{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:43:42Z","timestamp":1763192622431,"version":"3.45.0"},"reference-count":100,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11229347","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Intelligence for Critical Infrastructure Systems: Past, Present and Future"],"prefix":"10.1109","author":[{"given":"Nelishia","family":"Pillay","sequence":"first","affiliation":[{"name":"University of Pretoria,Department of Computer Science,Pretoria,South Africa"}]},{"given":"Thambo","family":"Nyathi","sequence":"additional","affiliation":[{"name":"University of Pretoria,Department of Computer Science,Pretoria,South Africa"}]},{"given":"Ganesh Kumar","family":"Venayagamoorthy","sequence":"additional","affiliation":[{"name":"Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"}]}],"member":"263","reference":[{"key":"ref1","first-page":"100646","article-title":"Machine learning applications in the resilience of interdependent critical infrastructure systems\u2014a systematic literature review","volume-title":"International Journal of Critical Infrastructure Protection","volume":"44","author":"Alkhaleel","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPENG.2010.46"},{"key":"ref3","first-page":"53","article-title":"Critical infrastructure protection: Requirements and challenges for the 21st century","volume-title":"International Journal of Critical Infrastructure Protection","volume":"8","author":"Alcaraz","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/15732479.2024.2312267"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316534298"},{"issue":"7","key":"ref7","first-page":"1159","article-title":"Telecommunications reform, internet use and mobile phone adoption in the developing world","volume-title":"World Development","volume":"37","author":"Howard","year":"2009"},{"volume-title":"Data networks","year":"1992","author":"Bertsekas","key":"ref8"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/B978-0-12-374826-3.00003-5","article-title":"Chapter 3 - architecture overview","volume-title":"SAE and the Evolved Packet Core","author":"Olsson","year":"2010"},{"key":"ref10","first-page":"100961","article-title":"Cognitive d2d communication: A comprehensive survey, research challenges, and future directions","volume-title":"Internet of Things","volume":"24","author":"Iqbal","year":"2023"},{"key":"ref11","first-page":"105472","article-title":"A review of the use of artificial intelligence methods in infrastructure systems","volume-title":"Engineering Applications of Artificial Intelligence","volume":"116","author":"McMillan","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300181"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2514358"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.proeng.2017.04.413","article-title":"Assessment of critical infrastructure elements in transport","volume":"187","author":"Dvo\u0159\u00e1k","year":"2017","journal-title":"Procedia Engineering"},{"key":"ref15","first-page":"101762","article-title":"Artificial intelligence in agriculture: Advancing crop productivity and sustainability","volume-title":"Journal of Agriculture and Food Research","volume":"20","author":"Aijaz","year":"2025"},{"article-title":"Critical infrastructure security in the healthcare sector","year":"2021","author":"Jayasinghe","key":"ref16"},{"key":"ref17","article-title":"Artificial intelligence-enabled self-healing infrastructure systems","volume-title":"Ph.D. dissertation","author":"McMillan","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/37.969131"},{"key":"ref19","first-page":"102316","article-title":"Critical review of the threats affecting the building of critical infrastructure resilience","volume-title":"International Journal of Disaster Risk Reduction","volume":"60","author":"Osei-Kyei","year":"2021"},{"key":"ref20","article-title":"Modeling remaining service life and structural health monitoring of roads with machine learning and deep learning","author":"Mudabbir","year":"2025","journal-title":"EasyChair Preprint 15645, EasyChair"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2015.2471235"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2022.114772"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020857"},{"key":"ref24","article-title":"Shift-invariant pattern recognition neural network and its optical architecture","volume-title":"Proceedings of annual conference of the Japan Society of Applied Physics","volume":"564","author":"Zhang"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2013.11.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2216900"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-008-5077-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.32614\/cran.package.randomforest"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1482"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175355"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0123-9_54"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2033566"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3369407"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/AFSAT"},{"volume-title":"Pattern classification and scene analysis","year":"1973","author":"Duda","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0459-6_5"},{"issue":"2","key":"ref39","first-page":"3","article-title":"The optimality of naive bayes","volume":"1","author":"Zhang","year":"2004","journal-title":"Aa"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2017.08.040"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2054080"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.040310.00002"},{"key":"ref46","first-page":"101017","article-title":"Artificial intelligence and machine learning in energy systems: A bibliographic perspective","volume-title":"Energy Strategy Reviews","volume":"45","author":"Entezari","year":"2023"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3141772"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3042812"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3332662"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/app14083422"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3475011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/en15124438"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2174068"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2237793"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2011.941588"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.896686"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.47672\/ajce.1487"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ENERGY.2008.4781051"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-11093-7"},{"issue":"4","key":"ref60","article-title":"Artificial intelligence in healthcare: past, present and future","volume-title":"Stroke and Vascular Neurology","volume":"2","author":"Jiang","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-022-09845-1"},{"key":"ref62","first-page":"105899","article-title":"Smart farming using artificial intelligence: A review","volume-title":"Engineering Applications of Artificial Intelligence","volume":"120","author":"Akkem","year":"2023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSAAI59313.2023.10452576"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-90055-7"},{"key":"ref65","first-page":"101025","article-title":"Artificial intelligence applications for fault detection and diagnosis in pharmaceutical bioprocesses: a review","volume-title":"Current Opinion in Chemical Engineering","volume":"44","author":"Aghaee","year":"2024"},{"key":"ref66","first-page":"112063","article-title":"Artificial intelligence enhanced fault prediction with industrial incomplete information","volume-title":"Mechanical Systems and Signal Processing","volume":"224","author":"Shao","year":"2025"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/BalkanCom61808.2024.10557207"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2018.8679079"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WSCE56210.2022.9916037"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3488290"},{"key":"ref71","first-page":"107655","article-title":"Pspl: A ponzi scheme smart contracts detection approach via compressed sensing oversampling-based peephole lstm","volume-title":"Future Generation Computer Systems","volume":"166","author":"Wang","year":"2025"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2739838"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT62155.2024.10677312"},{"volume-title":"Artificial intelligence prediction and counterterrorism","year":"2019","author":"McKendrick","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/JNIC58574.2023.10205749"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01625-5"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/icpr48806.2021.9412443"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314243"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2024.101829"},{"key":"ref80","first-page":"103988","article-title":"Adversarial machine learning in industry: A systematic literature review","volume-title":"Computers Security","volume":"145","author":"Jedrzejewski","year":"2024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1080\/10934529.2024.2309102"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-025-11732-2"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/SESAI61023.2024.10599403"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/RO-MAN60168.2024.10731222"},{"key":"ref85","first-page":"101805","article-title":"Explainable artificial intelligence (xai): What we know and what is left to attain trustworthy artificial intelligence","volume-title":"Information Fusion","volume":"99","author":"Ali","year":"2023"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2020.103655"},{"key":"ref87","first-page":"101081","article-title":"A convolutional neural network-based surrogate model for multi-objective optimization evolutionary algorithm based on decomposition","volume-title":"Swarm and Evolutionary Computation","volume":"72","author":"Zhang","year":"2022"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00929-w"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2012.16"},{"issue":"12","key":"ref90","article-title":"Re-thinking data strategy and integration for artificial intelligence: Concepts, opportunities, and challenges","volume-title":"Applied Sciences","volume":"13","author":"Aldoseri","year":"2023"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-20016-1"},{"key":"ref92","first-page":"109409","article-title":"A systematic review of trustworthy artificial intelligence applications in natural disasters","volume-title":"Computers and Electrical Engineering","volume":"118","author":"Albahri","year":"2024"},{"key":"ref93","first-page":"112067","article-title":"Deep artificial intelligence applications for natural disaster management systems: A methodological review","volume-title":"Ecological Indicators","volume":"163","author":"Akhyar","year":"2024"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3336811"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2023.100063"},{"key":"ref96","first-page":"101804","article-title":"Artificial intelligence for cybersecurity: Literature review and future research directions","volume-title":"Information Fusion","volume":"97","author":"Kaur","year":"2023"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.55066\/proc-icec.2022.37"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3390\/w15223919"},{"issue":"3","key":"ref99","first-page":"1","article-title":"Protecting critical infrastructure against cascading effects: The precinct approach","volume-title":"Resilient Cities and Structures","volume":"3","author":"Gordan","year":"2024"},{"article-title":"A systematic review of application of artificial intelligence in critical infrastructure network resilience","year":"2023","author":"Kabasi","key":"ref100"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11229347.pdf?arnumber=11229347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:40:40Z","timestamp":1763192440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11229347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11229347","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}