Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.
视野测试是识别白内障、青光眼和视网膜疾病等眼部疾病的重要诊断工具。其快速、直接的测试过程已成为我们防盲工作的重要组成部分。不过,该设备必须能够为普通大众所使用。这项研究开发了一种机器学习模型,可与智能手机等边缘设备配合使用。因此,它为将疾病检测模型集成到多个 Edge 设备中实现自动化操作提供了机会。作者打算利用卷积神经网络(CNN)和深度学习来推断出哪种优化器在从眼睛的实时照片中检测白内障时效果最好。这是通过比较不同的模型和优化器来实现的。利用这些方法,可以获得检测白内障的可靠模型。在本研究中,通过结合 CNN 层和亚当构建的 TensorFlow Lite 模型被称为优化轻量级序列深度学习模型(SDLM)。SDLM 使用较少的 CNN 层数和参数进行训练,因此具有兼容性强、执行时间快、内存需求低等特点。拟议的安卓应用程序 I-Scan 使用 TensorFlow Lite 形式的 SDLM,以便在 Edge 设备中演示该模型。
{"title":"Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique","authors":"Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain","doi":"10.1049/cps2.12083","DOIUrl":"10.1049/cps2.12083","url":null,"abstract":"<p>Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"269-281"},"PeriodicalIF":0.8,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.
{"title":"Real-time implementation for vulnerability of power components under switching attack based on sliding mode","authors":"Seema Yadav, Nand Kishor, Shubhi Purwar, Saikat Chakrabarti, Petra Raussi, Avinash Kumar","doi":"10.1049/cps2.12084","DOIUrl":"10.1049/cps2.12084","url":null,"abstract":"<p>In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"375-391"},"PeriodicalIF":0.8,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Pablo Naranjo Cuéllar, Gustavo Ramos López, Luis Felipe Giraldo Trujillo
Given the short time intervals in which short-circuit faults occur in a power system, a certain time delay between the moment of a fault's inception in the system to the moment in which the fault is actually detected is introduced. In this small time margin, the high amplitudes of the fault current can deal significant damage to the power system. A technique to characterise different types of short circuit faults in a power system for real-time detection, namely AB, BC, CA, ABC, AG, BG and CG faults (and normal operation), is presented based on the geometry of the curve generated by the Clarke transform of the three-phase voltages of the power system. The process was conducted in real time using the HIL402 system and a Raspberry Pi 3, and all programming done in the Python programming language. It was concluded that the tested types of faults can be accurately characterised using the eigenvalues and eigenvectors of the matrix that characterises an ellipse associated with each fault: eigenvalues can be used to determine the fault inception distance and eigenvectors can be used to determine the type of fault that occurred. Next, the design of a machine learning model was done based on the previously mentioned characterisation technique. The model was embedded into a Raspberry Pi 3, thus enabling fault detection and classification in a base power system in real time. Finally, the accuracy of the model was tested under different measurement conditions, yielding satisfactory results for a selected set of conditions and overcoming the shortcomings presented in the current research, which do not perform detection and classification in real time.
由于电力系统中发生短路故障的时间间隔很短,因此从系统发生故障到实际检测到故障之间会有一定的时间延迟。在这一小段时间内,故障电流的高幅值会对电力系统造成重大损害。根据电力系统三相电压的克拉克变换所产生的曲线的几何形状,提出了一种用于实时检测电力系统中不同类型短路故障(即 AB、BC、CA、ABC、AG、BG 和 CG 故障以及正常运行)的技术。该过程使用 HIL402 系统和 Raspberry Pi 3 实时进行,所有编程均使用 Python 编程语言。得出的结论是,利用描述与每个故障相关的椭圆的矩阵的特征值和特征向量,可以准确地描述所测试的故障类型:特征值可用于确定故障发生距离,特征向量可用于确定发生的故障类型。接下来,根据前面提到的特征描述技术设计了一个机器学习模型。该模型被嵌入到 Raspberry Pi 3 中,从而实现了对基地电力系统的实时故障检测和分类。最后,在不同的测量条件下对模型的准确性进行了测试,在一组选定的条件下取得了令人满意的结果,克服了当前研究中无法进行实时检测和分类的缺点。
{"title":"Learning the geometry of short-circuit faults in power systems for real-time fault detection and classification","authors":"Juan Pablo Naranjo Cuéllar, Gustavo Ramos López, Luis Felipe Giraldo Trujillo","doi":"10.1049/cps2.12074","DOIUrl":"https://doi.org/10.1049/cps2.12074","url":null,"abstract":"<p>Given the short time intervals in which short-circuit faults occur in a power system, a certain time delay between the moment of a fault's inception in the system to the moment in which the fault is actually detected is introduced. In this small time margin, the high amplitudes of the fault current can deal significant damage to the power system. A technique to characterise different types of short circuit faults in a power system for real-time detection, namely AB, BC, CA, ABC, AG, BG and CG faults (and normal operation), is presented based on the geometry of the curve generated by the Clarke transform of the three-phase voltages of the power system. The process was conducted in real time using the <i>HIL402</i> system and a Raspberry Pi 3, and all programming done in the Python programming language. It was concluded that the tested types of faults can be accurately characterised using the eigenvalues and eigenvectors of the matrix that characterises an ellipse associated with each fault: eigenvalues can be used to determine the fault inception distance and eigenvectors can be used to determine the type of fault that occurred. Next, the design of a machine learning model was done based on the previously mentioned characterisation technique. The model was embedded into a Raspberry Pi 3, thus enabling fault detection and classification in a base power system in real time. Finally, the accuracy of the model was tested under different measurement conditions, yielding satisfactory results for a selected set of conditions and overcoming the shortcomings presented in the current research, which do not perform detection and classification in real time.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"289-306"},"PeriodicalIF":1.5,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138578065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pathmanathan Naidoo, Maria Cristina Tavares, Junwei Cao, Yi Ding, Haochen Hua
<p>Modern power systems are facing a growing integration of distributed energy resources (DERs), mainly driven by energy transition, decarbonisation and economic benefits. The deployment of Internet of Things devices transforms the conventional power system into a digitised, cyber, intelligent one, which plays a significant role in grid control and operation and enables numerous smart-grid applications.</p><p>The stochastic nature of distributed renewable power generation poses challenges for a power systems operation, while coordinating the dispatch and control of various DERs to reduce operating costs and carbon emissions is essential to improve energy utilisation efficiency. Also, the large-scale connection of DERs increases the complexity of distribution networks, which require more advanced and efficient approaches for system analysis, fault diagnosis and operational optimisation. In this sense, smart monitoring and control systems can also be applied to transmission power networks, enhancing safety and robustness.</p><p>Energy internet technology has laid a solid foundation for data-driven analysis, allowing power systems to enter a ‘data-intensive’ era. Currently, huge amounts of data from various sources have been a driving force, enabling big data analytics and artificial intelligence on smart-grid applications, such as planning, operation, energy management, trading, system reliability and resiliency enhancement, system identification and monitoring, fault intelligent perception and diagnosis, and cyber and physical security.</p><p>This Special Issue publishes state-of-the-art works related to all aspects of theories and methodologies in optimisation, control and AI technology for digital and low-carbon power systems.</p><p>The stochastic nature of distributed renewable generation makes the operation of power systems face the challenge of uncertainty. Thereby, it is of great significance to monitor and identify the real-time state of the new power system. The paper, ‘The real-time state identification of the electricity-heat system based on borderline-SMOTE and XGBoost’ by X. Pei et al., proposes a state identification method based on multi-class data equalisation and extreme gradient boost for systems. The optimal hyperparameters of the model are obtained based on the K-fold cross-validation and grid search.</p><p>Reducing carbon emissions is one of the goals of modern power systems operation. Power generation by natural gas, compared with that by coal, has the characteristics of cleanness, efficiency and low carbon. This makes gas-fired power plants popular for undertaking peak regulation tasks in the power systems. The paper, ‘Key problems of gas-fired power plants participating in peak load regulation: a review’ by G. Wang et al., reviews the key problems faced by gas-fired power plants participating in peak load regulation. This paper provides suggestions for the coordinated development of electricity and carbon market in the futur
在能源转型、去碳化和经济效益的推动下,现代电力系统正面临着分布式能源资源(DER)的日益整合。分布式可再生能源发电的随机性给电力系统的运行带来了挑战,而协调各种 DER 的调度和控制以降低运营成本和碳排放对提高能源利用效率至关重要。此外,DER 的大规模连接也增加了配电网络的复杂性,这就需要更先进、更高效的系统分析、故障诊断和运行优化方法。能源互联网技术为数据驱动分析奠定了坚实的基础,使电力系统进入了 "数据密集型 "时代。目前,各种来源的海量数据已成为推动大数据分析和人工智能在智能电网应用的动力,如规划、运行、能源管理、交易、系统可靠性和弹性增强、系统识别和监控、故障智能感知和诊断、网络和物理安全等。本特刊发表了与数字和低碳电力系统的优化、控制和人工智能技术的理论和方法论有关的各方面的最新成果。分布式可再生能源发电的随机性使电力系统的运行面临着不确定性的挑战,因此监测和识别新电力系统的实时状态具有重要意义。X. Pei 等人撰写的论文《基于边界线-SMOTE 和 XGBoost 的电热系统实时状态识别》提出了一种基于多类数据均衡和极端梯度提升的系统状态识别方法。减少碳排放是现代电力系统运行的目标之一。与燃煤发电相比,天然气发电具有清洁、高效、低碳的特点。与燃煤发电相比,天然气发电具有清洁、高效、低碳的特点,这使得天然气发电厂在电力系统中承担调峰任务时备受青睐。G. Wang 等人撰写的论文《参与调峰的燃气电厂面临的主要问题综述》对参与调峰的燃气电厂面临的主要问题进行了综述。为了实现电力系统的低碳运行,提高能源的利用率,必须满足电力系统高精度时间同步的要求。L. Teng 等人撰写的论文《电力系统多参考源加权合成高精度同步输出技术研究》提出了一种多参考源加权改进噪声模型和高精度输出方法。在确保电力系统低碳运行的同时,确保系统安全运行,即不被数据攻击也是至关重要的。M. Higgins 等人在论文《利用分层特征聚类和激励加权异常检测检测智能电表虚假数据攻击》中,概述了一种检测工业负荷智能电表攻击的方法。本文研究了如何通过聚类和激励加权检测方法改进智能数据中的企业欺诈检测。模拟结果表明,该模型的检测率令人满意。论文指出,该模型将为当代电力系统提供有用的 "未来证明"。建设微电网是实现电力系统低碳运行的重要途径之一。目前研究的微电网伴随着网络安全风险的大幅提升。为解决这一问题,Y. Wang 等人在论文《通过 SCADA 数据在光伏系统中进行自监督预训练》中提出了一种基于有功功率输出的虚假数据注入攻击检测和报警方法。
{"title":"Guest Editorial: Optimisation, control and AI technology for digital and low-carbon power systems","authors":"Pathmanathan Naidoo, Maria Cristina Tavares, Junwei Cao, Yi Ding, Haochen Hua","doi":"10.1049/cps2.12082","DOIUrl":"https://doi.org/10.1049/cps2.12082","url":null,"abstract":"<p>Modern power systems are facing a growing integration of distributed energy resources (DERs), mainly driven by energy transition, decarbonisation and economic benefits. The deployment of Internet of Things devices transforms the conventional power system into a digitised, cyber, intelligent one, which plays a significant role in grid control and operation and enables numerous smart-grid applications.</p><p>The stochastic nature of distributed renewable power generation poses challenges for a power systems operation, while coordinating the dispatch and control of various DERs to reduce operating costs and carbon emissions is essential to improve energy utilisation efficiency. Also, the large-scale connection of DERs increases the complexity of distribution networks, which require more advanced and efficient approaches for system analysis, fault diagnosis and operational optimisation. In this sense, smart monitoring and control systems can also be applied to transmission power networks, enhancing safety and robustness.</p><p>Energy internet technology has laid a solid foundation for data-driven analysis, allowing power systems to enter a ‘data-intensive’ era. Currently, huge amounts of data from various sources have been a driving force, enabling big data analytics and artificial intelligence on smart-grid applications, such as planning, operation, energy management, trading, system reliability and resiliency enhancement, system identification and monitoring, fault intelligent perception and diagnosis, and cyber and physical security.</p><p>This Special Issue publishes state-of-the-art works related to all aspects of theories and methodologies in optimisation, control and AI technology for digital and low-carbon power systems.</p><p>The stochastic nature of distributed renewable generation makes the operation of power systems face the challenge of uncertainty. Thereby, it is of great significance to monitor and identify the real-time state of the new power system. The paper, ‘The real-time state identification of the electricity-heat system based on borderline-SMOTE and XGBoost’ by X. Pei et al., proposes a state identification method based on multi-class data equalisation and extreme gradient boost for systems. The optimal hyperparameters of the model are obtained based on the K-fold cross-validation and grid search.</p><p>Reducing carbon emissions is one of the goals of modern power systems operation. Power generation by natural gas, compared with that by coal, has the characteristics of cleanness, efficiency and low carbon. This makes gas-fired power plants popular for undertaking peak regulation tasks in the power systems. The paper, ‘Key problems of gas-fired power plants participating in peak load regulation: a review’ by G. Wang et al., reviews the key problems faced by gas-fired power plants participating in peak load regulation. This paper provides suggestions for the coordinated development of electricity and carbon market in the futur","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"219-221"},"PeriodicalIF":1.5,"publicationDate":"2023-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138578182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bijan Nasiri, Farhad Bayat, MohammadAli Mohammadkhani, Andrzej Bartoszewicz
A predictive queue management method is proposed for constrained congestion control in internet routers in the face of communication delays. The proposed method uses the queue and router models, input traffic rate, and queue length to precisely characterise the entire process. The model that has been built is then used to construct an optimal constrained active queue management (CAQM) strategy using the model predictive control method. Important factors, such as link capacity, Transmission Control Protocol (TCP) sessions, round-trip time, and a few others, have been selected and used to linearise the interconnection of TCP. Then, an efficient MPC-based structure to manage the CAQM in the face of unknown disturbances is designed. Simulations are used to validate the proposed method's effectiveness and robustness.
{"title":"Optimal congestion management in network routers subject to constraints, disturbances, and noise using the model predictive control approach","authors":"Bijan Nasiri, Farhad Bayat, MohammadAli Mohammadkhani, Andrzej Bartoszewicz","doi":"10.1049/cps2.12081","DOIUrl":"10.1049/cps2.12081","url":null,"abstract":"<p>A predictive queue management method is proposed for constrained congestion control in internet routers in the face of communication delays. The proposed method uses the queue and router models, input traffic rate, and queue length to precisely characterise the entire process. The model that has been built is then used to construct an optimal constrained active queue management (CAQM) strategy using the model predictive control method. Important factors, such as link capacity, Transmission Control Protocol (TCP) sessions, round-trip time, and a few others, have been selected and used to linearise the interconnection of TCP. Then, an efficient MPC-based structure to manage the CAQM in the face of unknown disturbances is designed. Simulations are used to validate the proposed method's effectiveness and robustness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"258-268"},"PeriodicalIF":0.8,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.
{"title":"Multiple dependence representation of attention graph convolutional network relation extraction model","authors":"Zhao Liangfu, Xiong Yujie, Gao Yongbin, Yu Wenjun","doi":"10.1049/cps2.12080","DOIUrl":"10.1049/cps2.12080","url":null,"abstract":"<p>Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"247-257"},"PeriodicalIF":0.8,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135590945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian
Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold T for performing selective attacks in the environment Env is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold T are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.
最近的研究表明,深度强化学习(DRL)很容易受到对抗性攻击,因此通过对抗性攻击技术利用DRL系统中的漏洞已成为构建稳健的DRL系统的必要前提。与传统的深度学习系统相比,DRL 系统的特点是长序列决策而非一步决策,因此攻击者必须对其实施多步骤攻击。要成功攻击 DRL 系统,必须尽量减少攻击次数,以避免被受害代理检测到,并确保攻击的有效性。近期研究中提出的一些选择性攻击方法,即在部分时间步骤攻击一个代理,虽然可以避免被受害代理检测到,但不适用于实时攻击场景。本文提出了一种适用于离散行动空间环境的实时选择性攻击方法。首先,确定在环境 Env 中进行选择性攻击的最佳攻击阈值 T。然后,根据该阈值,将多个外延中受害代理的行动偏好函数值超过阈值 T 时对应的观测状态添加到训练集中。最后,根据该训练集生成通用扰动,并利用它对受害代理进行实时选择性攻击。对比实验表明,我们的攻击方法可以在保持攻击效果和隐蔽性的同时进行实时攻击。
{"title":"Selective real-time adversarial perturbations against deep reinforcement learning agents","authors":"Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian","doi":"10.1049/cps2.12065","DOIUrl":"10.1049/cps2.12065","url":null,"abstract":"<p>Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold <i>T</i> for performing selective attacks in the environment <i>Env</i> is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold <i>T</i> are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"41-49"},"PeriodicalIF":0.8,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo
Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.
{"title":"Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images","authors":"Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo","doi":"10.1049/cps2.12076","DOIUrl":"10.1049/cps2.12076","url":null,"abstract":"<p>Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"218-227"},"PeriodicalIF":0.8,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136375950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.
{"title":"Detecting covert channel attacks on cyber-physical systems","authors":"Hongwei Li, Danai Chasaki","doi":"10.1049/cps2.12078","DOIUrl":"10.1049/cps2.12078","url":null,"abstract":"<p>Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"228-237"},"PeriodicalIF":0.8,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136308695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.
{"title":"Feature selection algorithm for substation main equipment defect text mining based on natural language processing","authors":"Xiaoqing Mai, Tianhu Zhang, Changwu Hu, Yan Zhang","doi":"10.1049/cps2.12079","DOIUrl":"10.1049/cps2.12079","url":null,"abstract":"<p>The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"238-246"},"PeriodicalIF":0.8,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}