{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:01:51Z","timestamp":1770498111646,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Satellite of Excellence Programme Singapore"},{"name":"NRF","award":["NSoE_DeST-SCI2019-0004"],"award-info":[{"award-number":["NSoE_DeST-SCI2019-0004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3194089","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T19:34:06Z","timestamp":1658864046000},"page":"3378-3391","source":"Crossref","is-referenced-by-count":13,"title":["Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5510-8217","authenticated-orcid":false,"given":"Rajib Ranjan","family":"Maiti","sequence":"first","affiliation":[{"name":"Department of CSIS, BITS-Pilani, Secunderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3222-3754","authenticated-orcid":false,"given":"Cheah Huei","family":"Yoong","sequence":"additional","affiliation":[{"name":"EPD Pillar, SUTD, Singapore"}]},{"given":"Venkata Reddy","family":"Palleti","sequence":"additional","affiliation":[{"name":"Department of Chemical Engineering, Indian Institute of Petroleum and Energy, Visakhapatnam, Andhra Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5120-3914","authenticated-orcid":false,"given":"Arlindo","family":"Silva","sequence":"additional","affiliation":[{"name":"EPD Pillar, SUTD, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9376-2471","authenticated-orcid":false,"given":"Christopher M.","family":"Poskitt","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Cyber-attack against Ukrainian critical infrastructure","year":"2016"},{"key":"ref12","article-title":"Water treatment plant hacked, chemical mix changed for tap supplies","author":"leyden","year":"2016","journal-title":"The Register"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)EE.1943-7870.0001686"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"ref17","first-page":"3","article-title":"Anomaly detection for industrial control systems using sequence-to-sequence neural networks","author":"kim","year":"2019","journal-title":"Proc Int Workshop Secur Ind Control Syst Cyber-Phys Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00030"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref50","first-page":"88","article-title":"A dataset to support research in the design of secure water treatment systems","author":"goh","year":"2016","journal-title":"Proc Int Conf Crit Informat Infrastructures Secur"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100452"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3140241.3140248"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.21"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"ref49","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00069-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.08.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"},{"key":"ref4","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5942\/jawwa.2017.109.0021"},{"key":"ref6","article-title":"No need to know physics: Resilience of process-based model-free anomaly detection for industrial control systems","volume":"abs 2012 3586","author":"erba","year":"2020","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_10"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980921"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761722"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00093"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243751"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101935"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264893"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23142"},{"key":"ref32","first-page":"76:1","article-title":"A survey of physics-based attack detection in cyber-physical systems","volume":"51","author":"giraldo","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4108\/eai.15-10-2018.155856"},{"key":"ref1","first-page":"499","article-title":"Cyber-security incidents: A review cases in cyber-physical systems","volume":"9","author":"al-mhiqani","year":"2018","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391486"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397376"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134640"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref22","first-page":"1298","article-title":"An unsupervised framework for anomaly detection in a water treatment system","author":"carrasco","year":"2019","journal-title":"Proc IEEE Int Conf Mach Learn Appl"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196532"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2017.12"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09841025.pdf?arnumber=9841025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:38:19Z","timestamp":1690915099000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9841025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3194089","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}