Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (324)

Search Parameters:
Keywords = cyber-physical power systems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 2875 KiB  
Article
Sustainable THz SWIPT via RIS-Enabled Sensing and Adaptive Power Focusing: Toward Green 6G IoT
by Sunday Enahoro, Sunday Cookey Ekpo, Mfonobong Uko, Fanuel Elias, Rahul Unnikrishnan, Stephen Alabi and Nurudeen Kolawole Olasunkanmi
Sensors 2025, 25(15), 4549; https://doi.org/10.3390/s25154549 - 23 Jul 2025
Viewed by 329
Abstract
Terahertz (THz) communications and simultaneous wireless information and power transfer (SWIPT) hold the potential to energize battery-less Internet-of-Things (IoT) devices while enabling multi-gigabit data transmission. However, severe path loss, blockages, and rectifier nonlinearity significantly hinder both throughput and harvested energy. Additionally, high-power THz [...] Read more.
Terahertz (THz) communications and simultaneous wireless information and power transfer (SWIPT) hold the potential to energize battery-less Internet-of-Things (IoT) devices while enabling multi-gigabit data transmission. However, severe path loss, blockages, and rectifier nonlinearity significantly hinder both throughput and harvested energy. Additionally, high-power THz beams pose safety concerns by potentially exceeding specific absorption rate (SAR) limits. We propose a sensing-adaptive power-focusing (APF) framework in which a reconfigurable intelligent surface (RIS) embeds low-rate THz sensors. Real-time backscatter measurements construct a spatial map used for the joint optimisation of (i) RIS phase configurations, (ii) multi-tone SWIPT waveforms, and (iii) nonlinear power-splitting ratios. A weighted MMSE inner loop maximizes the data rate, while an outer alternating optimisation applies semidefinite relaxation to enforce passive-element constraints and SAR compliance. Full-stack simulations at 0.3 THz with 20 GHz bandwidth and up to 256 RIS elements show that APF (i) improves the rate–energy Pareto frontier by 30–75% over recent adaptive baselines; (ii) achieves a 150% gain in harvested energy and a 440 Mbps peak per-user rate; (iii) reduces energy-efficiency variance by half while maintaining a Jain fairness index of 0.999;; and (iv) caps SAR at 1.6 W/kg, which is 20% below the IEEE C95.1 safety threshold. The algorithm converges in seven iterations and executes within <3 ms on a Cortex-A78 processor, ensuring compliance with real-time 6G control budgets. The proposed architecture supports sustainable THz-powered networks for smart factories, digital-twin logistics, wire-free extended reality (XR), and low-maintenance structural health monitors, combining high-capacity communication, safe wireless power transfer, and carbon-aware operation for future 6G cyber–physical systems. Full article
Show Figures

Figure 1

33 pages, 112557 KiB  
Article
Enhanced Tumor Diagnostics via Cyber-Physical Workflow: Integrating Morphology, Morphometry, and Genomic MultimodalData Analysis and Visualization in Digital Pathology
by Marianna Dimitrova Kucarov, Niklolett Szakállas, Béla Molnár and Miklos Kozlovszky
Sensors 2025, 25(14), 4465; https://doi.org/10.3390/s25144465 - 17 Jul 2025
Viewed by 347
Abstract
The rapid advancement of genomic technologies has significantly transformed biomedical research and clinical applications, particularly in oncology. Identifying patient-specific genetic mutations has become a crucial tool for early cancer detection and personalized treatment strategies. Detecting tumors at the earliest possible stage provides critical [...] Read more.
The rapid advancement of genomic technologies has significantly transformed biomedical research and clinical applications, particularly in oncology. Identifying patient-specific genetic mutations has become a crucial tool for early cancer detection and personalized treatment strategies. Detecting tumors at the earliest possible stage provides critical insights beyond traditional tissue analysis. This paper presents a novel cyber-physical system that combines high-resolution tissue scanning, laser microdissection, next-generation sequencing, and genomic analysis to offer a comprehensive solution for early cancer detection. We describe the methodologies for scanning tissue samples, image processing of the morphology of single cells, quantifying morphometric parameters, and generating and analyzing real-time genomic metadata. Additionally, the intelligent system integrates data from open-access genomic databases for gene-specific molecular pathways and drug targets. The developed platform also includes powerful visualization tools, such as colon-specific gene filtering and heatmap generation, to provide detailed insights into genomic heterogeneity and tumor foci. The integration and visualization of multimodal single-cell genomic metadata alongside tissue morphology and morphometry offer a promising approach to precision oncology. Full article
Show Figures

Figure 1

19 pages, 2632 KiB  
Article
Data-Driven Attack Detection Mechanism Against False Data Injection Attacks in DC Microgrids Using CNN-LSTM-Attention
by Chunxiu Li, Xinyu Wang, Xiaotao Chen, Aiming Han and Xingye Zhang
Symmetry 2025, 17(7), 1140; https://doi.org/10.3390/sym17071140 - 16 Jul 2025
Viewed by 240
Abstract
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant [...] Read more.
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant cybersecurity vulnerabilities. Notably, FDI attacks can effectively bypass conventional Chi-square detector-based protection mechanisms through malicious manipulation of communication layer data. To address this critical security challenge, we propose a hybrid deep learning framework that synergistically combines: Convolutional Neural Networks (CNN) for robust spatial feature extraction from power system measurements; Long Short-Term Memory (LSTM) networks for capturing complex temporal dependencies; and an attention mechanism that dynamically weights the most discriminative features. The framework operates through a hierarchical feature extraction process: First-level spatial analysis identifies local measurement patterns; second-level temporal analysis detects sequential anomalies; attention-based feature refinement focuses on the most attack-relevant signatures. Comprehensive simulation studies demonstrate the superior performance of our CNN-LSTM-Attention framework compared to conventional detection approaches (CNN-SVM and MLP), with significant improvements across all key metrics. Namely, the accuracy, precision, F1-score, and recall could be improved by at least 7.17%, 6.59%, 2.72% and 6.55%. Full article
Show Figures

Figure 1

18 pages, 1214 KiB  
Article
Modeling Threat Evolution in Smart Grid Near-Field Networks
by Jing Guo, Zhimin Gu, Chao Zhou, Wei Huang and Jinming Chen
Electronics 2025, 14(13), 2739; https://doi.org/10.3390/electronics14132739 - 7 Jul 2025
Viewed by 286
Abstract
In recent years, near-field networks have become a vital part of smart grids, raising growing concerns about their security. Studying threat evolution mechanisms is key to building proactive defense systems, while early identification of threats enhances prediction and precision. Unlike traditional networks, threat [...] Read more.
In recent years, near-field networks have become a vital part of smart grids, raising growing concerns about their security. Studying threat evolution mechanisms is key to building proactive defense systems, while early identification of threats enhances prediction and precision. Unlike traditional networks, threat sources in power near-field networks are highly dynamic, influenced by physical environments, workflows, and device states. Existing models, designed for general network architectures, struggle to address the deep cyber-physical integration, device heterogeneity, and dynamic services of smart grids, especially regarding physical-layer impacts, cross-system interactions, and proprietary protocols. To overcome these limitations, this paper proposes a threat evolution framework tailored to smart grid near-field networks. A novel semi-physical simulation method is introduced, combining traditional Control Flow Graphs (CFGs) for open components with real-device interaction to capture closed-source logic and private protocols. This enables integrated cyber-physical modeling of threat evolution. Experiments in realistic simulation scenarios validate the framework’s accuracy in mapping threat propagation, evolution patterns, and impact, supporting comprehensive threat analysis and simulation. Full article
(This article belongs to the Topic Power System Protection)
Show Figures

Figure 1

22 pages, 696 KiB  
Article
Domain Knowledge-Driven Method for Threat Source Detection and Localization in the Power Internet of Things
by Zhimin Gu, Jing Guo, Jiangtao Xu, Yunxiao Sun and Wei Liang
Electronics 2025, 14(13), 2725; https://doi.org/10.3390/electronics14132725 - 7 Jul 2025
Viewed by 338
Abstract
Although the Power Internet of Things (PIoT) significantly improves operational efficiency by enabling real-time monitoring, intelligent control, and predictive maintenance across the grid, its inherently open and deeply interconnected cyber-physical architecture concurrently introduces increasingly complex and severe security threats. Existing IoT security solutions [...] Read more.
Although the Power Internet of Things (PIoT) significantly improves operational efficiency by enabling real-time monitoring, intelligent control, and predictive maintenance across the grid, its inherently open and deeply interconnected cyber-physical architecture concurrently introduces increasingly complex and severe security threats. Existing IoT security solutions are not fully adapted to the specific requirements of power systems, such as safety-critical reliability, protocol heterogeneity, physical/electrical context awareness, and the incorporation of domain-specific operational knowledge unique to the power sector. These limitations often lead to high false positives (flagging normal operations as malicious) and false negatives (failing to detect actual intrusions), ultimately compromising system stability and security response. To address these challenges, we propose a domain knowledge-driven threat source detection and localization method for the PIoT. The proposed method combines multi-source features—including electrical-layer measurements, network-layer metrics, and behavioral-layer logs—into a unified representation through a multi-level PIoT feature engineering framework. Building on advances in multimodal data integration and feature fusion, our framework employs a hybrid neural architecture combining the TabTransformer to model structured physical and network-layer features with BiLSTM to capture temporal dependencies in behavioral log sequences. This design enables comprehensive threat detection while supporting interpretable and fine-grained source localization. Experiments on a real-world Power Internet of Things (PIoT) dataset demonstrate that the proposed method achieves high detection accuracy and enables the actionable attribution of attack stages aligned with the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework. The proposed approach offers a scalable and domain-adaptable foundation for security analytics in cyber-physical power systems. Full article
Show Figures

Figure 1

26 pages, 3334 KiB  
Review
Simulation-Based Development of Internet of Cyber-Things Using DEVS
by Laurent Capocchi, Bernard P. Zeigler and Jean-Francois Santucci
Computers 2025, 14(7), 258; https://doi.org/10.3390/computers14070258 - 30 Jun 2025
Viewed by 438
Abstract
Simulation-based development is a structured approach that uses formal models to design and test system behavior before building the actual system. The Internet of Things (IoT) connects physical devices equipped with sensors and software to collect and exchange data. Cyber-Physical Systems (CPSs) integrate [...] Read more.
Simulation-based development is a structured approach that uses formal models to design and test system behavior before building the actual system. The Internet of Things (IoT) connects physical devices equipped with sensors and software to collect and exchange data. Cyber-Physical Systems (CPSs) integrate computing directly into physical processes to enable real-time control. This paper reviews the Discrete-Event System Specification (DEVS) formalism and explores how it can serve as a unified framework for designing, simulating, and implementing systems that combine IoT and CPS—referred to as the Internet of Cyber-Things (IoCT). Through case studies that include home automation, solar energy monitoring, conflict management, and swarm robotics, the paper reviews how DEVS enables construction of modular, scalable, and reusable models. The role of the System Entity Structure (SES) is also discussed, highlighting its contribution in organizing models and generating alternative system configurations. With this background as basis, the paper evaluates whether DEVS provides the necessary modeling power and continuity across stages to support the development of complex IoCT systems. The paper concludes that DEVS offers a robust and flexible foundation for developing IoCT systems, supporting both expressiveness and seamless transition from design to real-world deployment. Full article
(This article belongs to the Section Internet of Things (IoT) and Industrial IoT)
Show Figures

Figure 1

22 pages, 2535 KiB  
Article
Research on a Secure and Reliable Runtime Patching Method for Cyber–Physical Systems and Internet of Things Devices
by Zesheng Xi, Bo Zhang, Aniruddha Bhattacharjya, Yunfan Wang and Chuan He
Symmetry 2025, 17(7), 983; https://doi.org/10.3390/sym17070983 - 21 Jun 2025
Viewed by 415
Abstract
Recent advances in technologies such as blockchain, the Internet of Things (IoT), Cyber–Physical Systems (CPSs), and the Industrial Internet of Things (IIoT) have driven the digitalization and intelligent transformation of modern industries. However, embedded control devices within power system communication infrastructures have become [...] Read more.
Recent advances in technologies such as blockchain, the Internet of Things (IoT), Cyber–Physical Systems (CPSs), and the Industrial Internet of Things (IIoT) have driven the digitalization and intelligent transformation of modern industries. However, embedded control devices within power system communication infrastructures have become increasingly susceptible to cyber threats due to escalating software complexity and extensive network exposure. We have seen that symmetric conventional patching techniques—both static and dynamic—often fail to satisfy the stringent requirements of real-time responsiveness and computational efficiency in resource-constrained environments of all kinds of power grids. To address this limitation, we have proposed a hardware-assisted runtime patching framework tailored for embedded systems in critical power system networks. Our method has integrated binary-level vulnerability modeling, execution-trace-driven fault localization, and lightweight patch synthesis, enabling dynamic, in-place code redirection without disrupting ongoing operations. By constructing a system-level instruction flow model, the framework has leveraged on-chip debug registers to deploy patches at runtime, ensuring minimal operational impact. Experimental evaluations within a simulated substation communication architecture have revealed that the proposed approach has reduced patch latency by 92% over static techniques, which are symmetrical in a working way, while incurring less than 3% CPU overhead. This work has offered a scalable and real-time model-driven defense strategy that has enhanced the cyber–physical resilience of embedded systems in modern power systems, contributing new insights into the intersection of runtime security and grid infrastructure reliability. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

22 pages, 5184 KiB  
Article
Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks
by Seungun Park, Aria Seo, Muyoung Cheong, Hyunsu Kim, JaeCheol Kim and Yunsik Son
Appl. Sci. 2025, 15(13), 6981; https://doi.org/10.3390/app15136981 - 20 Jun 2025
Viewed by 443
Abstract
(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; [...] Read more.
(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of complex countermeasures. Traditional countermeasures, such as hiding techniques, attempt to obscure power consumption patterns; however, their effectiveness has been increasingly challenged. This study evaluates the vulnerability of dummy power traces against deep learning-based SCAs (DL-SCAs). (2) Methods: A power trace dataset was generated using a simulation environment based on Quick Emulator (QEMU) and GNU Debugger (GDB), integrating dummy traces to obfuscate execution signatures. DL models, including a Recurrent Neural Network (RNN), a Bidirectional RNN (Bi-RNN), and a Multi-Layer Perceptron (MLP), were used to evaluate classification performance. (3) Results: The models trained with dummy traces achieved high classification accuracy, with the MLP model reaching 97.81% accuracy and an F1-score of 97.77%. Despite the added complexity, DL models effectively distinguished real and dummy traces, highlighting limitations in existing hiding techniques. (4) Conclusions: These findings highlight the need for adaptive countermeasures against DL-SCAs. Future research should explore dynamic obfuscation techniques, adversarial training, and comprehensive evaluations of broader cryptographic algorithms. This study underscores the urgency of evolving security paradigms to defend against artificial intelligence-powered attacks. Full article
Show Figures

Figure 1

26 pages, 9196 KiB  
Article
Critical Node Identification for Cyber–Physical Power Distribution Systems Based on Complex Network Theory: A Real Case Study
by Mehdi Doostinia, Davide Falabretti, Giacomo Verticale and Sadegh Bolouki
Energies 2025, 18(11), 2937; https://doi.org/10.3390/en18112937 - 3 Jun 2025
Viewed by 591
Abstract
In today’s world, power distribution systems and information and communication technology (ICT) systems are increasingly interconnected, forming cyber–physical power systems (CPPSs) at the core of smart grids. Ensuring the resilience of these systems is essential for maintaining reliable performance under disasters, failures, or [...] Read more.
In today’s world, power distribution systems and information and communication technology (ICT) systems are increasingly interconnected, forming cyber–physical power systems (CPPSs) at the core of smart grids. Ensuring the resilience of these systems is essential for maintaining reliable performance under disasters, failures, or cyber-attacks. Identifying critical nodes within these interdependent networks is key to preserving system robustness. This paper applies complex network (CN) theory—specifically degree centrality (DC), closeness centrality (CC), and betweenness centrality (BC)—to a real-world distribution grid integrated with an ICT layer in northeastern Italy. Simulations are conducted across three scenarios: a directed power network, an undirected power network, and an undirected ICT network. Each centrality metric generates a ranking of nodes which is validated using node removal performance (NRP) analysis. In the directed power network, in-closeness centrality and out-degree centrality are the most effective in identifying critical nodes, with correlations of 84% and 74% with NRP, respectively. DC and BC perform best in the undirected power network, with correlation values of 67% and 53%, respectively. In the ICT network, BC achieves the highest correlation (64%), followed by CC at 55%. These findings demonstrate the potential of centrality-based methods for identifying critical nodes and support strategies for enhancing CPPS resilience and fault recovery by distribution system operators. Full article
Show Figures

Figure 1

21 pages, 2438 KiB  
Article
Robust Load Frequency Control in Cyber-Vulnerable Smart Grids with Renewable Integration
by Rambaboo Singh, Ramesh Kumar, Utkarsh Raj and Ravi Shankar
Energies 2025, 18(11), 2899; https://doi.org/10.3390/en18112899 - 31 May 2025
Viewed by 474
Abstract
Frequency regulation (FR) constitutes a fundamental aspect of power system stability, particularly in the context of the growing integration of intermittent renewable energy sources (RES) and electric vehicles (EVs). The load frequency control (LFC) mechanism, essential for achieving FR, is increasingly reliant on [...] Read more.
Frequency regulation (FR) constitutes a fundamental aspect of power system stability, particularly in the context of the growing integration of intermittent renewable energy sources (RES) and electric vehicles (EVs). The load frequency control (LFC) mechanism, essential for achieving FR, is increasingly reliant on communication infrastructures that are inherently vulnerable to cyber threats. Cyberattacks targeting these communication links can severely compromise coordination among smart grid components, resulting in erroneous control actions that jeopardize the security and stability of the power system. In light of these concerns, this study proposes a cyber-physical LFC framework incorporating a fuzzy linear active disturbance rejection controller (F-LADRC), wherein the controller parameters are systematically optimized using the quasi-opposition-based reptile search algorithm (QORSA). Furthermore, the proposed approach integrates a comprehensive cyberattack detection and prevention scheme, employing Haar wavelet transforms for anomaly detection and long short-term memory (LSTM) networks for predictive mitigation. The effectiveness of the proposed methodology is validated through simulations conducted on a restructured power system integrating RES and EVs, as well as a modified IEEE 39-bus test system. The simulation outcomes substantiate the capability of the proposed framework to deliver robust and resilient frequency regulation, maintaining system frequency and tie-line power fluctuations within nominal operational thresholds, even under adverse cyberattack scenarios. Full article
Show Figures

Figure 1

54 pages, 17044 KiB  
Review
Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services
by Dimitrios G. Arnaoutoglou, Tzichat M. Empliouk, Theodoros N. F. Kaifas, Constantinos L. Zekios and George A. Kyriacou
Future Internet 2025, 17(6), 249; https://doi.org/10.3390/fi17060249 - 31 May 2025
Viewed by 952
Abstract
The transition from 5G to 6G wireless systems introduces new challenges at the physical layer, including the need for higher frequency operations, massive MIMO deployment, advanced beamforming techniques, and sustainable energy harvesting mechanisms. A plethora of feature articles, review and white papers, and [...] Read more.
The transition from 5G to 6G wireless systems introduces new challenges at the physical layer, including the need for higher frequency operations, massive MIMO deployment, advanced beamforming techniques, and sustainable energy harvesting mechanisms. A plethora of feature articles, review and white papers, and roadmaps elaborate on the perspectives and research challenges of wireless systems, in general, including both unified physical and cyber space. Hence, this paper presents a comprehensive review of the technological challenges and recent advancements in wireless communication hardware that underpin the development of next-generation networks, particularly 6G. Emphasizing the physical layer, the study explores critical enabling technologies including beamforming, massive MIMO, reconfigurable intelligent surfaces (RIS), millimeter-wave (mmWave) and terahertz (THz) communications, wireless power transfer, and energy harvesting. These technologies are analyzed in terms of their functional roles, implementation challenges, and integration into future wireless infrastructure. Beyond traditional physical layer components, the paper also discusses the role of reconfigurable RF front-ends, innovative antenna architectures, and user-end devices that contribute to the adaptability and efficiency of emerging communication systems. In addition, the inclusion of application-driven paradigms such as digital twins highlights how new use cases are shaping design requirements and pushing the boundaries of hardware capabilities. By linking foundational physical-layer technologies with evolving application demands, this work provides a holistic perspective aimed at guiding future research directions and informing the design of scalable, energy-efficient, and resilient wireless communication platforms for the Future Internet. Specifically, we first try to identify the demands and, in turn, explore existing or emerging technologies that have the potential to meet these needs. Especially, there will be an extended reference about the state-of-the-art antennas for massive MIMO terrestrial and non-terrestrial networks. Full article
(This article belongs to the Special Issue Joint Design and Integration in Smart IoT Systems)
Show Figures

Figure 1

23 pages, 3540 KiB  
Article
A Low-Carbon Economic Scheduling Strategy for Multi-Microgrids with Communication Mechanism-Enabled Multi-Agent Deep Reinforcement Learning
by Lei Nie, Bo Long, Meiying Yu, Dawei Zhang, Xiaolei Yang and Shi Jing
Electronics 2025, 14(11), 2251; https://doi.org/10.3390/electronics14112251 - 31 May 2025
Cited by 1 | Viewed by 488
Abstract
To facilitate power system decarbonization, optimizing clean energy integration has emerged as a critical pathway for establishing sustainable power infrastructure. This study addresses the multi-timescale operational challenges inherent in power networks with high renewable penetration, proposing a novel stochastic dynamic programming framework that [...] Read more.
To facilitate power system decarbonization, optimizing clean energy integration has emerged as a critical pathway for establishing sustainable power infrastructure. This study addresses the multi-timescale operational challenges inherent in power networks with high renewable penetration, proposing a novel stochastic dynamic programming framework that synergizes intraday microgrid dispatch with a multi-phase carbon cost calculation mechanism. A probabilistic carbon flux quantification model is developed, incorporating source–load carbon flow tracing and nonconvex carbon pricing dynamics to enhance environmental–economic co-optimization constraints. The spatiotemporally coupled multi-microgrid (MMG) coordination paradigm is reformulated as a continuous state-action Markov game process governed by stochastic differential Stackelberg game principles. A communication mechanism-enabled multi-agent twin-delayed deep deterministic policy gradient (CMMA-TD3) algorithm is implemented to achieve Pareto-optimal solutions through cyber–physical collaboration. Results of the measurements in the MMG containing three microgrids show that the proposed approach reduces operation costs by 61.59% and carbon emissions by 27.95% compared to the least effective benchmark solution. Full article
Show Figures

Figure 1

22 pages, 4445 KiB  
Article
Trustworthiness of Deep Learning Under Adversarial Attacks in Power Systems
by Dowens Nicolas, Kevin Orozco, Steve Mathew, Yi Wang, Wafa Elmannai and George C. Giakos
Energies 2025, 18(10), 2611; https://doi.org/10.3390/en18102611 - 19 May 2025
Cited by 1 | Viewed by 764
Abstract
Advanced as they are, DL models in cyber-physical systems remain vulnerable to attacks like the Fast Gradient Sign Method, DeepFool, and Jacobian-Based Saliency Map Attacks, rendering system trustworthiness impeccable in applications with high stakes like power systems. In power grids, DL models such [...] Read more.
Advanced as they are, DL models in cyber-physical systems remain vulnerable to attacks like the Fast Gradient Sign Method, DeepFool, and Jacobian-Based Saliency Map Attacks, rendering system trustworthiness impeccable in applications with high stakes like power systems. In power grids, DL models such as Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks are commonly utilized for tasks like state estimation, load forecasting, and fault detection, depending on their ability to learn complex, non-linear patterns in high-dimensional data such as voltage, current, and frequency measurements. Nevertheless, these models are susceptible to adversarial attacks, which could lead to inaccurate predictions and system failure. In this paper, the impact of these attacks on DL models is analyzed by employing the use of defensive countermeasures such as Adversarial Training, Gaussian Augmentation, and Feature Squeezing, to investigate vulnerabilities in industrial control systems with potentially disastrous real-world impacts. Emphasizing the inherent requirement of robust defense, this initiative lays the groundwork for follow-on initiatives to incorporate security and resilience into ML and DL algorithms and ensure mission-critical AI system dependability. Full article
(This article belongs to the Special Issue Artificial Intelligence and Machine Learning in Smart Grids)
Show Figures

Figure 1

28 pages, 5221 KiB  
Article
ARM-IRL: Adaptive Resilience Metric Quantification Using Inverse Reinforcement Learning
by Abhijeet Sahu, Venkatesh Venkatramanan and Richard Macwan
AI 2025, 6(5), 103; https://doi.org/10.3390/ai6050103 - 18 May 2025
Cited by 1 | Viewed by 684
Abstract
Background/Objectives: The resilience of safety-critical systems is gaining importance due to the rise in cyber and physical threats, especially within critical infrastructure. Traditional static resilience metrics may not capture dynamic system states, leading to inaccurate assessments and ineffective responses to cyber threats. This [...] Read more.
Background/Objectives: The resilience of safety-critical systems is gaining importance due to the rise in cyber and physical threats, especially within critical infrastructure. Traditional static resilience metrics may not capture dynamic system states, leading to inaccurate assessments and ineffective responses to cyber threats. This work aims to develop a data-driven, adaptive method for resilience metric learning. Methods: We propose a data-driven approach using inverse reinforcement learning (IRL) to learn a single, adaptive resilience metric. The method infers a reward function from expert control actions. Unlike previous approaches using static weights or fuzzy logic, this work applies adversarial inverse reinforcement learning (AIRL), training a generator and discriminator in parallel to learn the reward structure and derive an optimal policy. Results: The proposed approach is evaluated on multiple scenarios: optimal communication network rerouting, power distribution network reconfiguration, and cyber–physical restoration of critical loads using the IEEE 123-bus system. Conclusions: The adaptive, learned resilience metric enables faster critical load restoration in comparison to conventional RL approaches. Full article
(This article belongs to the Section AI Systems: Theory and Applications)
Show Figures

Figure 1

17 pages, 5707 KiB  
Article
AI-Enabled Digital Twin Framework for Safe and Sustainable Intelligent Transportation
by Keke Long, Chengyuan Ma, Hangyu Li, Zheng Li, Heye Huang, Haotian Shi, Zilin Huang, Zihao Sheng, Lei Shi, Pei Li, Sikai Chen and Xiaopeng Li
Sustainability 2025, 17(10), 4391; https://doi.org/10.3390/su17104391 - 12 May 2025
Viewed by 1158
Abstract
This study proposes an AI-powered digital twin (DT) platform designed to support real-time traffic risk prediction, decision-making, and sustainable mobility in smart cities. The system integrates multi-source data—including static infrastructure maps, historical traffic records, telematics data, and camera feeds—into a unified cyber–physical platform. [...] Read more.
This study proposes an AI-powered digital twin (DT) platform designed to support real-time traffic risk prediction, decision-making, and sustainable mobility in smart cities. The system integrates multi-source data—including static infrastructure maps, historical traffic records, telematics data, and camera feeds—into a unified cyber–physical platform. AI models are employed for data fusion, anomaly detection, and predictive analytics. In particular, the platform incorporates telematics–video fusion for enhanced trajectory accuracy and LiDAR–camera fusion for high-definition work-zone mapping. These capabilities support dynamic safety heatmaps, congestion forecasts, and scenario-based decision support. A pilot deployment on Madison’s Flex Lane corridor demonstrates real-time data processing, traffic incident reconstruction, crash-risk forecasting, and eco-driving control using a validated Vehicle-in-the-Loop setup. The modular API design enables integration with existing Advanced Traffic Management Systems (ATMSs) and supports scalable implementation. By combining predictive analytics with real-world deployment, this research offers a practical approach to improving urban traffic safety, resilience, and sustainability. Full article
Show Figures

Figure 1

Back to TopTop