{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:08:43Z","timestamp":1730232523740,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92067109,61873119,62211530106"],"award-info":[{"award-number":["92067109,61873119,62211530106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,14]]},"DOI":"10.1109\/iccae59995.2024.10569963","type":"proceedings-article","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T17:28:54Z","timestamp":1719854934000},"page":"187-192","source":"Crossref","is-referenced-by-count":0,"title":["A Reinforcement Adversarial Framework Targeting Endogenous Functional Safety in ICS: Applied to Tennessee Eastman Process"],"prefix":"10.1109","author":[{"given":"Xinyi","family":"Wu","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China"}]},{"given":"Yulong","family":"Ding","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science and Engineering,Shenzhen,China"}]},{"given":"Shuang-Hua","family":"Yang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, University of Reading Berkshire,Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Department of Computer Science,UK"}]}],"member":"263","reference":[{"volume-title":"Functional safety of electrical\/electronic\/programmable electronic safety-related systems","year":"1998","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.05.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2021-0272"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1051\/sands\/2023001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1051\/sands\/2023004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0035-0_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSR.2019.8835462"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/itsc.2017.8317839"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4271\/07-11-01-0003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102365"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/0278364920987859"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9811698"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-042920-020211"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3018142"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2018.8514971"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2022.3148236"},{"key":"ref17","first-page":"1","author":"Schulman","year":"2017","journal-title":"Proximal Policy Optimization Algorithms"},{"key":"ref18","first-page":"1386","article-title":"Improving stochastic policy gradients in continuous control with deep reinforcement learning using the beta distribution","volume-title":"34th Int. Conf. Mach. Learn. ICML 2017","volume":"2","author":"Chou","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.08.199"},{"volume-title":"Tennessee Eastman challenge archive","year":"2015","author":"Ricker","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101053"},{"key":"ref23","first-page":"1","author":"Brockman","year":"2016","journal-title":"OpenAI Gym"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(94)00043-N"}],"event":{"name":"2024 16th International Conference on Computer and Automation Engineering (ICCAE)","start":{"date-parts":[[2024,3,14]]},"location":"Melbourne, Australia","end":{"date-parts":[[2024,3,16]]}},"container-title":["2024 16th International Conference on Computer and Automation Engineering (ICCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10569140\/10569143\/10569963.pdf?arnumber=10569963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T04:44:52Z","timestamp":1719895492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10569963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccae59995.2024.10569963","relation":{},"subject":[],"published":{"date-parts":[[2024,3,14]]}}}