On Using the Shapley Value for Anomaly Localization: A Statistical Investigation
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum +2 more
wiley +1 more source
Prediction-based attack detection and mitigation mechanism in power system. [PDF]
Zhai P, Zhang M, Wang X.
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Detection of disturbances and cyber-attacks in smart grids using explainable machine learning. [PDF]
Farsi M +7 more
europepmc +1 more source
This review synthesizes AI advancements in food systems, leveraging machine learning, computer vision, robotics, and IoT for 96%–100% accurate quality inspection, 30% reduced downtime, and enhanced traceability from farm to fork. It highlights transformative potential in sustainability and SDGs while addressing data, ethical, and scalability challenges
Muhammad Waqar +9 more
wiley +1 more source
Sparse-selective quantization for real-time cyber threat detection in large-scale networks. [PDF]
Xie Y, Wang R, Dong L.
europepmc +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure. [PDF]
Kumar B +5 more
europepmc +1 more source
Abstract Organizational risk exposure arises from external sources and internal activities intended to reduce the potential for risks to cause harm. While organizational risk exposure is necessary to realize opportunities, misalignment between risk management and risk exposure may achieve the opposite outcomes.
Emma Soane
wiley +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source

