, P Roy, Y Zeng, M Jin, R Jia, CC Liu… - waynelin567.github.io
The advancement of interconnected smart grids brings both vast opportunities and
heightened cybersecurity risks. Data-driven defense mechanisms, though devised as a …