2022
DOI: 10.1016/j.compind.2022.103660
|View full text |Cite
|
Sign up to set email alerts
|

STEWART: STacking Ensemble for White-Box AdversaRial Attacks Towards more resilient data-driven predictive maintenance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…In the aspect of nanocomposite materials, Gradient Boosted Trees is applied [69]. Applying bagging, majority voting to fault detection in the electronics, Catboost, XGBoost in electrical [70,71], In computer science, various ensemble learning methods, like a machine learning-based intrusion detection system (ML-IDS) [72], are also working to solve problems on local explanation [73], Cyber-Attacks [72,74]. In the monitoring of environmental pollutants PM2.5, the existing studies integrated EL with the satellite high-dimensional visualization method to realize the monitoring and prediction of pollutants [75,76].…”
Section: Application In M Categorymentioning
confidence: 99%
“…In the aspect of nanocomposite materials, Gradient Boosted Trees is applied [69]. Applying bagging, majority voting to fault detection in the electronics, Catboost, XGBoost in electrical [70,71], In computer science, various ensemble learning methods, like a machine learning-based intrusion detection system (ML-IDS) [72], are also working to solve problems on local explanation [73], Cyber-Attacks [72,74]. In the monitoring of environmental pollutants PM2.5, the existing studies integrated EL with the satellite high-dimensional visualization method to realize the monitoring and prediction of pollutants [75,76].…”
Section: Application In M Categorymentioning
confidence: 99%
“…Model defense is the last category of defenses which strengthen the model itself against adversarial attacks, i.e., increasing the robustness. This is the most heavily studied defense approach where there are numerous approaches such as gradient masking [36], defensive distillation [37], generative adversarial network [2], ensemble learning [18], certified defenses [42], and adversarial training [3]. Adversarial training proves to be the most effective against adversarial attacks [35].…”
Section: Related Workmentioning
confidence: 99%
“…Industrial Internet of Things (I-IoT) is a typical CPS enabling the operation, interconnection, and intelligence of industrial systems [57]. I-IoT's small-scale devices, with their limited computation and communication capabilities, make them vulnerable to potential cyber attacks [18]. An adversary can exploit these vulnerabilities to sabotage communication, prevent asset availability, and corrupt monitoring data which may have serious financial consequences [51].…”
mentioning
confidence: 99%
“…Let 0 y , 1 y , 2 y , and 3 y represent the four n-bit outputs of S-box. Let i t denote the 4-bit temporary variables, i =0, 1, 2, 3,4,5,6,7,8,9,10,12,13,14,15,16,18,19,20,21. The bit-slice implementation codes of the IIoTBC cipher S-box are shown in Algorithm2.…”
Section: Algebraic Cryptanalysismentioning
confidence: 99%
“…Sengupta et al reported the industrial IoT architecture, security issues, and types of attacks encountered in detail [7]. A variety of security protection schemes for the industrial IoT have been proposed [8][9][10][11]. Protecting data in transit is necessary, and many attacks more often target terminal devices.…”
Section: Introductionmentioning
confidence: 99%