{"title":"Open-Set Fault Diagnosis for Industrial Rotating Machines Based on Trustworthy Deep Learning","authors":"Dongdong Wei;Mingjian Zuo;Zhigang Tian","doi":"10.1109/TICPS.2025.3539997","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3539997","url":null,"abstract":"Detecting and diagnosing faults in rotating machines is crucial for ensuring the safety and reliability of modern industrial cyber-physical systems. Traditional data-driven fault diagnosis methods have achieved significant success when dealing with a set list of known faults and working conditions. However, they become inaccurate and overconfident when faced with new fault classes outside the training set. This paper introduces a novel Evidential Abstention Classifier based on trustworthy deep learning. It can quantify prediction uncertainty and recognize new fault classes without the need for their training data. Experiment results validated the efficacy of the proposed L1 regularization in improving uncertainty quantification. They also highlighted the proficiency of the designed auxiliary training method in generating fault-discriminative features and establishing effective decision boundaries for new fault types. EAC enables accurate open-set fault diagnosis with reduced reliance on historical data, offering improved transparency in the diagnostic process.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"181-189"},"PeriodicalIF":0.0,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety-Aware Scheduling of Real-Time Control Systems With Burst Computing Tasks","authors":"Ting Cheng;Yonghui Liang;Hui Li;Qimin Xu;Shanying Zhu","doi":"10.1109/TICPS.2025.3537961","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3537961","url":null,"abstract":"This paper investigates the safety-aware task scheduling problem of real-time control systems in the presence of burst computing tasks. The basic idea is to adaptively release resources from low-criticality control tasks, ensuring timely completion of burst computing tasks and keeping the control system state within a safe threshold. An efficient algorithm called ADP-Opt is proposed to solve the problem. It first decouples the complex original problem into multiple subproblems, which greatly reduces the search space and improves the solution efficiency. In the subproblem, safety is maintained by limiting the upper bound of the system state's deviation to below the threshold. By introducing a penalty term in the cost function related to computing resources, we aim to balance the impact of control computing tasks on control performance and the consumption of computing resources. Consequently, the overall cost of the control system can be minimized while releasing enough resources for burst computing tasks. Simulation results show that the scheduling decisions made by ADP-Opt approach the optimal decision and maintain the safety of the control systems.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"218-227"},"PeriodicalIF":0.0,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Online Optimization Of Consensus-Based Adaptive Gradients Over Time-Varying Networks","authors":"Qingyang Sheng;Xiasheng Shi;Yanxu Su","doi":"10.1109/TICPS.2025.3538690","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3538690","url":null,"abstract":"The application of distributed optimization to ICPSs has advantages and challenges. Recently, a consensus-based distributed adaptive moment estimation method, referred to as DAdam (Distributed Adam), has been proposed as a variant of Adam specifically tailored for distributed and parallel computing environments. DAdam integrates the benefits of adaptive learning rate and moment estimation, but its application scenarios are limited. The assumption of static networks in existing literatures is conservative in real environments. To overcome this limitation, we propose DAdam-TV which can solve the optimization problems in time-varying networks. After rigorous analysis, we exam the convergence of proposed algorithm. For convex and non-convex problems, we bound the dynamic regret and local regret, respectively. Numerical simulations show that DAdam-TV has better performance in solving optimization problems in dynamic networks. DAdam-TV breaks through the limitation of static application scenarios, which makes the algorithm more general and effective in practical applications such as ICPSs.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"190-197"},"PeriodicalIF":0.0,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrial Rare Cyber Attack Detection Based on Federated Diffusion-Squeeze Graph Modeling","authors":"Fangyu Li;Junnuo Lin;Di Wang;Hongyan Yang","doi":"10.1109/TICPS.2025.3533461","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3533461","url":null,"abstract":"Distributed learning applied in industrial cyber-physical systems (ICPS) is vulnerable to cyber attacks, especially rare ones. Common data-driven cyber attack detection approaches face the challenges of imbalanced data, resulting in insufficient extraction of anomalous features. To enhance the sensitivity of rare cyber attack detection in complex ICPS, we propose a federated diffusion-squeeze graph model (FedDSG). In each edge device, we construct a local diffusion-based generative module to balance rare anomalous data and construct feature graphs, which maintains information fidelity and type balance of data. To alleviate the extra computational load, we establish a graph-structured detection module based on information bottleneck (IB) to filter out redundant topological features and identify the optimal graph for modeling. In the central server, we design an aggregation strategy in the central server to consolidate a global FedDSG and the global generative module generates synthetic cyber attack data to retrain the global detection module. In addition, we verify FedDSG using public industrial datasets on the self-constructed simulation platform. The results show that FedDSG improves the efficiency of rare cyber attack detection.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"150-164"},"PeriodicalIF":0.0,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143361090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Based Q-Learning for Replay Attack Detection in Cyber-Physical Systems","authors":"Junshuai Qin;Zhengdao Zhang;Huarong Zhao","doi":"10.1109/TICPS.2025.3532881","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3532881","url":null,"abstract":"This article investigates an innovative data-driven approach to detect replay attacks in cyber-physical systems (CPSs). The core innovation lies in the pioneering application of a Q-learning algorithm for real-time estimation of the unknown system output values, which is integrated with measurement encoding techniques to transform replay attacks into additive disturbances in residuals for detection. This proposal effectively surpasses the limitation of traditional detection methods' reliance on system models while enhancing the sensitivity and accuracy of attack detection. Secondly, a replay attack detector based on residual analysis is constructed, and the detectability of replay attacks is theoretically proven. Finally, the effectiveness and superiority of the proposed scheme are verified through simulation and comparative experiments.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"165-172"},"PeriodicalIF":0.0,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Transmission Power Scheduling for Networked Control System Under DoS Attack","authors":"Siyi Wang;Yulong Gao;Sandra Hirche","doi":"10.1109/TICPS.2025.3530406","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3530406","url":null,"abstract":"Designing networked control systems that are reliable and resilient against adversarial threats, is essential for ensuring the security of cyber-physical systems. This paper addresses the communication-control co-design problem for networked control systems under denial-of-service (DoS) attacks. In wireless channels, a transmission power scheduler periodically determines the power level for sensory data transmission. Yet DoS attacks render data packets unavailable by disrupting the communication channel. This paper co-designs the control and power scheduling laws in the presence of DoS attacks and aims to minimize the sum of regulation control performance and transmission power consumption. Both finite- and infinite-horizon discounted cost criteria are addressed. By delving into the information structure between the controller and the power scheduler under attack, the original co-design problem is divided into two subproblems that can be solved individually without compromising optimality. The optimal control is shown to be certainty equivalent, and the optimal transmission power scheduling is solved using a dynamic programming approach. Moreover, in the infinite-horizon scenario, we analyze the performance of the designed scheduling policy and develop an upper bound of the total costs. Finally, a numerical example is provided to demonstrate the theoretical results.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"198-207"},"PeriodicalIF":0.0,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2024 Index IEEE Transactions on Industrial Cyber-Physical Systems Vol. 2","authors":"","doi":"10.1109/TICPS.2025.3530736","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3530736","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"638-655"},"PeriodicalIF":0.0,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10844022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142992882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinbo Wen;Jiawen Kang;Dusit Niyato;Yang Zhang;Shiwen Mao
{"title":"Sustainable Diffusion-Based Incentive Mechanism for Generative AI-Driven Digital Twins in Industrial Cyber-Physical Systems","authors":"Jinbo Wen;Jiawen Kang;Dusit Niyato;Yang Zhang;Shiwen Mao","doi":"10.1109/TICPS.2024.3524483","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524483","url":null,"abstract":"Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries. By digitizing data throughout product life cycles, Digital Twins (DTs) in ICPSs enable a shift from current industrial infrastructures to intelligent and adaptive infrastructures. Thanks to data process capability, Generative Artificial Intelligence (GenAI) can drive the construction and update of DTs to improve predictive accuracy and prepare for diverse smart manufacturing. However, mechanisms that leverage Industrial Internet of Things (IIoT) devices to share sensing data for DT construction are susceptible to adverse selection problems. In this paper, we first develop a GenAI-driven DT architecture in ICPSs. To address the adverse selection problem caused by information asymmetry, we propose a contract theory model and develop a sustainable diffusion-based soft actor-critic algorithm to identify the optimal feasible contract. Specifically, we leverage dynamic structured pruning techniques to reduce parameter numbers of actor networks, allowing sustainability and efficient implementation of the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed scheme and the algorithm, enabling efficient DT construction and updates to monitor and manage ICPSs.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"139-149"},"PeriodicalIF":0.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weijie hao;Zebang Zhang;Xuan Wang;Qiang Yang;Bo Liu;Wenhai Wang;Tao Yang;Peng Ye
{"title":"Unsupervised Real-Time Communication Traffic Anomaly Detection for Multi-Dimensional Industrial Networks","authors":"Weijie hao;Zebang Zhang;Xuan Wang;Qiang Yang;Bo Liu;Wenhai Wang;Tao Yang;Peng Ye","doi":"10.1109/TICPS.2024.3524185","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524185","url":null,"abstract":"Security risks exist in various dimensions of Industrial Cyber-Physical Systems(ICPS), and network traffic analysis is widely regarded as the most promising approach for mitigating sophisticated threats. This paper proposes an unsupervised anomaly detection method for multidimensional industrial network traffic. The feature engineering scheme for multidimensional industrial network traffic is specifically designed based on connection behavior characteristics, temporal features and statistical features. The deep autoencoder Gaussian mixture model (DAGMM) is employed and fine-tuned accordingly to generate normal behavior patterns with high-dimensional, large-scale traffic data considering the real-time response of the detection system. The proposed solution is extensively verified based on real network traffic data collected in the industrial control system (ICS) testbed. Numerical results confirm the effectiveness of the proposed model in modeling both statistical and mixed features of network traffic. The superiority in abnormal behavior identification and detection response is demonstrated compared to other models using a practical real-time framework.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"228-240"},"PeriodicalIF":0.0,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143583246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponentially Convergent Algorithms Design for Distributed Resource Allocation Under Non-Strongly Convex Condition: From Continuous-Time to Event-Triggered Communication","authors":"Zhijun Guo;Junliang Xin;Qian Li","doi":"10.1109/TICPS.2024.3524368","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524368","url":null,"abstract":"The standard condition for achieving exponential convergence of distributed resource allocation is the strongly convex objective functions, which is hard to be guaranteed in many practical cyber-physical systems. To study the resource allocation problem in a more general setting, we provide a new condition which only requires that the gradient-based map satisfies the metric subregularity. This condition is weaker than the standard strongly convex condition and is imposed to the objective functions. Based on such a relaxed condition, two new kinds of distributed allocation algorithms are proposed under continuous-time and event-triggered communications, respectively. The exponential convergence of our proposed algorithms are verified by rigorous theoretical analyses and some economic dispatch examples in the industrial cyber-physical system.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"127-138"},"PeriodicalIF":0.0,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}