WEB OF SCIENCE
SCOPUS
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeong, Dahoon | - |
| dc.contributor.author | Kim, Yooshin | - |
| dc.contributor.author | Shin, Donghoon | - |
| dc.date.accessioned | 2025-04-16T11:40:15Z | - |
| dc.date.available | 2025-04-16T11:40:15Z | - |
| dc.date.created | 2025-02-20 | - |
| dc.date.issued | 2025-08 | - |
| dc.identifier.issn | 1943-0663 | - |
| dc.identifier.uri | http://hdl.handle.net/20.500.11750/58292 | - |
| dc.description.abstract | Critical infrastructure (CI) is essential for societal and economic stability, making it a prime target for cyber threats. Traditional anomaly detection models like LSTM and Transformers require substantial computational resources, which are often unavailable in CI environments. Cloud computing offers on-demand resources but introduces privacy concerns due to the need to transmit sensitive data to cloud servers. Homomorphic encryption (HE) enables secure processing of encrypted data but is computationally intensive, particularly due to operations like bootstrapping. This paper proposes a bootstrapping-free lightweight anomaly detection model optimized for homomorphically encrypted data, leveraging CI's operational characteristics. The model employs a two-stage data separation process and introduces state-vectors for normal operation detection, forming a whitelist anomaly detection approach. Experimental results on the SWaT and WADI datasets demonstrate the model's competitive performance and efficiency, with significantly reduced training times while maintaining robust security. © IEEE. | - |
| dc.language | English | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.title | Privacy-Preserving Anomaly Detection with Homomorphic Encryption for Industrial Control Systems in Critical Infrastructure | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1109/LES.2025.3538013 | - |
| dc.identifier.wosid | 001554326900007 | - |
| dc.identifier.scopusid | 2-s2.0-85217647395 | - |
| dc.identifier.bibliographicCitation | IEEE Embedded Systems Letters, v.17, no.4, pp.276 - 279 | - |
| dc.description.isOpenAccess | FALSE | - |
| dc.subject.keywordAuthor | Anomaly detection | - |
| dc.subject.keywordAuthor | critical infrastructure (CI) | - |
| dc.subject.keywordAuthor | homomorphic encryption (HE) | - |
| dc.subject.keywordAuthor | industrial control system (ICS) | - |
| dc.subject.keywordAuthor | privacy-preserving machine learning | - |
| dc.citation.endPage | 279 | - |
| dc.citation.number | 4 | - |
| dc.citation.startPage | 276 | - |
| dc.citation.title | IEEE Embedded Systems Letters | - |
| dc.citation.volume | 17 | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science; Engineering | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture; Computer Science, Software Engineering; Engineering, Electrical & Electronic | - |
| dc.type.docType | Article | - |
Department of Electrical Engineering and Computer Science