Detection-performance tradeoff for watermarking in industrial control systems

H Zhu, M Liu, C Fang, R Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The watermarking method, which adds unique watermarks to data, has been widely used for
integrity attack detection in industrial control systems (ICSs). Existing literature generally …

PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems

L Du, Q Yuan, M Chen, M Sun, P Cheng… - Proceedings of the 19th …, 2024 - dl.acm.org
Recommender systems predict and suggest relevant options to users in various domains,
such as e-commerce, streaming services, and social media. Recently, deep reinforcement …

SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic

J Meng, Z Yang, Z Zhang, Y Geng, R Deng… - Proceedings of the 39th …, 2023 - dl.acm.org
Programmable logic controllers (PLCs), the essential components of critical infrastructure,
play a crucial role in various industrial manufacturing processes. Recent attack events show …

Unveiling Physical Semantics of PLC Variables Using Control Invariants

Z Yang, L He, Y Ruan, P Cheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The security risk of semantic attacks to Industrial Control Systems (ICSs) is increasing.
Semantic attacks manipulate targeted system modules by identifying the physical semantics …

Reverse Engineering Industrial Protocols Driven By Control Fields

Z Qin, Z Yang, Y Geng, X Che, T Wang… - … -IEEE Conference on …, 2024 - ieeexplore.ieee.org
Industrial protocols are widely used in Industrial Control Systems (ICSs) to network physical
devices, thus playing a crucial role in securing ICSs. However, most commercial industrial …