2022
DOI: 10.1109/access.2022.3153471
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification

Abstract: Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 71 publications
(32 citation statements)
references
References 56 publications
0
32
0
Order By: Relevance
“…This emulator integrates the PAE described in section IV-A-1), the PECE shown in Fig. 11, and the load model presented in (13). This system is executed on the FPGA every 14 μs.…”
Section: ) Emulators Integrationmentioning
confidence: 99%
See 1 more Smart Citation
“…This emulator integrates the PAE described in section IV-A-1), the PECE shown in Fig. 11, and the load model presented in (13). This system is executed on the FPGA every 14 μs.…”
Section: ) Emulators Integrationmentioning
confidence: 99%
“…The neural network determines the kind of fault based on gas concentration in the insolating oil with an accuracy of 94.36 % under normal conditions and 92.58 % considering cyberattacks. Finally, in [13] an IoT and deep learning neural network integration for online CNC machines monitoring is presented. The proposed platform classifies the machine operation into stable, unstable, and attacked, the latter in the case of an cyberattack, depending on the workpiece forces exerted by the machine.…”
mentioning
confidence: 99%
“…In this work, we identify the effects of multiple factors as well as utilize DL tools in evaluating an optimal transmission strategy to decrease transmission loss and intelligent consumption of sensor power [27]. Using the DL method, the exploration of environmental conditions impacts on wireless connectivity in underground surroundings, such as transmission pathway loss, energy consumption, and system bandwidth balancing [32]. As a result, the development of a dependable and powerful data collection transmission is structured as a Cooperative and multi-constrained communication-based limitation.…”
Section: Proposed Deep Learning Based Cooperative Communication Chann...mentioning
confidence: 99%
“…The results of the research from various computer science topics are used to improve the overall experience in the industrial domain and improve the Industry 4.0 agenda [21]. It is not only the improvement of the product quality management system as described in [22] but also the usage of artificial intelligence (AI) and deep learning algorithms that could improve the segments of system security monitoring [23,24] and general fault diagnostics [25,26].…”
Section: Background and Significancementioning
confidence: 99%