IEEE Transactions on Industrial Cyber-Physical Systems最新文献

筛选
英文 中文
Open-Set Fault Diagnosis for Industrial Rotating Machines Based on Trustworthy Deep Learning 基于可信赖深度学习的工业旋转机械开集故障诊断
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-11 DOI: 10.1109/TICPS.2025.3539997
Dongdong Wei;Mingjian Zuo;Zhigang Tian
{"title":"Open-Set Fault Diagnosis for Industrial Rotating Machines Based on Trustworthy Deep Learning","authors":"Dongdong Wei;Mingjian Zuo;Zhigang Tian","doi":"10.1109/TICPS.2025.3539997","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3539997","url":null,"abstract":"Detecting and diagnosing faults in rotating machines is crucial for ensuring the safety and reliability of modern industrial cyber-physical systems. Traditional data-driven fault diagnosis methods have achieved significant success when dealing with a set list of known faults and working conditions. However, they become inaccurate and overconfident when faced with new fault classes outside the training set. This paper introduces a novel Evidential Abstention Classifier based on trustworthy deep learning. It can quantify prediction uncertainty and recognize new fault classes without the need for their training data. Experiment results validated the efficacy of the proposed L1 regularization in improving uncertainty quantification. They also highlighted the proficiency of the designed auxiliary training method in generating fault-discriminative features and establishing effective decision boundaries for new fault types. EAC enables accurate open-set fault diagnosis with reduced reliance on historical data, offering improved transparency in the diagnostic process.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"181-189"},"PeriodicalIF":0.0,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety-Aware Scheduling of Real-Time Control Systems With Burst Computing Tasks 具有突发计算任务的实时控制系统的安全感知调度
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-04 DOI: 10.1109/TICPS.2025.3537961
Ting Cheng;Yonghui Liang;Hui Li;Qimin Xu;Shanying Zhu
{"title":"Safety-Aware Scheduling of Real-Time Control Systems With Burst Computing Tasks","authors":"Ting Cheng;Yonghui Liang;Hui Li;Qimin Xu;Shanying Zhu","doi":"10.1109/TICPS.2025.3537961","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3537961","url":null,"abstract":"This paper investigates the safety-aware task scheduling problem of real-time control systems in the presence of burst computing tasks. The basic idea is to adaptively release resources from low-criticality control tasks, ensuring timely completion of burst computing tasks and keeping the control system state within a safe threshold. An efficient algorithm called ADP-Opt is proposed to solve the problem. It first decouples the complex original problem into multiple subproblems, which greatly reduces the search space and improves the solution efficiency. In the subproblem, safety is maintained by limiting the upper bound of the system state's deviation to below the threshold. By introducing a penalty term in the cost function related to computing resources, we aim to balance the impact of control computing tasks on control performance and the consumption of computing resources. Consequently, the overall cost of the control system can be minimized while releasing enough resources for burst computing tasks. Simulation results show that the scheduling decisions made by ADP-Opt approach the optimal decision and maintain the safety of the control systems.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"218-227"},"PeriodicalIF":0.0,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Online Optimization Of Consensus-Based Adaptive Gradients Over Time-Varying Networks 时变网络中基于共识的自适应梯度的分布式在线优化
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-04 DOI: 10.1109/TICPS.2025.3538690
Qingyang Sheng;Xiasheng Shi;Yanxu Su
{"title":"Distributed Online Optimization Of Consensus-Based Adaptive Gradients Over Time-Varying Networks","authors":"Qingyang Sheng;Xiasheng Shi;Yanxu Su","doi":"10.1109/TICPS.2025.3538690","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3538690","url":null,"abstract":"The application of distributed optimization to ICPSs has advantages and challenges. Recently, a consensus-based distributed adaptive moment estimation method, referred to as DAdam (Distributed Adam), has been proposed as a variant of Adam specifically tailored for distributed and parallel computing environments. DAdam integrates the benefits of adaptive learning rate and moment estimation, but its application scenarios are limited. The assumption of static networks in existing literatures is conservative in real environments. To overcome this limitation, we propose DAdam-TV which can solve the optimization problems in time-varying networks. After rigorous analysis, we exam the convergence of proposed algorithm. For convex and non-convex problems, we bound the dynamic regret and local regret, respectively. Numerical simulations show that DAdam-TV has better performance in solving optimization problems in dynamic networks. DAdam-TV breaks through the limitation of static application scenarios, which makes the algorithm more general and effective in practical applications such as ICPSs.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"190-197"},"PeriodicalIF":0.0,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Industrial Rare Cyber Attack Detection Based on Federated Diffusion-Squeeze Graph Modeling 基于联邦扩散-挤压图模型的工业稀有网络攻击检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-01-24 DOI: 10.1109/TICPS.2025.3533461
Fangyu Li;Junnuo Lin;Di Wang;Hongyan Yang
{"title":"Industrial Rare Cyber Attack Detection Based on Federated Diffusion-Squeeze Graph Modeling","authors":"Fangyu Li;Junnuo Lin;Di Wang;Hongyan Yang","doi":"10.1109/TICPS.2025.3533461","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3533461","url":null,"abstract":"Distributed learning applied in industrial cyber-physical systems (ICPS) is vulnerable to cyber attacks, especially rare ones. Common data-driven cyber attack detection approaches face the challenges of imbalanced data, resulting in insufficient extraction of anomalous features. To enhance the sensitivity of rare cyber attack detection in complex ICPS, we propose a federated diffusion-squeeze graph model (FedDSG). In each edge device, we construct a local diffusion-based generative module to balance rare anomalous data and construct feature graphs, which maintains information fidelity and type balance of data. To alleviate the extra computational load, we establish a graph-structured detection module based on information bottleneck (IB) to filter out redundant topological features and identify the optimal graph for modeling. In the central server, we design an aggregation strategy in the central server to consolidate a global FedDSG and the global generative module generates synthetic cyber attack data to retrain the global detection module. In addition, we verify FedDSG using public industrial datasets on the self-constructed simulation platform. The results show that FedDSG improves the efficiency of rare cyber attack detection.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"150-164"},"PeriodicalIF":0.0,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143361090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Based Q-Learning for Replay Attack Detection in Cyber-Physical Systems 基于数据的q -学习网络物理系统重放攻击检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-01-23 DOI: 10.1109/TICPS.2025.3532881
Junshuai Qin;Zhengdao Zhang;Huarong Zhao
{"title":"Data-Based Q-Learning for Replay Attack Detection in Cyber-Physical Systems","authors":"Junshuai Qin;Zhengdao Zhang;Huarong Zhao","doi":"10.1109/TICPS.2025.3532881","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3532881","url":null,"abstract":"This article investigates an innovative data-driven approach to detect replay attacks in cyber-physical systems (CPSs). The core innovation lies in the pioneering application of a Q-learning algorithm for real-time estimation of the unknown system output values, which is integrated with measurement encoding techniques to transform replay attacks into additive disturbances in residuals for detection. This proposal effectively surpasses the limitation of traditional detection methods' reliance on system models while enhancing the sensitivity and accuracy of attack detection. Secondly, a replay attack detector based on residual analysis is constructed, and the detectability of replay attacks is theoretically proven. Finally, the effectiveness and superiority of the proposed scheme are verified through simulation and comparative experiments.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"165-172"},"PeriodicalIF":0.0,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Transmission Power Scheduling for Networked Control System Under DoS Attack DoS攻击下网络控制系统的最优传输功率调度
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-01-16 DOI: 10.1109/TICPS.2025.3530406
Siyi Wang;Yulong Gao;Sandra Hirche
{"title":"Optimal Transmission Power Scheduling for Networked Control System Under DoS Attack","authors":"Siyi Wang;Yulong Gao;Sandra Hirche","doi":"10.1109/TICPS.2025.3530406","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3530406","url":null,"abstract":"Designing networked control systems that are reliable and resilient against adversarial threats, is essential for ensuring the security of cyber-physical systems. This paper addresses the communication-control co-design problem for networked control systems under denial-of-service (DoS) attacks. In wireless channels, a transmission power scheduler periodically determines the power level for sensory data transmission. Yet DoS attacks render data packets unavailable by disrupting the communication channel. This paper co-designs the control and power scheduling laws in the presence of DoS attacks and aims to minimize the sum of regulation control performance and transmission power consumption. Both finite- and infinite-horizon discounted cost criteria are addressed. By delving into the information structure between the controller and the power scheduler under attack, the original co-design problem is divided into two subproblems that can be solved individually without compromising optimality. The optimal control is shown to be certainty equivalent, and the optimal transmission power scheduling is solved using a dynamic programming approach. Moreover, in the infinite-horizon scenario, we analyze the performance of the designed scheduling policy and develop an upper bound of the total costs. Finally, a numerical example is provided to demonstrate the theoretical results.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"198-207"},"PeriodicalIF":0.0,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index IEEE Transactions on Industrial Cyber-Physical Systems Vol. 2 IEEE工业信息物理系统学报第2卷
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-01-16 DOI: 10.1109/TICPS.2025.3530736
{"title":"2024 Index IEEE Transactions on Industrial Cyber-Physical Systems Vol. 2","authors":"","doi":"10.1109/TICPS.2025.3530736","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3530736","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"638-655"},"PeriodicalIF":0.0,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10844022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142992882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable Diffusion-Based Incentive Mechanism for Generative AI-Driven Digital Twins in Industrial Cyber-Physical Systems 工业信息物理系统中生成式人工智能驱动数字孪生的可持续扩散激励机制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-12-31 DOI: 10.1109/TICPS.2024.3524483
Jinbo Wen;Jiawen Kang;Dusit Niyato;Yang Zhang;Shiwen Mao
{"title":"Sustainable Diffusion-Based Incentive Mechanism for Generative AI-Driven Digital Twins in Industrial Cyber-Physical Systems","authors":"Jinbo Wen;Jiawen Kang;Dusit Niyato;Yang Zhang;Shiwen Mao","doi":"10.1109/TICPS.2024.3524483","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524483","url":null,"abstract":"Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries. By digitizing data throughout product life cycles, Digital Twins (DTs) in ICPSs enable a shift from current industrial infrastructures to intelligent and adaptive infrastructures. Thanks to data process capability, Generative Artificial Intelligence (GenAI) can drive the construction and update of DTs to improve predictive accuracy and prepare for diverse smart manufacturing. However, mechanisms that leverage Industrial Internet of Things (IIoT) devices to share sensing data for DT construction are susceptible to adverse selection problems. In this paper, we first develop a GenAI-driven DT architecture in ICPSs. To address the adverse selection problem caused by information asymmetry, we propose a contract theory model and develop a sustainable diffusion-based soft actor-critic algorithm to identify the optimal feasible contract. Specifically, we leverage dynamic structured pruning techniques to reduce parameter numbers of actor networks, allowing sustainability and efficient implementation of the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed scheme and the algorithm, enabling efficient DT construction and updates to monitor and manage ICPSs.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"139-149"},"PeriodicalIF":0.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Real-Time Communication Traffic Anomaly Detection for Multi-Dimensional Industrial Networks 多维工业网络的无监督实时通信流量异常检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-12-30 DOI: 10.1109/TICPS.2024.3524185
Weijie hao;Zebang Zhang;Xuan Wang;Qiang Yang;Bo Liu;Wenhai Wang;Tao Yang;Peng Ye
{"title":"Unsupervised Real-Time Communication Traffic Anomaly Detection for Multi-Dimensional Industrial Networks","authors":"Weijie hao;Zebang Zhang;Xuan Wang;Qiang Yang;Bo Liu;Wenhai Wang;Tao Yang;Peng Ye","doi":"10.1109/TICPS.2024.3524185","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524185","url":null,"abstract":"Security risks exist in various dimensions of Industrial Cyber-Physical Systems(ICPS), and network traffic analysis is widely regarded as the most promising approach for mitigating sophisticated threats. This paper proposes an unsupervised anomaly detection method for multidimensional industrial network traffic. The feature engineering scheme for multidimensional industrial network traffic is specifically designed based on connection behavior characteristics, temporal features and statistical features. The deep autoencoder Gaussian mixture model (DAGMM) is employed and fine-tuned accordingly to generate normal behavior patterns with high-dimensional, large-scale traffic data considering the real-time response of the detection system. The proposed solution is extensively verified based on real network traffic data collected in the industrial control system (ICS) testbed. Numerical results confirm the effectiveness of the proposed model in modeling both statistical and mixed features of network traffic. The superiority in abnormal behavior identification and detection response is demonstrated compared to other models using a practical real-time framework.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"228-240"},"PeriodicalIF":0.0,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143583246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exponentially Convergent Algorithms Design for Distributed Resource Allocation Under Non-Strongly Convex Condition: From Continuous-Time to Event-Triggered Communication 非强凸条件下分布式资源分配的指数收敛算法设计:从连续时间到事件触发通信
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-12-30 DOI: 10.1109/TICPS.2024.3524368
Zhijun Guo;Junliang Xin;Qian Li
{"title":"Exponentially Convergent Algorithms Design for Distributed Resource Allocation Under Non-Strongly Convex Condition: From Continuous-Time to Event-Triggered Communication","authors":"Zhijun Guo;Junliang Xin;Qian Li","doi":"10.1109/TICPS.2024.3524368","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3524368","url":null,"abstract":"The standard condition for achieving exponential convergence of distributed resource allocation is the strongly convex objective functions, which is hard to be guaranteed in many practical cyber-physical systems. To study the resource allocation problem in a more general setting, we provide a new condition which only requires that the gradient-based map satisfies the metric subregularity. This condition is weaker than the standard strongly convex condition and is imposed to the objective functions. Based on such a relaxed condition, two new kinds of distributed allocation algorithms are proposed under continuous-time and event-triggered communications, respectively. The exponential convergence of our proposed algorithms are verified by rigorous theoretical analyses and some economic dispatch examples in the industrial cyber-physical system.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"127-138"},"PeriodicalIF":0.0,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信