56
Views
1
CrossRef citations to date
0
Altmetric
Computers and Computing

A Novel Back-Propagation Neural Network for Intelligent Cyber-Physical Systems for Wireless Communications

, , &

References

  • H. Xu, W. Yu, D. Griffith, and N. Golmie, “A survey on industrial internet of things: A cyber-physical systems perspective,” IEEE. Access., Vol. 6, pp. 78238–59, 2018.
  • V. Vladareanu, I. Dumitrache, L. Vladareanu, L. S. Sacala, G. Tont, and M. A. Moisescu, “Versatile intelligent portable robot control platform based on cyber physical systems principles,” Stud. Inf. Control, Vol. 24, no. 4, pp. 409–18, 2015.
  • J. Ruan, H. Jiang, X. Li, Y. Shi, F. T. Chan, and W. Rao, “A granular GA-SVM predictor for big data in agricultural cyber-physical systems,” IEEE Trans. Ind. Inf., Vol. 15, no. 12, pp. 6510–21, 2019.
  • C. F. Caruntu, A. V. Militaru, and C. R. Comsa, “Cyber-physical systems-based architecture for signalized traffic corridors: Monitoring and synchronized coordination,” in 2021 23rd International Conference on Control Systems and Computer Science (CSCS), Bucharest, Romania, IEEE, 2021 May, pp. 314–21. DOI:10.1109/CSCS52396.2021.00058.
  • S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system security for the electric power grid,” Proc. IEEE, Vol. 100, no. 1, pp. 210–24, 2011.
  • M. Atif, et al., “Soft computing techniques for dependable cyber-physical systems,” IEEE. Access., Vol. 7, pp. 72030–49, 2019.
  • J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos, and M. Kantarcioglu, “Security and privacy in cyber-physical systems: A survey of surveys,” IEEE Design Test, Vol. 34, no. 4, pp. 7–17, 2017.
  • Z. Lv, W. Mazurczyk, S. Wendzel, and H. Song, “Guest editorial: Recent advances in cyber-physical security in industrial environments,” IEEE Trans. Ind. Inf., Vol. 15, no. 12, pp. 6468–71, 2019.
  • H. Jain, M. Kumar, and A. M. Joshi, “Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection,” Electr. Eng., Vol. 104, no. 1, pp. 331–46, 2022.
  • S. Lazarova-Molnar, and N. Mohamed, “Reliability analysis of cyber-physical systems,” in Simulation for Cyber-Physical Systems Engineering, Cham: Springer, 2020, pp. 385–405. DOI:10.1007/978-3-030-51909-4_15.
  • M. Henze, J. Hiller, R. Hummen, R. Matzutt, K. Wehrle, and J. H. Ziegeldorf, “Network security and privacy for cyber-physical systems,” in Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications. 2017, pp. 25–56. DOI:10.1002/9781119226079.ch2.
  • L. Cheng, L. Yin, J. Wang, T. Shen, Y. Chen, G. Liu, and T. Yu, “Behavioral decision-making in power demand-side response management: A multi-population evolutionary game dynamics perspective,” Int. J. Electr. Power Energy Syst., Vol. 129, pp. 106743, 2021.
  • L. Cheng, and T. Yu, “A new generation of AI: A review and perspective on machine learning technologies applied to smart energy and electric power systems,” Int. J. Energy Res., Vol. 43, no. 6, pp. 1928–73, 2019.
  • L. Cheng, Y. Chen, and G. Liu, “2PnS-EG: a general two-population n-strategy evolutionary game for strategic long-term bidding in a deregulated market under different market clearing mechanisms,” Int. J. Electr. Power Energy Syst., Vol. 142, pp. 108182, 2022.
  • J. Lopez, and J. E. Rubio, “Access control for cyber-physical systems interconnected to the cloud,” Comput. Netw., Vol. 134, pp. 46–54, 2018.
  • P. Derler, E. A. Lee, and A. S. Vincentelli, “Modeling cyber–physical systems,” Proc. IEEE, Vol. 100, no. 1, pp. 13–28, 2011.
  • L. Ante, “Digital twin technology for smart manufacturing and industry 4.0: A bibliometric analysis of the intellectual structure of the research discourse,” Manuf. Lett., Vol. 27, pp. 96–102, 2021.
  • P. Bogdan, and R. Marculescu, “Towards a science of cyber-physical systems design,” in 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems, Chicago, IL, USA, L. Ante, Ed. IEEE, 2011, pp. 99–108. DOI:10.1109/ICCPS.2011.14.
  • L. Chen, S. Tang, V. Balasubramanian, J. Xia, F. Zhou, and L. Fan, “Physical-layer security-based mobile edge computing for emerging cyber-physical systems,” Comput. Commun., Vol. 194, pp. 180–8, 2022.
  • Z. Lv, D. Chen, R. Lou, and A. Alazab, “Artificial intelligence for securing industrial-based cyber-physical systems,” Future Gener. Comput. Syst., Vol. 117, pp. 291–8, 2021.
  • Y. Peng, A. Jolfaei, and K. Yu, “A novel real-time deterministic scheduling mechanism in industrial cyber-physical systems for energy internet,” IEEE Trans. Ind. Inf., Vol. 18, no. 8, pp. 5670–80, 2021.
  • M. H. Abidi, H. Alkhalefah, and U. Umer, “Fuzzy harmony search-based optimal control strategy for a wireless cyber-physical system with industry 4.0,” J. Intell. Manuf., Vol. 33, no. 6, pp. 1795–812, 2022.
  • Z. Cai, and X. Zheng, “A private and efficient mechanism for data uploading in smart cyber-physical systems,” IEEE Trans. Netw. Sci. Eng., Vol. 7, no. 2, pp. 766–75, 2018.
  • M. Adil, M. A. Jan, S. Mastorakis, H. Song, M. M. Jadoon, S. Abbas, and A. Farouk, “Hash-MAC-DSDV: Mutual authentication for intelligent IoT-based cyber-physical systems,” IEEE Internet Things J., Vol. 9, pp. 22173–83, 2021.
  • K. E. Mary Reena, A. Theckethil Mathew, and L. Jacob, “An occupancy based cyber-physical system design for intelligent building automation,” Math. Probl. Eng., Vol. 2015, pp. 132182, 2015.
  • C. Adams, and R. Giachetti, “Agent modeling to support allocation decisions in mobile cyber-physical systems,” in 2019 14th Annual Conference System of Systems Engineering (SoSE), Anchorage, AK, USA. IEEE, 2019 May, pp. 57–62.
  • C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, “Time-based intrusion detection in cyber-physical systems,” in Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm Sweden, 2010 April, pp. 109–18.
  • R. R. Asaad, and R. I. Ali, “Back propagation neural network (BPNN) and sigmoid activation function in multi-layer networks,” Acad. J. Nawroz Univ., Vol. 8, no. 4, pp. 216–21, 2019.
  • N. Ghatasheh, I. Altaharwa, and K. Aldebei, “Modified genetic algorithm for feature selection and hyper parameter optimization: case of XGBoost in spam prediction,” IEEE Access., Vol. 10, pp. 84365–83, 2022.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.