Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis

Author(s): Rokka Chhetri, Sujit | Advisor(s): Al Faruque, Mohammad | Abstract: Cyber-Physical System consists of the integration of computational components in the cyber-domain with the physical-domain processes. In cyber-domain, embedded computers and networks monitor and control the physical processes, and in the physical-domain the sensors and actuators aid in interacting with the physical world. This interaction between the cyber and physical domain brings unique modeling challenges one of which includes the integration of discrete and sequential models in cyber-domain with the continuous and parallel physical domain processes. However, the same cyber-physical interaction also opens new opportunities for modeling. For example, the information flow in the cyber-domain manifests physically in the form of energy flows in the physical domain. Some of these energy flows unintentionally provide information about the cyber-domain through the side-channels. In this thesis, the first part consists of an extensive analysis of the side-channels (such as acoustic, magnetic, thermal, power and vibration) of the cyber-physical system is performed. Based on this analysis data-driven models are estimated. These models are then used to perform security vulnerability analysis (for confidentiality and integrity), whereby, new attack models are explored. Furthermore, the data-driven models are also utilized to create a defensive mechanism to minimize the information leakage from the system and to detect attacks to the integrity of the system. The cyber-physical manufacturing systems are taken as use cases to demonstrate the applicability of the modeling approaches. In the second part, side-channel analysis is performed to aid in modeling digital twins of the cyber-physical systems. Specifically, a novel methodology to utilize low-end sensors to analyze the side-channels and build the digital twins is proposed. These digital twins are used to capture the interaction between the cyber-domain and the physical domain of the manufacturing systems, and aid in process quality inference and fault localization. Using side-channels these digital twins are kept up-to-date, which is one of the fundamental requirements for building digital twins. Finally, challenges relating to performing data-driven modeling using non-Euclidean data in the cyber-physical system are addressed in the third part of the thesis. Moreover, a novel structural graph convolutional neural network and a dynamic graph embedding algorithm are presented to handle non-Euclidean data.

[1]  Max Welling,et al.  Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.

[2]  Mohammad Al Hasan,et al.  DyLink2Vec: Effective Feature Representation for Link Prediction in Dynamic Networks , 2018, ArXiv.

[3]  Conrad Bock,et al.  SysML and UML 2 support for activity modeling , 2006, Syst. Eng..

[4]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[5]  Edward A. Lee,et al.  A model-based design methodology for cyber-physical systems , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[6]  Arquimedes Canedo,et al.  QUILT: quality inference from living digital twins in IoT-enabled manufacturing systems , 2019, IoTDI.

[7]  Palash Goyal,et al.  DynamicGEM: A Library for Dynamic Graph Embedding Methods , 2018, ArXiv.

[8]  Manfred Pinkal,et al.  Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.

[9]  David He,et al.  A PHM Approach to Additive Manufacturing Equipment Health Monitoring, Fault Diagnosis, and Quality Control , 2014, Annual Conference of the PHM Society.

[10]  Kurt Mehlhorn,et al.  Weisfeiler-Lehman Graph Kernels , 2011, J. Mach. Learn. Res..

[11]  Sujit Rokka Chhetri,et al.  Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing , 2018, IEEE Transactions on Information Forensics and Security.

[12]  Mohammad Abdullah Al Faruque,et al.  GAN-Sec: Generative Adversarial Network Modeling for the Security Analysis of Cyber-Physical Production Systems , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[13]  Yann LeCun,et al.  Dimensionality Reduction by Learning an Invariant Mapping , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[14]  M. A. Faruque Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .

[15]  Jana Fuhrmann,et al.  The Engineering Design Process , 2016 .

[16]  Mikell P. Groover,et al.  Automation, Production Systems, and Computer-Integrated Manufacturing , 1987 .

[17]  Palash Goyal,et al.  Recommending Teammates with Deep Neural Networks , 2018, HT.

[18]  Nitish Talasu,et al.  A link prediction based approach for recommendation systems , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[19]  Craig A. Knoblock,et al.  PDDL-the planning domain definition language , 1998 .

[20]  Zhe Gan,et al.  Variational Autoencoder for Deep Learning of Images, Labels and Captions , 2016, NIPS.

[21]  Yoshua Bengio,et al.  Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..

[22]  Purnamrita Sarkar,et al.  Nonparametric Link Prediction in Dynamic Networks , 2012, ICML.

[23]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[24]  Yuchung J. Wang,et al.  Stochastic Blockmodels for Directed Graphs , 1987 .

[25]  Lucas C. Parra,et al.  A SURVEY OF CONVOLUTIVE BLIND SOURCE SEPARATION METHODS , 2007 .

[26]  Alexander J. Smola,et al.  Distributed large-scale natural graph factorization , 2013, WWW.

[27]  Mohammad Abdullah Al Faruque,et al.  Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[28]  Jules White,et al.  Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .

[29]  Manish Pandey,et al.  Machine learning and systems for building the next generation of EDA tools , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).

[30]  Mohammad Abdullah Al Faruque,et al.  Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[31]  Johannes Gehrke,et al.  SECRET: a scalable linear regression tree algorithm , 2002, KDD.

[32]  Joan Bruna,et al.  Deep Convolutional Networks on Graph-Structured Data , 2015, ArXiv.

[33]  Mohammad Abdullah Al Faruque,et al.  Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0 , 2018, J. Hardw. Syst. Secur..

[34]  Samuel H. Huang,et al.  System health monitoring and prognostics — a review of current paradigms and practices , 2006 .

[35]  Alec Yasinsac,et al.  Security Challenges of Additive Manufacturing with Metals and Alloys , 2015, Critical Infrastructure Protection.

[36]  Palash Goyal,et al.  dyngraph2vec: Capturing Network Dynamics using Dynamic Graph Representation Learning , 2018, Knowl. Based Syst..

[37]  Kristian Kersting,et al.  Learning Continuous-Time Bayesian Networks in Relational Domains: A Non-Parametric Approach , 2016, AAAI.

[38]  Kewei Cheng,et al.  Streaming Link Prediction on Dynamic Attributed Networks , 2018, WSDM.

[39]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[40]  Todd R. Andel,et al.  Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.

[41]  J Elith,et al.  A working guide to boosted regression trees. , 2008, The Journal of animal ecology.

[42]  Brian Evans,et al.  Practical 3D Printers: The Science and Art of 3D Printing , 2012 .

[43]  Nektarios Georgios Tsoutsos,et al.  Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering , 2017, CPSS@AsiaCCS.

[44]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[45]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[46]  Dimitri P. Solomatine,et al.  Data-Driven Modelling: Concepts, Approaches and Experiences , 2009 .

[47]  T. Mukherjee,et al.  A digital twin for rapid qualification of 3D printed metallic components , 2019, Applied Materials Today.

[48]  Ulises Cortés,et al.  A visual embedding for the unsupervised extraction of abstract semantics , 2015, Cognitive Systems Research.

[49]  Carlos Eduardo Pereira,et al.  Digital Twin Data Modeling with AutomationML and a Communication Methodology for Data Exchange , 2016 .

[50]  Wenyao Xu,et al.  My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.

[51]  Wei Zhang,et al.  Building digital twins of 3D printing machines , 2017 .

[52]  Joseph C. S. Lai,et al.  Noise of Polyphase Electric Motors , 2005 .

[53]  Palash Goyal,et al.  Embedding Networks with Edge Attributes , 2018, HT.

[54]  U. Feige,et al.  Spectral Graph Theory , 2015 .

[55]  Edward A. Lee The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.

[56]  Nektarios Georgios Tsoutsos,et al.  INVITED: ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[57]  Palash Goyal,et al.  Future Automation Engineering using Structural Graph Convolutional Neural Networks , 2018, ArXiv.

[58]  Brian Randell,et al.  An Acoustic Side Channel Attack on Enigma , 2015 .

[59]  B. Heller,et al.  Harmonic field effects in induction machines , 1977 .

[60]  Arquimedes Canedo,et al.  KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[61]  Lior Horesh,et al.  Should You Derive, Or Let the Data Drive? An Optimization Framework for Hybrid First-Principles Data-Driven Modeling , 2017, 1711.04374.

[62]  Xavier Bresson,et al.  Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering , 2016, NIPS.

[63]  François-Xavier Standaert,et al.  Mutual Information Analysis: How, When and Why? , 2009, CHES.

[64]  Jon M. Kleinberg,et al.  Overview of the 2003 KDD Cup , 2003, SKDD.

[65]  Dan Barry,et al.  Real-time Sound Source Separation: Azimuth Discrimination and Resynthesis , 2004 .

[66]  Arquimedes Canedo,et al.  Cyber–Physical Codesign at the Functional Level for Multidomain Automotive Systems , 2017, IEEE Systems Journal.

[67]  Stefan Boschert,et al.  Digital Twin—The Simulation Aspect , 2016 .

[68]  Annika Kangas,et al.  Methods based on k-nearest neighbor regression in the prediction of basal area diameter distribution , 1998 .

[69]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[70]  Yan Wang,et al.  Real-time FDM machine condition monitoring and diagnosis based on acoustic emission and hidden semi-Markov model , 2017 .

[71]  Lihui Wang,et al.  Adaptive tool-path generation of rapid prototyping for complex product models , 2011 .

[72]  Ismail Fidan,et al.  Cyber acoustic analysis of additively manufactured objects , 2018 .

[73]  Yang Liu,et al.  subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs , 2016, ArXiv.

[74]  Luca Fumagalli,et al.  Flexible Automation and Intelligent Manufacturing , FAIM 2017 , 27-30 June 2017 , Modena , Italy A review of the roles of Digital Twin in CPS-based production systems , 2017 .

[75]  Christopher D. Wickens,et al.  A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[76]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[77]  S. Milz,et al.  Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing , 2005, Journal of materials science. Materials in medicine.

[78]  Paul D. Franzon,et al.  Machine learning in physical design , 2016, 2016 IEEE 25th Conference on Electrical Performance Of Electronic Packaging And Systems (EPEPS).

[79]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[80]  Wei Lu,et al.  Deep Neural Networks for Learning Graph Representations , 2016, AAAI.

[81]  Jeremy Straub,et al.  Identifying positioning-based attacks against 3D printed objects and the 3D printing process , 2017, Defense + Security.

[82]  Sergios Theodoridis,et al.  Introduction to Pattern Recognition: A Matlab Approach , 2010 .

[83]  Samuel H. Huang,et al.  System health monitoring and prognostics — a review of current paradigms and practices , 2006 .

[84]  Mohammad Abdullah Al Faruque Digital Twin of Manufacturing Systems , 2017 .

[85]  Bruce M. McMillin,et al.  Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..

[86]  Yoram Singer,et al.  Logistic Regression, AdaBoost and Bregman Distances , 2000, Machine Learning.

[87]  Jia Liu,et al.  Online Real-Time Quality Monitoring in Additive Manufacturing Processes Using Heterogeneous Sensors , 2015 .

[88]  D. Wall,et al.  Intellectual property crime and the Internet , 2009 .

[89]  Max Welling,et al.  Variational Graph Auto-Encoders , 2016, ArXiv.

[90]  Edward H. Glaessgen,et al.  The Digital Twin Paradigm for Future NASA and U.S. Air Force Vehicles , 2012 .

[91]  Linton C. Freeman,et al.  Carnegie Mellon: Journal of Social Structure: Visualizing Social Networks Visualizing Social Networks , 2022 .

[92]  Jian Pei,et al.  TIMERS: Error-Bounded SVD Restart on Dynamic Networks , 2017, AAAI.

[93]  Jian Pei,et al.  Asymmetric Transitivity Preserving Graph Embedding , 2016, KDD.

[94]  Jay Lee,et al.  Introduction to cyber manufacturing , 2016 .

[95]  Qiongkai Xu,et al.  GraRep: Learning Graph Representations with Global Structural Information , 2015, CIKM.

[96]  Jay Lee,et al.  Recent advances and trends in predictive manufacturing systems in big data environment , 2013 .

[97]  Daniel R. Figueiredo,et al.  struc2vec: Learning Node Representations from Structural Identity , 2017, KDD.

[98]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[99]  Timothy R. Holbrook,et al.  Digital Patent Infringement in an Era of 3D Printing , 2014 .

[100]  Jaime A. Camelio,et al.  Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .

[101]  Dave Thomas,et al.  The AADL behaviour annex -- experiments and roadmap , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).

[102]  Yan Wang,et al.  In situ monitoring of FDM machine condition via acoustic emission , 2015 .

[103]  Michael W. Grieves,et al.  Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems , 2017 .

[104]  Li Zhu,et al.  Key performance indicators for manufacturing operations management in the process industry , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).

[105]  Mohammad Abdullah Al Faruque,et al.  Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing , 2017, IEEE Des. Test.

[106]  Anton J. Enright,et al.  Network visualization and analysis of gene expression data using BioLayout Express3D , 2009, Nature Protocols.

[107]  Sandeep Neema,et al.  OpenMETA: A Model- and Component-Based Design Tool Chain for Cyber-Physical Systems , 2014, FPS@ETAPS.

[108]  Rubaiat Habib Kazi,et al.  DreamSketch: Early Stage 3D Design Explorations with Sketching and Generative Design , 2017, UIST.

[109]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .

[110]  Anku Adhikari,et al.  Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets , 2016, CCS.

[111]  Yu Wang,et al.  Graph regularized nonnegative matrix factorization for temporal link prediction in dynamic networks , 2018 .

[112]  S. Shevchik,et al.  Acoustic emission for in situ quality monitoring in additive manufacturing using spectral convolutional neural networks , 2017 .

[113]  J. S. Zuback,et al.  Building blocks for a digital twin of additive manufacturing , 2017 .

[114]  Gerd Heber,et al.  On the Effects of Modeling As-Manufactured Geometry: Toward Digital Twin , 2014 .

[115]  Alan V. Oppenheim,et al.  Discrete-time Signal Processing. Vol.2 , 2001 .

[116]  Zhenyu Kong,et al.  An online sparse estimation-based classification approach for real-time monitoring in advanced manufacturing processes from heterogeneous sensor data , 2016 .

[117]  Frederica Darema,et al.  Dynamic Data Driven Applications Systems: A New Paradigm for Application Simulations and Measurements , 2004, International Conference on Computational Science.

[118]  Yuan He,et al.  From Surveillance to Digital Twin: Challenges and Recent Advances of Signal Processing for Industrial Internet of Things , 2018, IEEE Signal Processing Magazine.

[119]  Arquimedes Canedo,et al.  Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[120]  P. J. Lawrenson,et al.  Electromagnetic damping in stepping motors , 1975 .

[121]  Wenwu Zhu,et al.  Structural Deep Network Embedding , 2016, KDD.

[122]  Mohammad Abdullah Al Faruque,et al.  Cross-domain security of cyber-physical systems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).

[123]  Palash Goyal,et al.  Graph Embedding Techniques, Applications, and Performance: A Survey , 2017, Knowl. Based Syst..

[124]  Kilian Wasmer,et al.  In Situ and Real-Time Monitoring of Powder-Bed AM by Combining Acoustic Emission and Artificial Intelligence , 2017 .

[125]  Xavier Bresson,et al.  CayleyNets: Graph Convolutional Neural Networks With Complex Rational Spectral Filters , 2017, IEEE Transactions on Signal Processing.

[126]  Mikhail Belkin,et al.  Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.

[127]  Roland Rosen,et al.  About The Importance of Autonomy and Digital Twins for the Future of Manufacturing , 2015 .

[128]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[129]  Abdulmotaleb El Saddik,et al.  C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems , 2017, IEEE Access.

[130]  M. Brand,et al.  Fast low-rank modifications of the thin singular value decomposition , 2006 .

[131]  Joonseok Lee,et al.  N-GCN: Multi-scale Graph Convolution for Semi-supervised Node Classification , 2018, UAI.

[132]  Simone Paolo Ponzetto,et al.  Knowledge-based graph document modeling , 2014, WSDM.

[133]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[134]  Guofei Jiang,et al.  Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.

[135]  Edward A. Lee,et al.  Ptolemy: A Framework for Simulating and Prototyping Heterogenous Systems , 2001, Int. J. Comput. Simul..

[136]  Steven Skiena,et al.  DeepWalk: online learning of social representations , 2014, KDD.

[137]  László Monostori,et al.  ScienceDirect Variety Management in Manufacturing . Proceedings of the 47 th CIRP Conference on Manufacturing Systems Cyber-physical production systems : Roots , expectations and R & D challenges , 2014 .

[138]  Yuval Elovici,et al.  Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing , 2017, ArXiv.

[139]  Dieter Roller,et al.  Concept Development of a Sensor Array for 3D Printer , 2016 .

[140]  Eric Feron,et al.  Foundations of Intelligent Additive Manufacturing , 2017, ArXiv.

[141]  Andreas W. Kempa-Liehr,et al.  Distributed and parallel time series feature extraction for industrial big data applications , 2016, ArXiv.

[142]  Ying Peng,et al.  A prognosis method using age-dependent hidden semi-Markov model for equipment health prediction , 2011 .

[143]  Mingzhe Wang,et al.  LINE: Large-scale Information Network Embedding , 2015, WWW.

[144]  Simon Osindero,et al.  Conditional Generative Adversarial Nets , 2014, ArXiv.

[145]  S. Michael Spottswood,et al.  Reengineering Aircraft Structural Life Prediction Using a Digital Twin , 2011 .

[146]  Jure Leskovec,et al.  Inductive Representation Learning on Large Graphs , 2017, NIPS.

[147]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[148]  Mohammad Abdullah Al Faruque,et al.  Design Automation Using Structural Graph Convolutional Neural Networks , 2019, Design Automation of Cyber-Physical Systems.

[149]  Yao Zhang,et al.  Sub2Vec: Feature Learning for Subgraphs , 2018, PAKDD.

[150]  Petr V. Chetyrbok,et al.  The IIoT/IoT device control model based on narrow-band IoT (NB-IoT) , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[151]  Reinhard Schneider,et al.  A survey of visualization tools for biological network analysis , 2008, BioData Mining.

[152]  L. Di Angelo,et al.  Surface quality prediction in FDM additive manufacturing , 2017 .

[153]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[154]  Alberto Boschetto,et al.  Accuracy prediction in fused deposition modeling , 2014 .

[155]  Philip Brisk,et al.  Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines , 2019, NDSS.

[156]  Yueting Zhuang,et al.  Dynamic Network Embedding by Modeling Triadic Closure Process , 2018, AAAI.

[157]  Arquimedes Canedo,et al.  Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems , 2017, ACM Trans. Cyber Phys. Syst..

[158]  Scott D. Applegate The dawn of Kinetic Cyber , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[159]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[160]  Yongbin Zhou,et al.  Multi-Channel Fusion Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[161]  Ron Jamieson,et al.  Direct slicing of CAD models for rapid prototyping , 1995 .

[162]  Tamara G. Kolda,et al.  Temporal Link Prediction Using Matrix and Tensor Factorizations , 2010, TKDD.

[163]  Alberto Boschetto,et al.  Integration of FDM surface quality modeling with process design , 2016 .

[164]  Edward M. Kraft,et al.  The Air Force Digital Thread/Digital Twin - Life Cycle Integration and Use of Computational and Experimental Knowledge , 2016 .

[165]  Mohammad Abdullah Al Faruque,et al.  Fix the leak! an information leakage aware secured cyber-physical manufacturing system , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[166]  Joan Bruna,et al.  Spectral Networks and Locally Connected Networks on Graphs , 2013, ICLR.

[167]  Z Q Liu,et al.  Scale space approach to directional analysis of images. , 1991, Applied optics.

[168]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[169]  Takashi Kenjo,et al.  Stepping Motors and Their Microprocessor Controls , 1984 .

[170]  Fei Chen,et al.  Security features embedded in computer aided design (CAD) solid models for additive manufacturing , 2017 .

[171]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[172]  R.G.D. Williams,et al.  A simple model to calculate the stator radial vibration of a hybrid stepping motor , 1993, Conference Record of the 1993 IEEE Industry Applications Conference Twenty-Eighth IAS Annual Meeting.

[173]  Mikhail Belkin,et al.  Laplacian Eigenmaps for Dimensionality Reduction and Data Representation , 2003, Neural Computation.

[174]  Jens Lehmann,et al.  DBpedia: A Nucleus for a Web of Open Data , 2007, ISWC/ASWC.

[175]  L. Sturm,et al.  CYBER-PHYSICAL VUNERABILITIES IN ADDITIVE MANUFACTURING SYSTEMS , 2014 .

[176]  James A. Anderson,et al.  Neurocomputing: Foundations of Research , 1988 .

[177]  Weiyi Qi IC Design Analysis, Optimization and Reuse via Machine Learning. , 2017 .

[178]  Leonidas J. Guibas,et al.  SyncSpecCNN: Synchronized Spectral CNN for 3D Shape Segmentation , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[179]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[180]  Miroslav Pajic,et al.  Design methodologies for securing cyber-physical systems , 2015, 2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[181]  Ran Jin,et al.  Functional Quantitative and Qualitative Models for Quality Modeling in a Fused Deposition Modeling Process , 2018, IEEE Transactions on Automation Science and Engineering.

[182]  Jure Leskovec,et al.  node2vec: Scalable Feature Learning for Networks , 2016, KDD.

[183]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[184]  Frédo Durand,et al.  The visual microphone , 2014, ACM Trans. Graph..

[185]  Yan Liu,et al.  DynGEM: Deep Embedding Method for Dynamic Graphs , 2018, ArXiv.