DeepFed_ Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
DeepFed_ Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems
net/publication/351360140
CITATIONS READS
408 1,081
6 authors, including:
Tao Li
SEE PROFILE
All content following this page was uploaded by Beibei Li on 06 May 2021.
1551-3203 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
5616 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 8, AUGUST 2021
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
LI et al.: DEEPFED: FEDERATED DEEP LEARNING FOR INTRUSION DETECTION IN INDUSTRIAL CPS 5617
B. Threat Model
In the threat model, we consider cyber threats both targeting
the industrial CPSs and those aiming at our federated deep
learning framework.
1) Cyber Threats Against Industrial CPSs: Unlike tradi-
tional computer systems, industrial CPSs are being exposed
Fig. 2. System model under consideration. to not only traditional cyber threats, such as DoS and DDoS
attacks, but also a line of highly customized new cyber threats
in many areas. Particularly, a series of researchers have re- tailored to industrial systems, such as command injection and
cently conducted federated learning-based studies to achieve response injection attacks. In this article, we consider all the
intrusion detection. For example, in 2018, Preuveneers et al. abovementioned cyber threats, with a focus on the following.
[20] described a permissioned blockchain-based federated learn- a) Reconnaissance attacks are usually conducted for gather-
ing method to achieve an anomaly detection machine learning ing valuable information about industrial CPSs, mapping
model, where contributing parties in federated learning can be the network architectures, and identifying device features,
held accountable and have their model updates audited. In 2019, such as the manufacturer, model number, supported net-
Nguyen et al. [21] designed an autonomous self-learning dis- work protocols, and device addresses.
tributed system for detecting compromised IoT devices, which b) Response injection attacks are generally carried out to
employed a federated learning approach to achieve intrusion interfere with monitoring and reporting the state of a
detection. In the same year, Zhao et al. [22] proposed a multitask remote process in industrial CPSs. These attacks can
deep neural network in federated learning (MT-DNN-FL) to falsify responses reporting to querying parties, such that
perform network anomaly detection task. In 2020, Chen et al. biased system state information is provided.
[23] proposed a federated deep autoencoding Gaussian mixture c) Command injection attacks are launched often by in-
model (FDAGMM) to improve the disappointing performance jecting falsified control or configuration commands to
of traditional DAGMM in network anomaly detection caused by mislead system behaviors of industrial CPSs. Such attacks
limited data amount. can cause unauthorized modification of device configura-
tions, process setpoints, or communication destinations.
III. SYSTEM MODEL AND THREAT MODEL d) DoS attacks are mounted usually by flooding the targets
with superfluous requests in an extremely high frequency
In this section, we introduce the system model and threat
to exhaust the resources of server systems in industrial
model considered in this work.
CPSs, which can disrupt the services or prevent legitimate
requests from being fulfilled.
A. System Model 2) Cyber Threats Against Federated Learning Framework:
The system model under consideration is a federated deep In the considered federated deep learning framework, it is as-
learning framework (see Fig. 2), which mainly comprises three sumed that the trust authority is a fully trusted party, and the
types of entities, i.e., a trust authority, a cloud server, and K cloud server is a semihonest party who is honest in conducting
industrial agents. all the given tasks but curious about the model parameters of
1) Trust Authority: The trust authority undertakes the task of the intrusion detection model. Also, we assume that all indus-
bootstrapping the whole system, generating public keys trial agents are semihonest, who strictly follow the designed
and private keys for the Paillier public-key cryptosystem- protocols but may be interested in other agents’ data resources.
based secure communication protocol, as well as es- Further, it is also taken into consideration that malicious eaves-
tablishing secure communication channels for the cloud droppers or other external attackers may intercept with the
server and each industrial agent. communication links in an attempt to access both data resources
2) Cloud Server: The cloud server is responsible for building of each industrial CPSs and the parameters of the intrusion
a comprehensive intrusion detection model, by federating detection model. In this case, we consider the following two
the model parameters of those locally learned at each types of cyber threats.
industrial agent’s own premise. Multiple rounds of in- a) Eavesdropping of data resources: As for the industrial
teractions between the cloud server and each industrial CPS owners, their data resources for training the intrusion
agent are demanded in order to obtain a final “perfect” detection model, particularly for those attack examples,
intrusion detection model. are highly sensitive and even national critical. If shared
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
5618 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 8, AUGUST 2021
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
LI et al.: DEEPFED: FEDERATED DEEP LEARNING FOR INTRUSION DETECTION IN INDUSTRIAL CPS 5619
where GRUi , i ∈ {1, 2}, represents the ith GRU layer, h˜1 is a
hidden vector, and ν is the final output of the GRU module.
Fig. 3. Architecture of designed CNN-GRU model. When it comes to the CNN module, it treats x as a univariate
time series with multiple time steps
h1 = ConvBlock1 (x)
5) Local Model Updating by Industrial Agents: By decrypt-
h2 = ConvBlock2 (h1 )
ing the ciphertexts c using P araDecrypt(cj , SK(j ∈ T ), each
industrial agent obtains the updated model parameters w̃r . Then, h3 = ConvBlock3 (h2 )
the parameters of the local deep learning model are then updated
μ = Flatten (h3 ) (2)
by w̃r .
After R rounds (an empirically determined threshold) of where the ConvBlocki , i ∈ {1, 2, 3}, represents the ith convo-
interactions between the cloud server and industrial agents, a lutional block in the CNN module, h1 , h2 , h3 ∈ Rk are hidden
comprehensive deep learning-based intrusion detection model vectors. Then, the output of the three convolutional block is
can finally be obtained. As we can see from Algorithm 1, transferred to a flatten layer to be flattened, the result of which
each industrial agent Ak needs to conduct parameter encryption is μ. Following the CNN module and GRU module, μ and ν
and decryption tasks, which in total require T exponentiation are concatenated and then fed into the MLP module, which is
operations in Z∗n2 and a line of multiplication operations in Z∗n2 described by
(that can be relatively negligible) in each communication round.
In this way, the computational cost of each industrial agent Ak is c = Concate(μ, ν)
almost linearly proportionally to the total number of parameters h1 = FC1 (c)
T in a local deep learning model. As for the cloud server, it
only needs to perform K times of multiplication operations in h2 = FC2 (h1 )
Z∗n2 when aggregating all industrial agents’ model parameters τ = Dropout(h2 ) (3)
in each communication round.
where Concate represents the concatenation operation, c is
the concatenated result, FC1 and FC2 denotes the two fully
B. CNN-GRU-Based Intrusion Detection Model
connected layer, Dropout denotes the dropout layer. Moreover,
In this part, we introduce the newly designed CNN-GRU- h2 and τ are the output of the two fully connected layer and
based intrusion detection model. the dropout layer, respectively. At last, the softmax layer pro-
1) Model Architecture: The designed model is mainly com- vides the final classification result by ŷ = Softmax(τ ), where
posed of a CNN module and a GRU module, followed by an Softmax represents the softmax layer and y is the final classifi-
multilayer perceptron (MLP) module, and then a softmax layer cation result of the network traffic data.
(see Fig. 3), they are respectively described as below: Since the CNN-GRU model performs multiclassification to
a) CNN Module: The CNN module mainly involves three detect Γ types of attacks in industrial CPSs, the cross-entropy
convolutional blocks, and each convolutional block con- function is used as the loss function, which is defined by
sists of a convolutional layer, a batch normalization layer,
B−1 Γ−1
and a max-pooling layer. 1
L=− yi,j log ŷi,j (4)
b) GRU Module: The GRU module is composed of two B i=0 j=0
identical GRU layers.
c) MLP Module: The MLP module involves two fully con- where B denotes the batch size, yi,j is the true label, and ŷi,j
nected layers and a dropout layer (used to prevent the is the probability that the ith example is predicted to be the jth
model from overfitting). label.
d) Softmax Layer: The softmax layer is exploited to map the 2) Local Model Training: Each industrial agent Ak (k ∈ K)
nonnormalized output of the MLP module to a probability locally train the proposed deep learning model on their own
distribution over predicted classes. data resource Dk , with reference to Algorithm 2. Specifically,
Given a feature vector x (a one-dimensional vector denoting in the rth communication round, each industrial agent Ak first
the numerical features of a network traffic data example) being updates model parameters wkr based on the given updated model
the input of the designed model, the GRU module and CNN parameters w̃r . Then, using the same data resource Dk , indus-
module then process it, respectively. Specifically, as for the GRU trial agent Ak retrains the deep learning model based on the
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
5620 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 8, AUGUST 2021
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
LI et al.: DEEPFED: FEDERATED DEEP LEARNING FOR INTRUSION DETECTION IN INDUSTRIAL CPS 5621
TABLE I
NUMERICAL RESULTS OF INTRUSION DETECTION MODELS WITH VARYING COMMUNICATION ROUNDS UNDER THREE DIFFERENT SCENARIOS
A. Experiment Settings the performance with our designed model under the proposed
federated learning framework.
1) Environmental Setup: The designed CNN-GRU model is
4) Performance Metrics: Four common metrics are used to
implemented using the Keras API1 and the federated learning
evaluate the performance of the detection model as follows.
framework is built by a lightweight Python framework Flask.2
a) Accuracy: The results of the model to predict the correct
Our experiments are conducted on a Ubuntu 18.04.3 LTS plat-
proportion.
form with an Intel Xeon E5-2618L v3 CPU and an NVIDIA
b) Precision: The proportion of examples identified as cy-
GeForce RTX 2080TI GPU (64GB RAM).
berattacks that are indeed cyberattacks.
2) Data Resource Description and Partitioning: We conduct
c) Recall: The proportion of all cyberattacks examples cor-
experiments on a real data resource of a gas pipelining system
rectly identified as exact types of cyberattacks.
(one significant example of industrial CPSs) [28]. In this data
d) F-score: The weighted average of precision and recall.
resource, one class of network data under normal operations
Note that, the macro averaged values are utilized to com-
and seven classes under various cyberattacks are, respectively,
prehensively evaluate the performance of all considered
collected. Each piece of network data in this data resource
intrusion detection models.
contains 26 features and 1 label. In our experiments, the data
resource is divided into two major parts, i.e., 80% for training
and 20% for testing, and the training part is further divided into B. Performance Comparison with
even partitions to each industrial agent for local model training. State-of-the-Art Studies
Note that all the trained deep learning models are tested on the We first conduct experiments to compare the performance
same testing data. of our proposed DeepFed scheme with the abovementioned
3) Baseline Studies: In this work, we compare the perfor- baseline studies [21], [26], [27]. Three groups of experiments are
mance of our proposed DeepFed scheme with some state-of- conducted, where different numbers of industrial agents K = 3,
the-art studies, where federated learning frameworks are also 5, and 7 are, respectively, considered.
used. Schneble et al. [26] proposed a single layer MLP-based Table I shows the numerical results about the performance of
federated learning framework for attack detection in medical federated intrusion detection models, in terms of the accuracy,
CPSs. Also, Nguyen et al. [21] presented a three-hidden-layer precision, recall, and F-score, under three different scenarios
GRU-based federated self-learning system for intrusion detec- with R = 2, 4, 6, 8, and 10, respectively. It can be easily seen
tion in IoT networks. Further, Chen et al. [27] utilized a CNN- that, the proposed intrusion detection model outperforms other
based federated framework for data classifications, which is state-of-the-art studies on all metrics. As the number of com-
composed of two convolutional layers, two max-pooling layers, munication rounds R increases from 1 to 10, the performance
two fully connected layers, and one softmax layer. We fully of each intrusion detection model generally improves, and grad-
reproduce these deep learning models in our work and compare ually stabilizes when R is sufficiently large. It’s worth noting
that, we can obtain an accuracy, precision, recall, F-score of
99.20%, 98.86%, 97.34%, and 98.08%, respectively, when K =
1 Keras: Python deep learning library (http://keras.io/). 3, 99.20%, 98.85%, 97.45%, and 98.13% when K = 5, and
2 Flask: Python web development framework (http://flask.pocoo.org/). 99.20%, 98.85%, 97.47%, 98.14% when K = 7, respectively,
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
5622 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 8, AUGUST 2021
Fig. 4. Comparison of the accuracy and F-score of considered intrusion detection models with varying communication rounds under three different
scenarios.(a) Accuracy versus R (K = 3). (b) Accuracy versus R (K = 5). (c) Accuracy versus R (K = 7). (d) F-score versus R (K = 3). (e) F-score
versus R (K = 5). (f) F-score versus R (K = 7).
Fig. 5. Performance comparison of the local, ideal, and the proposed intrusion detection models under three different scenarios. (a) K = 3, R =
10. (b) K = 5, R = 10. (c) K = 7, R = 10.
with the communication round R = 10. Fig. 4 also visually as the performance of an ideal model built by a central entity
presents the numerical results of the accuracy and F-score of all using all the data resources. Fig. 5 shows the numerical results of
considered intrusion detection models with varying communi- all four metrics under the abovementioned local, ideal, and the
cation rounds, under K = 3, 5, and 7, respectively. It is clear that proposed intrusion detection models, respectively, with varying
all intrusion detection models tend to converge after sufficient settings of K. As we can see, all the local intrusion detection
rounds of communication with the cloud server. Importantly, models perform unsatisfactorily compared with the proposed
the proposed intrusion detection model has generally the best model. Importantly, we also observe that the proposed model
performance over other baselines. produces sufficiently good performance compared with the ideal
model. It is, therefore, worth noting that the proposed model
would be wise to all industrial CPS owners due to its high
C. Performance Comparison With performance in intrusion detection and the ability to preserve
Local and Ideal Models the privacy of their data resources.
In addition to the above experiments, we also carry out Furthermore, we also evaluate the performance of the local,
experiments to evaluate the performance of each locally built ideal, and our proposed models in detecting various types of
intrusion detection model using limited data resources as well cyber threats against industrial CPSs. The numerical results are
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
LI et al.: DEEPFED: FEDERATED DEEP LEARNING FOR INTRUSION DETECTION IN INDUSTRIAL CPS 5623
TABLE II
NUMERICAL RESULTS OF THE LOCAL, IDEAL, AND PROPOSED MODELS IN DETECTING VARIOUS TYPES OF CYBER THREATS (K = 5)
summarized in Table II (taking K = 5 as an example). As can [5] H. Bao, R. Lu, B. Li, and R. Deng, “BLITHE: Behavior rule based insider
be seen that the proposed intrusion detection model exhibits threat detection for smart grid,” IEEE Internet Things J., vol. 3, no. 2,
pp. 190–205, Apr. 2016.
excellent performance in terms of the precision, recall, and F- [6] M. Hao, H. Li, X. Luo, G. Xu, H. Yang, and S. Liu, “Efficient and privacy-
score while detecting multiple types of cyber threats against enhanced federated learning for industrial artificial intelligence,” IEEE
industrial CPSs, compared to a local model, and almost the same Trans. Ind. Informat., vol. 16, no. 10, pp. 6532–6542, Oct. 2019.
[7] B. Li, R. Lu, W. Wang, and K. R. Choo, “DDOA: A Dirichlet-based
performance compared to an ideal model. detection scheme for opportunistic attacks in smart grid cyber-physical
system,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 11, pp. 2415–2425,
Nov. 2016.
VI. CONCLUSION [8] K. Zetter, “Inside the cunning, unprecedented hack of Ukraine’s power
grid,” Wired, Mar. 2016. [Online]. Available: https://www.wired.com/
In this article, we proposed a federated deep learning scheme, 2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
[9] N. Falliere, L. O. Murchu, and E. Chien, “W32. Stuxnet dossier,” Symantec
named DeepFed, for detecting and mitigating cyber threats Corp., Tempe, AZ, USA, White paper, vol. 5, Feb. 2011.
against industrial CPSs. First, we developed a novel federated [10] Z. Bederna and T. Szadeczky, “Cyber espionage through botnets,” Secur.
learning framework for multiple industrial CPSs, enabling the J., vol. 33, no. 1, pp. 43–62, Mar. 2020.
[11] N. Sayfayn and S. Madnick, “Cybersafety analysis of the Maroochy Shire
collective building of a comprehensive intrusion detection model sewage spill,” MIT Interdisciplinary Consortium for Improving Critical
in a privacy-preserving way. In addition, we created a novel Infrastructure Cybersecurity, MIT Management Sloan School, Cambridge,
CNN-GRU-based intrusion detection model, which allows ef- MA, USA, Working Paper CISL 2017-09, vol. 9, May 2017.
[12] J. Felker and M. Edwards, “ICS-CERT Annual Assessment Report,”
fective detection of various types of cyber threats against in- Industrial Control Systems Cyber Emergency Response Team, 2017,
dustrial CPSs. Further, a Paillier-based secure communication vol. S508C. [Online]. Available: https://www.us-cert.gov/sites/default/
protocol was designed for the federated learning framework, files/Annual-Reports/FY2016-Industrial-Control-Systems-Assessment-
Summary-Report-S508C.pdf
which effectively preserves the security and privacy of model [13] K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, “Guide
parameters in the training process. Extensive experiments on a to Industrial Control Systems (ICS) Security,” U.S. Department of Com-
real industrial CPS dataset demonstrated the high effectiveness merce, Washington, D.C., USA, NIST-800-82 (R2), May 2015. [On-
line]. Available: https:// nvlpubs.nist.gov/nistpubs/SpecialPublications/
of the proposed DeepFed scheme as well as the superiorities NIST.SP.800-82r2.pdf
over state-of-the-art schemes. [14] C. Qiu, F. R. Yu, H. Yao, C. Jiang, F. Xu, and C. Zhao, “Blockchain-based
It is worth noting that the proposed scheme builds a federated software-defined industrial Internet of Things: A dueling deep Q -learning
approach,” IEEE Internet Things J., vol. 6, no. 3, pp. 4627–4639, Jun. 2019.
intrusion detection model mainly for same-domain industrial [15] M. Ismail, M. F. Shaaban, M. Naidu, and E. Serpedin, “Deep learn-
CPSs. Future research directions will focus on addressing cy- ing detection of electricity theft cyber-attacks in renewable distributed
bersecurity issues by federating data resources from different- generation,” IEEE Trans. Smart Grid, vol. 11, no. 4, pp. 3428–3437,
Jul. 2020.
domain industrial CPSs. [16] J. Yang, C. Zhou, S. Yang, H. Xu, and B. Hu, “Anomaly detection based on
zone partition for security protection of industrial cyber-physical systems,”
IEEE Trans. Ind. Electron., vol. 65, no. 5, pp. 4257–4267, May 2018.
REFERENCES [17] H. Wang, J. Ruan, G. Wang, B. Zhou, Y. Liu, X. Fu, and J. Peng, “Deep
learning-based interval state estimation of AC smart grids against sparse
[1] C. Lu, et al., “Real-time wireless sensor-actuator networks for industrial cyber attacks,” IEEE Trans. Ind. Informat, vol. 14, no. 11, pp. 4766–4778,
cyber-physical systems,” in Proceedings of the IEEE, vol. 104, no. 5, Nov. 2018.
pp. 1013–1024, May 2016. [18] H. Yang, L. Cheng, and M. C. Chuah, “Deep-learning-based network
[2] Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Blockchain and intrusion detection for SCADA systems,” in Proc. IEEE Conf. Commun.
federated learning for privacy-preserved data sharing in industrial IoT,” Netw. Secur., Washington, DC, USA, Jun. 10–12, 2019, pp. 337–343.
IEEE Trans. Ind. Informat., vol. 16, no. 6, pp. 4177–4186, Jun. 2020. [19] J. Liu, W. Zhang, T. Ma, Z. Tang, Y. Xie, W. Gui, and J. P. Niyoyita,
[3] B. Li, R. Lu, W. Wang, and K.-K. R. Choo, “Distributed host-based collabo- “Toward security monitoring of industrial cyber-physical systems via
rative detection for false data injection attacks in smart grid cyber-physical hierarchically distributed intrusion detection,” Expert Syst. Appl., vol. 158,
system,” J. Parallel Distrib. Comput., vol. 103, pp. 32–41, May 2017. pp. 113 578–113 400, Nov. 2020.
[4] C. Chen, J. Yan, N. Lu, Y. Wang, X. Yang, and X. Guan, “Ubiquitous [20] D. Preuveneers, V. Rimmer, I. Tsingenopoulos, J. Spooren, W. Joosen,
monitoring for industrial cyber-physical systems over relay-assisted wire- and E. Ilie-Zudor, “Chained anomaly detection models for federated
less sensor networks,” IEEE Trans. Emerg. Topics Comput., vol. 3, no. 3, learning: An intrusion detection case study,” Appl. Sci., vol. 8, no. 12,
pp. 352–362, Sep. 2015. pp. 2663–2683, Dec. 2018.
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
5624 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 8, AUGUST 2021
[21] T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and Jiarui Song is currently working toward the
A.-R. Sadeghi, “DÏoT: A federated self-learning anomaly detection system B.E. degree in cybersecurity with the College
for IoT,” in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Dallas, TX, USA, of Cybersecurity, Sichuan University, Chengdu,
July7–10, 2019, pp. 756–767. China.
[22] Y. Zhao, J. Chen, D. Wu, J. Teng, and S. Yu, “Multi-task network anomaly She has authored or coauthored works in
detection using federated learning,” in Proc. 10th Int. Symp. Inf. Commun. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Technol., Hanoi HaLong Bay, Vietnam, Dec.4–6, 2019, pp. 273–279. and IEEE Conference on Local Computer Net-
[23] Y. Chen, J. Zhang, and C. K. Yeo, “Network anomaly detection using works. Her current research interests include
federated deep autoencoding Gaussian mixture model,” in Proc. Int. Conf. intrusion detection, artificial intelligence, and so-
Mach. Learn. Netw., Paris, France, Dec.3–5, 2019, pp. 1–14. cial network analysis.
[24] M. J. Dworkin et al. Advanced Encryption Standard (AES), Nov. 2001, vol.
197. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.
FIPS.197.pdf
[25] P. Paillier, “Public-key cryptosystems based on composite degree resid-
uosity classes,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn.,
Cologne, Germany, Apr. 26–30, 1999, pp. 223–238.
[26] W. Schneble and G. Thamilarasu, “Attack detection using federated
learning in medical cyber-physical systems,” in Proc. Int. Conf. Comput. Rongxing Lu (Senior Member, IEEE) received
Commun. Netw., Valencia, Spain, Jul. 29–Aug. 1, 2019. the Ph.D. degree in cryptography from the
[27] Y. Chen, X. Qin, J. Wang, C. Yu, and W. Gao, “FedHealth: A federated Department of Electrical and Computer Engi-
transfer learning framework for wearable healthcare,” IEEE Intell. Syst., neering, University of Waterloo, Waterloo, ON,
vol. 35, no. 4, pp. 83–93, July–Aug. 2020. Canada, in 2012.
[28] T. Morris and W. Gao, “Industrial control system traffic data sets for He is an Associate Professor with the Faculty
intrusion detection research,” in Proc. Int. Conf. Critical Infrastruct. of Computer Science (FCS), University of New
Protection, Arlington, TX, USA, Mar.17–19, 2014, pp. 65–78. Brunswick (UNB), Fredericton, NB, Canada. Be-
fore that, he worked as an Assistant Profes-
sor with the School of Electrical and Electronic
Engineering, Nanyang Technological University
Beibei Li (Member, IEEE) received the B.E. (NTU), Singapore, from April 2013 to August 2016. He worked as a
(Hons.) degree in communication engineer- Postdoctoral Fellow with the University of Waterloo, from May 2012 to
ing from the Beijing University of Posts and April 2013.
Telecommunications, Beijing, China, in 2014, Dr. Lu is a Senior Member of IEEE Communications Society. He was
and the Ph.D. degree in cybersecurity from the the recipient of the most prestigious Governor Generals Gold Medal,
School of Electrical and Electronic Engineering, in 2012, the 8th IEEE Communications Society (ComSoc) Asia Pacific
Nanyang Technological University, Singapore, (AP) Outstanding Young Researcher Award, in 2013, and the 2016–17
in 2019. Excellence in Teaching Award, FCS, UNB. He currently serves as the
He is currently an Associate Professor with Vice-Chair (Conferences) of IEEE ComSoc CIS-TC.
the College of Cybersecurity, Sichuan Univer-
sity, Chengdu, China. He was invited as a Vis-
iting Researcher with the Faculty of Computer Science, University of
New Brunswick, Fredericton, Canada, from March to August 2018, and
also the research group of Networked Sensing and Control, College
of Control Science and Engineering, Zhejiang University, Hangzhou,
China, from February to April 2019. His has authored or coauthored Tao Li received the Ph.D. degree in com-
works in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, puter science from the University of Electronic
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, ACM Transactions on Science and Technology of China, Chengdu,
Cyber-Physical Systems, IEEE INTERNET OF THINGS JOURNAL, IFAC China, in 1994.
Automatica, Information Sciences, IEEE ICC, and IEEE GLOBECOM, He is currently a Professor with the College
etc. His current research interests include several areas in security and of Cybersecurity, Sichuan University, Chengdu,
privacy issues on cyber-physical systems (e.g., smart grids, industrial China. He has authored or coauthored nearly
control systems, etc.), with a focus on intrusion detection techniques, 300 papers in IEEE, ACM, Chinese Science,
artificial intelligence, and applied cryptography. Science Bulletin, Natural Science Progress, and
Dr. Li is serving or has served as a Publicity Chair, Publication Co- other important journals and academic confer-
Chair, or a TPC member for several international conferences, including ences. His main research interests include im-
IEEE International Conference on Communications (ICC), IEEE Global mune computing, artificial immune systems, cloud computing, and cloud
Communications Conference (GLOBECOM), IEEE International Confer- storage.
ence on Computing, Networking and Communications (ICNC), IEEE In-
ternational Conference on Advanced Technologies for Communications
(ATC), and International Conference on Wireless Communications and
Signal Processing (WCSP).
Yuhao Wu is currently working toward the Liang Zhao (Member, IEEE) received the M.S.
B.E. degree in cybersecurity with the College degree in computer science from Chongqing
of Cybersecurity, Sichuan University, Chengdu, University, Chongqing, China, in 2009, and the
China. Ph.D. degree in informatics from Kyushu Univer-
He has authored or coauthored several pa- sity, Fukuoka, Japan, in 2012.
pers in IEEE TRANSACTIONS ON INDUSTRIAL He is currently an Assistant Professor with the
INFORMATICS, Knowledge-Based Systems, and College of Cybersecurity, Sichuan University,
International Conference on Web Information Chengdu, China. He was a Visiting Researcher
Systems Engineering, etc. His research in- with the Surrey Center for Cyber Security of
terests include cyber–physical system secu- United Kingdom, from 2017–2018. His current
rity, online social network security, and artificial research focuses on cryptography, in particular,
intelligence. provable security, verifiable (outsourced) computation, and postquantum
cryptography.
Authorized licensed use limited to: SICHUAN UNIVERSITY. Downloaded on May 06,2021 at 13:19:50 UTC from IEEE Xplore. Restrictions apply.
View publication stats