2022
DOI: 10.1016/j.knosys.2022.109743
|View full text |Cite
|
Sign up to set email alerts
|

TFDPM: Attack detection for cyber–physical systems with diffusion probabilistic models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Deep learning and machine learning techniques can extract patterns from large volumes of generated data at a speed that a human being cannot achieve. AI tools are much more suited than human operators to perform predic-Some AI technologies rely on human experts to establish a working hypothesis and to identify relevant features, but the fear of job elimination can drive human operators to be unwilling to share knowledge and provide expertise for [103,104], [115,116], [118,125], [127][128][129][130][131]133] [136-139] Future research efforts can shift focus away from process automation and toward applications that generate value with respect to analytical data insights and cognitive interaction.…”
Section: Process Automationmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning and machine learning techniques can extract patterns from large volumes of generated data at a speed that a human being cannot achieve. AI tools are much more suited than human operators to perform predic-Some AI technologies rely on human experts to establish a working hypothesis and to identify relevant features, but the fear of job elimination can drive human operators to be unwilling to share knowledge and provide expertise for [103,104], [115,116], [118,125], [127][128][129][130][131]133] [136-139] Future research efforts can shift focus away from process automation and toward applications that generate value with respect to analytical data insights and cognitive interaction.…”
Section: Process Automationmentioning
confidence: 99%
“…[ [63][64][65][66][67][68][69][70][71][72] [ [74][75][76][77][78][79][80][81], [84,87,88,90] [92,94], [95], [101][102][103][104][105][106]108] [116,117]…”
Section: Process Automationmentioning
confidence: 99%
“…Rasul et al [31] introduced the hidden variables in an RNN as a priori knowledge into the DDPM denoising process to achieve the task of forecasting time series data. Yan et al [32] proposed an improved DDPM for the detection task of cyber-physical system. Although DDPM has achieved good results in areas such as image denoising, it does not require high accuracy of the generated data.…”
Section: Introductionmentioning
confidence: 99%