{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:47:51Z","timestamp":1776358071643,"version":"3.51.2"},"reference-count":28,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066736","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:03:06Z","timestamp":1758700986000},"page":"5237-5262","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Autonomous Cyber-Physical System for Anomaly Detection and Attack Prevention Using Transformer-Based Attention Generative Adversarial Residual Network"],"prefix":"10.32604","volume":"85","author":[{"given":"Abrar M.","family":"Alajlan","sequence":"first","affiliation":[]},{"given":"Marwah M.","family":"Almasri","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1430740","DOI":"10.3389\/frobt.2024.1430740","article-title":"Distributed intelligence in industrial and automotive cyber\u2013physical systems: a review","volume":"11","author":"Piperigkos","year":"2024","journal-title":"Front Rob AI"},{"key":"ref2","series-title":"International Symposium on Cyber Security Cryptography and Machine Learning","first-page":"86","article-title":"Robust multivariate anomaly-based intrusion detection system for cyber-physical systems","author":"Dutta","year":"2021 Jul"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1007\/s11571-022-09780-8","article-title":"Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment","volume":"16","author":"Alohali","year":"2022","journal-title":"Cogn Neurodyn"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"100843","DOI":"10.1016\/j.iot.2023.100843","article-title":"An intelligent context-aware threat detection and response model for smart cyber-physical systems","volume":"23","author":"Noor","year":"2023","journal-title":"Internet Things"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"100674","DOI":"10.1016\/j.ijcip.2024.100674","article-title":"ResNet50-1D-CNN: a new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems","volume":"45","author":"Saheed","year":"2024","journal-title":"Int J Crit Infrastruct Prot"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3390\/jcp3030025","article-title":"Autonomous vehicles: sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions","volume":"3","author":"Giannaros","year":"2023","journal-title":"J Cybersecur Priv"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"103118","DOI":"10.1016\/j.sysarc.2024.103118","article-title":"A model-based approach for self-adaptive security in CPS: application to smart grids","volume":"150","author":"Chehida","year":"2024","journal-title":"J Syst Archit"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/IOTM.001.2300109","article-title":"Intrusion detection systems in automotive ethernet networks: challenges, opportunities and future research trends","volume":"7","author":"Quadar","year":"2024","journal-title":"IEEE Internet Things Mag"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/JIOT.2024.3486659","article-title":"NG-ICPS: next generation industrial-CPS, security threats in the era of artificial intelligence, open challenges with future research directions","volume":"12","author":"Adil","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TICPS.2023.3323600","article-title":"A survey and perspective on Industrial Cyber-Physical Systems (ICPS): from ICPS to AI-augmented ICPS","volume":"1","author":"Chae","year":"2023","journal-title":"IEEE Trans Ind Cyb-Phy Syst"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1109\/TCE.2025.3576383","article-title":"Integrating embedded cyber-physical systems in smart energy for AI-enhanced real-time crowd monitoring and threat detection","author":"Hu","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"62268","DOI":"10.1109\/ACCESS.2024.3393909","article-title":"Deep learning model for driver behavior detection in cyber-physical system-based intelligent transport systems","volume":"12","author":"Gupta","year":"2024","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"21026","DOI":"10.1109\/ACCESS.2024.3361837","article-title":"CNN-CLFA: support mobile edge computing in transportation cyber physical system","volume":"12","author":"Bhansali","year":"2024","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"4086","DOI":"10.3390\/s23084086","article-title":"Cyber attack detection for self-driving vehicle networks using deep autoencoder algorithms","volume":"23","author":"Alsaade","year":"2023","journal-title":"Sensors"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TCE.2023.3325827","article-title":"Transforming transportation: safe and secure vehicular communication and anomaly detection with intelligent cyber\u2013physical system and deep learning","volume":"70","author":"AlEisa","year":"2023","journal-title":"IEEE Trans Consum Electron"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3545","DOI":"10.1109\/TCAD.2023.3264786","article-title":"AIoTML: a unified modeling language for AIoT-based cyber\u2013physical systems","volume":"42","author":"Hu","year":"2023","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1186\/s13677-023-00564-x","article-title":"Security strategy for autonomous vehicle cyber-physical systems using transfer learning","volume":"12","author":"Alsulami","year":"2023","journal-title":"J Cloud Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"6624","DOI":"10.1109\/TII.2022.3206354","article-title":"Cyber-physical system-based path tracking control of autonomous vehicles under cyber-attacks","volume":"19","author":"Guo","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2908","DOI":"10.3390\/electronics12132908","article-title":"Intelligent embedded systems platform for vehicular cyber-physical systems","volume":"12","author":"Conrad","year":"2023","journal-title":"Electronics"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5567","DOI":"10.1109\/TIFS.2023.3309160","article-title":"AST-SafeSec: adaptive stress testing for safety and security co-analysis of cyber-physical systems","volume":"18","author":"Kaloudi","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.comcom.2022.02.022","article-title":"IADF-CPS: intelligent anomaly detection framework towards cyber physical systems","volume":"188","author":"Nagarajan","year":"2022","journal-title":"Comput Commun"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"102914","DOI":"10.1016\/j.ipm.2022.102914","article-title":"SecureCPS: cognitive inspired framework for detection of cyber attacks in cyber\u2013physical systems","volume":"59","author":"Makkar","year":"2022","journal-title":"Inf Process Manag"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.comcom.2022.09.007","article-title":"Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection","volume":"195","author":"Ramana TV, Thirunavukkarasan","year":"2022","journal-title":"Comput Commun"},{"key":"ref24","series-title":"2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS); 2021 May 18\u201321; Nashville, TN, USA: IEEE","first-page":"237","article-title":"Real-time adaptive sensor attack detection in autonomous cyber-physical systems","author":"Akowuah"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"111044","DOI":"10.1016\/j.enbuild.2021.111044","article-title":"A semi-supervised approach to fault detection and diagnosis for building HVAC systems based on the modified generative adversarial network","volume":"246","author":"Li","year":"2021","journal-title":"Energy Build"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"113490","DOI":"10.1016\/j.lwt.2022.113490","article-title":"Two dimensional correlation spectroscopy combined with ResNet: efficient method to identify bolete species compared to traditional machine learning","volume":"162","author":"Yan","year":"2022","journal-title":"LWT"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"2024","journal-title":"Digit Commun Netw"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"82376","DOI":"10.1109\/ACCESS.2022.3195907","article-title":"Adopting attention and cross-layer features for fine-grained representation","volume":"10","author":"Ngo","year":"2022","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_66736\/TSP_CMC_66736.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:27:25Z","timestamp":1763346445000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066736","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}