June 2025
·
5 Reads
Mechanical Systems and Signal Processing
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2025
·
5 Reads
Mechanical Systems and Signal Processing
May 2025
·
6 Reads
Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability
Interdependent infrastructure networks (IINs) are increasingly vulnerable to potential threats from terrorist activities, which can severely disrupt their performance. The dynamic interactions between intelligent attackers and defenders are crucial in determining the resilience of IINs. Based on game theory and complex network theory, this paper proposes a Stackelberg attack-defense game model considering cascading failures. The proposed two-player game model prioritizes the actions of the defender, with the attacker adopting the role of a follower who formulates a response to the defender’s moves. The strategies and payoffs are defined based on the vulnerability of IINs under disruptions, accounting for cascading failures both within individual networks and between heterogeneous networks. An interdependent power and gas network is applied to explore equilibrium strategies and expected payoffs for both the attacker and defender. Simulation results reveal the importance of considering cascading effects from a network perspective when evaluating the performance of IINs. The findings demonstrate that narrowing the importance gap between nodes is an effective strategy for enhancing system resilience and mitigating the impact of attacks. The equilibrium strategies derived from this model offer valuable insights for improving the resilience of IINs against disruptive events.
May 2025
·
33 Reads
·
1 Citation
Reliability Engineering & System Safety
May 2025
·
34 Reads
·
38 Citations
Reliability Engineering & System Safety
May 2025
·
22 Reads
Reliability Engineering & System Safety
Analyzing attacker behavior and exploring attack paths are crucial to design effective cybersecurity protection mechanisms. In this work, we propose a Monte Carlo (MC)-based probabilistic cost-benefit analysis approach to assess cyber vulnerabilities and identify attack paths most likely to be exploited in an industrial control setting. First, we draw an attack graph to represent the potential attack paths that attackers could exploit to compromise the vulnerabilities of a target Industrial Control System (ICS). A cost-benefit analysis is, then, integrated into a graph path algorithm to explore attacker’s decisions for exploiting vulnerabilities, whilst accounting for the dynamic characteristics of the system configuration. A probabilistic risk metric is introduced to measure the uncertainty that derives from the intrinsic technical exploitability of vulnerabilities and attackers’ propensities. For demonstration, we apply the proposed approach to a simplified corporate network in an ICS environment, which is vulnerable to multi-step cyberattacks. We identify the shortest attack paths with the highest probabilities and assess the risk associated to each vulnerable element.
May 2025
·
22 Reads
Reliability Engineering & System Safety
April 2025
·
2 Reads
International Journal of Modern Physics C
Urban Critical Infrastructures (UCIs) are exposed to cascading failures due to their internal connectivity and the complex interactions across physical, logical, geographic and cybers. Assessing the vulnerability of UCIs is essential for ensuring the reliable and safe operation of cities. Considering the specific UCI model of the interdependent traffic and power systems, this paper proposes a two-layer cascading failure model for assessing the vulnerability of the Interdependent Traffic-Power System (ITPS), consisting of a Traffic Layer (TL) and a Power Layer (PL). A user equilibrium model is used to simulate traffic flow in the TL, while the PL applies Kirchhoff’s laws for power distribution. To enhance the realism of interdependence modeling between the two layers, a Local Flow Entropy (LFE) interdependence method is introduced, integrating the flow states of neighboring components within the infrastructures. A case study on the IEEE118 system and Watts–Strogatz (WS) network demonstrates that the degree of ITPSs vulnerability is higher than under traditional Node Degree (ND) method in initial intentional attacks. The results show a nonlinear relationship between infrastructure capacity and vulnerability, highlighting the need for risk management strategies to balance cost and system stability.
April 2025
·
18 Reads
Computers & Industrial Engineering
April 2025
·
16 Reads
·
8 Citations
Applied Energy
March 2025
·
40 Reads
Deep Learning (DL) models processing images to recognize the health state of large infrastructure components can exhibit biases and rely on non-causal shortcuts. eXplainable Artificial Intelligence (XAI) can address these issues but manually analyzing explanations generated by XAI techniques is time-consuming and prone to errors. This work proposes a novel framework that combines post-hoc explanations with semi-supervised learning to automatically identify anomalous explanations that deviate from those of correctly classified images and may therefore indicate model abnormal behaviors. This significantly reduces the workload for maintenance decision-makers, who only need to manually reclassify images flagged as having anomalous explanations. The proposed framework is applied to drone-collected images of insulator shells for power grid infrastructure monitoring, considering two different Convolutional Neural Networks (CNNs), GradCAM explanations and Deep Semi-Supervised Anomaly Detection. The average classification accuracy on two faulty classes is improved by 8% and maintenance operators are required to manually reclassify only 15% of the images. We compare the proposed framework with a state-of-the-art approach based on the faithfulness metric: the experimental results obtained demonstrate that the proposed framework consistently achieves F_1 scores larger than those of the faithfulness-based approach. Additionally, the proposed framework successfully identifies correct classifications that result from non-causal shortcuts, such as the presence of ID tags printed on insulator shells.
... Their findings demonstrate a reduction in peak power flows while considering economic aspects, such as self-consumption maximization and degradation prevention. Similarly, references [13,14] presented a control method for islanded and port microgrids that enhance RES utilization and limit BESS degradation. Reference [15] proposed a multiobjective BESS control method based on dynamic programming, which aims to maximize self-consumption, absorb supply-demand fluctuations, and avoid congestion for BESSs co-located with PV systems. ...
April 2025
Applied Energy
... Convex analysis is intimately related to economic theory, notably the study of utility functions, which depict rational consumer preferences in which utility grows with consumption but at a decreasing pace. For more current uses in several disciplines of applied sciences, we refer to [6][7][8][9][10] and the references therein. ...
May 2025
Reliability Engineering & System Safety
... Recent advancements in NLP-particularly the emergence of transformer-based models such as Bidirectional Encoder Representations from Transformers (BERT) and its Arabic counterparts-have significantly enhanced Arabic text processing. Comparative analyses have showed improved accuracy in text classification across various domains with the adoption of updated BERT models [23,24]. ...
May 2025
Reliability Engineering & System Safety
... As a result, accurate bearing fault diagnosis is essential for maintaining the safe and reliable operation of industrial equipment [3]. By detecting faults at an early stage, timely maintenance can be carried out, which not only minimises downtime and cost but also mitigates potential safety hazards [4][5][6][7][8]. ...
December 2024
Journal of Reliability Science and Engineering
... power supplies to charging stations. Furthermore, attacks involving demand falsification or manipulation can compromise the demand-response equilibrium of V2G systems, increasing instability and reducing system efficiency [29]. ...
December 2024
Energy Reports
... Additionally, processing large amounts of data in the cloud allows for training complex AI models, which are then deployed to edge devices for fast, context-aware decision-making. This continuous flow of data and real-time decisions is critical in scenarios like smart cities [38], healthcare [39,40], and predictive maintenance [41], where the timeliness and accuracy of information can enhance operational efficiency and safety. The integration between IoT, edge, and cloud is achieved through a combination of decentralized architectures and intelligent coordination mechanisms. ...
November 2024
Nuclear Engineering and Technology
... In related work, [36] achieves atomic-scale precision with a damage-free plasma source, yet also relies on extensive expert domain insights. Data-Driven Semiconductor Manufacturing Recently, machine learning has gained popularity for semiconductor process optimization [41,20,29,28,32,15,38,14]. For instance, [18] combines Bayesian optimization and human collaboration to optimize etching profiles, while [52] uses cascade recurrent neural networks (RNNs) trained on simulation data. ...
November 2024
Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability
... In particular, Human-Centered AI is asked to bridge the gap between AI and Intelligence Augmentation (IA), i.e., between automating processes and augmenting the capabilities of the human in the process [6]. This offers great opportunities for scientific and technological enhancements, but also poses new challenges to the competitiveness of the solution developers, with consequent new risks that must be evaluated and managed (e.g., [7]). ...
February 2024
Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk and Reliability
... INTRODUCTION pyforce (Python Framework for data-driven model Order Reduction of multi-physiCs problEms) is a Python library implementing Data-Driven Reduced Order Modelling (DDROM) techniques [1,2] for applications to multi-physics problems. ...
October 2024
The European Physical Journal Conferences
... The advantages of FSWPT align with broader trends in the maritime and shipping industries, which are undergoing a significant technological transition toward decarbonization [30]. The increasing adoption of carbon-neutral fuels, battery energy storage systems (BESS), and hybrid propulsion technologies reflects this shift [31]. Notably, the trend of ordering vessels with alternative fuel propulsion systems and integrating renewable energy sources into ship operations is accelerating. ...
October 2024
Journal of Cleaner Production