PDDL: Proactive distributed detection and localization against stealthy deception attacks in DC microgrids

M Liu, C Zhao, J **a, R Deng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of the information and communication technology in DC
microgrids (DCmGs), the threat of deception attacks has been widely recognized. However …

A Bayesian deep reinforcement learning-based resilient control for multi-energy micro-gird

T Zhang, M Sun, D Qiu, X Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Aiming at a cleaner future power system, many regimes in the world have proposed their
ambitious decarbonizing plan, with increasing penetration of renewable energy sources …

{SAIN}: Improving {ICS} Attack Detection Sensitivity via {State-Aware} Invariants

SG Abbas, MO Ozmen, A Alsaheel, A Khan… - 33rd USENIX Security …, 2024 - usenix.org
Industrial Control Systems (ICSs) rely on Programmable Logic Controllers (PLCs) to operate
within a set of states. The states are composed of variables that determine how sensor data …

Label-free multivariate time series anomaly detection

Q Zhou, S He, H Liu, J Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anomaly detection in multivariate time series has been widely studied in one-class
classification (OCC) setting. The training samples in this setting are assumed to be normal …

Detection-performance tradeoff for watermarking in industrial control systems

H Zhu, M Liu, C Fang, R Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The watermarking method, which adds unique watermarks to data, has been widely used for
integrity attack detection in industrial control systems (ICSs). Existing literature generally …

ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

L Du, M Chen, M Sun, S Ji, P Cheng, J Chen… - arxiv preprint arxiv …, 2023 - arxiv.org
Data is a critical asset in AI, as high-quality datasets can significantly improve the
performance of machine learning models. In safety-critical domains such as autonomous …

A semantic-consistent few-shot modulation recognition framework for IoT applications

J Su, P Sun, Y Jiang, Z Wen, F Guo… - … on Neural Networks …, 2024 - ieeexplore.ieee.org
The rapid growth of the Internet of Things (IoT) has led to the widespread adoption of the IoT
networks in numerous digital applications. To counter physical threats in these systems …

PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems

L Du, Q Yuan, M Chen, M Sun, P Cheng… - Proceedings of the 19th …, 2024 - dl.acm.org
Recommender systems predict and suggest relevant options to users in various domains,
such as e-commerce, streaming services, and social media. Recently, deep reinforcement …

[PDF][PDF] Mock: optimizing kernel fuzzing mutation with context-aware dependency

J Xu, X Zhang, S Ji, Y Tian, B Zhao… - Proceedings of the …, 2024 - ndss-symposium.org
Kernels are at the heart of modern operating systems, whereas their development comes
with vulnerabilities. Coverage-guided fuzzing has proven to be a promising software testing …

OptAML: Optimized adversarial machine learning on water treatment and distribution systems

MS Ayas, E Kara, S Ayas, AK Sahin - International Journal of Critical …, 2025 - Elsevier
This research presents the optimized adversarial machine learning framework, OptAML,
which is developed for use in water distribution and treatment systems. In consideration of …