Enrico Zio’s research while affiliated with Politecnico di Milano and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (204)


Semi-supervised fault diagnosis framework for underwater propeller based on speed disentanglement strategy
  • Article

June 2025

·

5 Reads

Mechanical Systems and Signal Processing

·

Wenfeng Zhao

·

Weijun Xu

·

[...]

·

Enrico Zio

Attack-defense game of interdependent infrastructure systems considering cascading failures

May 2025

·

6 Reads

Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability

Interdependent infrastructure networks (IINs) are increasingly vulnerable to potential threats from terrorist activities, which can severely disrupt their performance. The dynamic interactions between intelligent attackers and defenders are crucial in determining the resilience of IINs. Based on game theory and complex network theory, this paper proposes a Stackelberg attack-defense game model considering cascading failures. The proposed two-player game model prioritizes the actions of the defender, with the attacker adopting the role of a follower who formulates a response to the defender’s moves. The strategies and payoffs are defined based on the vulnerability of IINs under disruptions, accounting for cascading failures both within individual networks and between heterogeneous networks. An interdependent power and gas network is applied to explore equilibrium strategies and expected payoffs for both the attacker and defender. Simulation results reveal the importance of considering cascading effects from a network perspective when evaluating the performance of IINs. The findings demonstrate that narrowing the importance gap between nodes is an effective strategy for enhancing system resilience and mitigating the impact of attacks. The equilibrium strategies derived from this model offer valuable insights for improving the resilience of IINs against disruptive events.




A probabilistic cost-benefit analysis approach for cyberattack path evaluation

May 2025

·

22 Reads

Reliability Engineering & System Safety

Analyzing attacker behavior and exploring attack paths are crucial to design effective cybersecurity protection mechanisms. In this work, we propose a Monte Carlo (MC)-based probabilistic cost-benefit analysis approach to assess cyber vulnerabilities and identify attack paths most likely to be exploited in an industrial control setting. First, we draw an attack graph to represent the potential attack paths that attackers could exploit to compromise the vulnerabilities of a target Industrial Control System (ICS). A cost-benefit analysis is, then, integrated into a graph path algorithm to explore attacker’s decisions for exploiting vulnerabilities, whilst accounting for the dynamic characteristics of the system configuration. A probabilistic risk metric is introduced to measure the uncertainty that derives from the intrinsic technical exploitability of vulnerabilities and attackers’ propensities. For demonstration, we apply the proposed approach to a simplified corporate network in an ICS environment, which is vulnerable to multi-step cyberattacks. We identify the shortest attack paths with the highest probabilities and assess the risk associated to each vulnerable element.



Novel two-layer cascading failure model for the vulnerability assessment of an interdependent traffic-power system

April 2025

·

2 Reads

International Journal of Modern Physics C

Urban Critical Infrastructures (UCIs) are exposed to cascading failures due to their internal connectivity and the complex interactions across physical, logical, geographic and cybers. Assessing the vulnerability of UCIs is essential for ensuring the reliable and safe operation of cities. Considering the specific UCI model of the interdependent traffic and power systems, this paper proposes a two-layer cascading failure model for assessing the vulnerability of the Interdependent Traffic-Power System (ITPS), consisting of a Traffic Layer (TL) and a Power Layer (PL). A user equilibrium model is used to simulate traffic flow in the TL, while the PL applies Kirchhoff’s laws for power distribution. To enhance the realism of interdependence modeling between the two layers, a Local Flow Entropy (LFE) interdependence method is introduced, integrating the flow states of neighboring components within the infrastructures. A case study on the IEEE118 system and Watts–Strogatz (WS) network demonstrates that the degree of ITPSs vulnerability is higher than under traditional Node Degree (ND) method in initial intentional attacks. The results show a nonlinear relationship between infrastructure capacity and vulnerability, highlighting the need for risk management strategies to balance cost and system stability.




Figure 1 illustrates the proposed framework, which is based on a supervised DL classifier í µí»·, an explanation model í µí±” and an anomaly detection model í µí»¹. The classifier í µí»· determines the health state í µí± §̂ of the infrastructure component depicted in the image (e.g., healthy, degraded, failed). Two convolutional neural network (CNN) architectures are considered in this work for image classification: MobileNetV3 Small [40] and EfficientNet-B0 [41] (Section 4.1).
Figure 1: proposed framework Figure 2 shows the semi-supervised AD module used in this work, which consists of í µí± Deep SAD models (Section 4.3), denoted as í µí¼‘ & for each class í µí± § = 1, … , í µí±. Each Deep SAD model í µí¼‘ & focuses on explanations of images assigned to class í µí± § by í µí»·. The Deep SAD models operate by mapping explanations into an embedding space specific to each class. In this space, explanations of correctly classified images form a compact cluster around a central point í µí± & , whereas explanations of incorrectly classified images are dispersed away from these clusters. For a given explanation í µí±¦, the Deep SAD model í µí¼‘ & computes the distance í µí±‘(í µí± & , í µí±¦) between the embedding of í µí±¦ and the center í µí± & of the embedding space of the embedding space for class z. This distance í µí±‘(í µí± & , í µí±¦) is then compared to a predefined threshold í µí±‡ℎ & to determine whether the explanation is normal (í µí±™ + = 1) or anomalous (í µí±™ + = −1): í µí»¹(í µí±¦) = e í µí±™ + = 1 if í µí±‘(í µí±¦, í µí± & ) < í µí±‡ℎ & í µí±™ + = −1 if í µí±‘(í µí±¦, í µí± & ) ≥ í µí±‡ℎ &
Figure 2: the semi-supervised AD module receives in input the explanation í µí±¦ and the predicted class í µí± §̂ . It consists of í µí± Deep SAD models í µí¼‘ ! that map explanations in an embedding space where the distance is compared with a threshold to determine if they are normal or anomalous. The model í µí»¹ is developed following the steps reported in Algorithm 3. It uses the dataset í µí°· = {(í µí±¥ $ , í µí± § $ )} $-!,…,0 formed by T images í µí±¥ $ and the corresponding class í µí± § $ , then, the following steps are performed: 1) Classify the í µí±‡ images í µí±¥ $ , í µí±– = 1, … , í µí±‡, with í µí»·, i.e. í µí± §̂ $ = í µí»·(í µí±¥ $ ), dividing them into í µí± datasets í µí°· & ⊆ í µí°·, each formed by images í µí±¥ $ assigned to class í µí± §: í µí°· & = {í µí±¥ $ ∈ í µí°· | í µí± §̂ $ = í µí± § }. 2) Compute the explanation í µí±¦ $ = í µí±”(í µí»·, í µí±¥ $ ) of each image í µí±¥ $ ∈ í µí°· & using GradCAM. 3) Divide the dataset í µí°· & is into a training set í µí°· FGH$1 &
Figure 3a): An image showcasing power line insulators. b), c) and d): Representative images of individual insulator shells categorized as broken, flashover and healthy, respectively.
Figure 4: confusion matrix of the classifiers í µí»· " (left) and í µí»· # (right) on the images of í µí°· $ . The recall (sensitivity) for each class is reported into parentheses and is represented by the colour of each cell.

+3

Automated Processing of eXplainable Artificial Intelligence Outputs in Deep Learning Models for Fault Diagnostics of Large Infrastructures
  • Preprint
  • File available

March 2025

·

40 Reads

Deep Learning (DL) models processing images to recognize the health state of large infrastructure components can exhibit biases and rely on non-causal shortcuts. eXplainable Artificial Intelligence (XAI) can address these issues but manually analyzing explanations generated by XAI techniques is time-consuming and prone to errors. This work proposes a novel framework that combines post-hoc explanations with semi-supervised learning to automatically identify anomalous explanations that deviate from those of correctly classified images and may therefore indicate model abnormal behaviors. This significantly reduces the workload for maintenance decision-makers, who only need to manually reclassify images flagged as having anomalous explanations. The proposed framework is applied to drone-collected images of insulator shells for power grid infrastructure monitoring, considering two different Convolutional Neural Networks (CNNs), GradCAM explanations and Deep Semi-Supervised Anomaly Detection. The average classification accuracy on two faulty classes is improved by 8% and maintenance operators are required to manually reclassify only 15% of the images. We compare the proposed framework with a state-of-the-art approach based on the faithfulness metric: the experimental results obtained demonstrate that the proposed framework consistently achieves F_1 scores larger than those of the faithfulness-based approach. Additionally, the proposed framework successfully identifies correct classifications that result from non-causal shortcuts, such as the presence of ID tags printed on insulator shells.

Download

Citations (43)


... Their findings demonstrate a reduction in peak power flows while considering economic aspects, such as self-consumption maximization and degradation prevention. Similarly, references [13,14] presented a control method for islanded and port microgrids that enhance RES utilization and limit BESS degradation. Reference [15] proposed a multiobjective BESS control method based on dynamic programming, which aims to maximize self-consumption, absorb supply-demand fluctuations, and avoid congestion for BESSs co-located with PV systems. ...

Reference:

Charging Incentive Design with Minimum Price Guarantee for Battery Energy Storage Systems to Mitigate Grid Congestion
A hierarchical multi-objective co-optimization framework for sizing and energy management of coupled hydrogen-electricity energy storage systems at ports
  • Citing Article
  • April 2025

Applied Energy

... Convex analysis is intimately related to economic theory, notably the study of utility functions, which depict rational consumer preferences in which utility grows with consumption but at a decreasing pace. For more current uses in several disciplines of applied sciences, we refer to [6][7][8][9][10] and the references therein. ...

A systematic resilience assessment framework for multi-state systems based on physics-informed neural network
  • Citing Article
  • May 2025

Reliability Engineering & System Safety

... Recent advancements in NLP-particularly the emergence of transformer-based models such as Bidirectional Encoder Representations from Transformers (BERT) and its Arabic counterparts-have significantly enhanced Arabic text processing. Comparative analyses have showed improved accuracy in text classification across various domains with the adoption of updated BERT models [23,24]. ...

A systematic procedure for the analysis of maintenance reports based on a taxonomy and BERT attention mechanism
  • Citing Article
  • May 2025

Reliability Engineering & System Safety

... As a result, accurate bearing fault diagnosis is essential for maintaining the safe and reliable operation of industrial equipment [3]. By detecting faults at an early stage, timely maintenance can be carried out, which not only minimises downtime and cost but also mitigates potential safety hazards [4][5][6][7][8]. ...

Opportunities and Risks of Artificial Intelligence for Industry 5.0 in the context of Reliability and Maintenance Engineering

Journal of Reliability Science and Engineering

... Additionally, processing large amounts of data in the cloud allows for training complex AI models, which are then deployed to edge devices for fast, context-aware decision-making. This continuous flow of data and real-time decisions is critical in scenarios like smart cities [38], healthcare [39,40], and predictive maintenance [41], where the timeliness and accuracy of information can enhance operational efficiency and safety. The integration between IoT, edge, and cloud is achieved through a combination of decentralized architectures and intelligent coordination mechanisms. ...

Integration of Artificial Intelligence within an Advanced Filtering Framework for Real-time System State Estimation and Risk Prediction with Application to a Nuclear Microreactor
  • Citing Article
  • November 2024

Nuclear Engineering and Technology

... In related work, [36] achieves atomic-scale precision with a damage-free plasma source, yet also relies on extensive expert domain insights. Data-Driven Semiconductor Manufacturing Recently, machine learning has gained popularity for semiconductor process optimization [41,20,29,28,32,15,38,14]. For instance, [18] combines Bayesian optimization and human collaboration to optimize etching profiles, while [52] uses cascade recurrent neural networks (RNNs) trained on simulation data. ...

A novel methodology based on long short-term memory stacked autoencoders for unsupervised detection of abnormal working conditions in semiconductor manufacturing systems
  • Citing Article
  • November 2024

Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability

... In particular, Human-Centered AI is asked to bridge the gap between AI and Intelligence Augmentation (IA), i.e., between automating processes and augmenting the capabilities of the human in the process [6]. This offers great opportunities for scientific and technological enhancements, but also poses new challenges to the competitiveness of the solution developers, with consequent new risks that must be evaluated and managed (e.g., [7]). ...

Industry 5.0: Do risk assessment and risk management need to update? And if yes, how?
  • Citing Article
  • February 2024

Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability

... INTRODUCTION pyforce (Python Framework for data-driven model Order Reduction of multi-physiCs problEms) is a Python library implementing Data-Driven Reduced Order Modelling (DDROM) techniques [1,2] for applications to multi-physics problems. ...

Impact of Malfunctioning Sensors on Data-Driven Reduced Order Modelling: Application to Molten Salt Reactors

The European Physical Journal Conferences

... The advantages of FSWPT align with broader trends in the maritime and shipping industries, which are undergoing a significant technological transition toward decarbonization [30]. The increasing adoption of carbon-neutral fuels, battery energy storage systems (BESS), and hybrid propulsion technologies reflects this shift [31]. Notably, the trend of ordering vessels with alternative fuel propulsion systems and integrating renewable energy sources into ship operations is accelerating. ...

Sustainable mega-seaports with integrated multi-energy systems: Life-cycle environmental and economic evaluation
  • Citing Article
  • October 2024

Journal of Cleaner Production