Submitted:
22 June 2025
Posted:
24 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Power CPS in the AI Era: Opportunities and New Risks
1.2. From Static Defense to Dynamic Adversarial Co-Evolution
1.3. Contributions and Structure of This Review
- Characterizing the emerging class of AI-augmented cyber-physical threats, including adversarial ML, RL-based attacks, and coordinated multi-agent strategies.
- Analyzing the limitations of current AI-based defense mechanisms, particularly their vulnerability to adversarial manipulation and their lack of adaptive resilience.
- Proposing co-evolutionary defense frameworks, integrating adversarial game theory, digital twins, and human-in-the-loop mechanisms to counter evolving threats.
- Identifying research gaps, including theoretical, experimental, and organizational challenges in realizing dynamic, adaptive cyber-physical security for energy systems.
2. Adversarial Threat Evolution in AI-Enabled Power CPS
2.1. Traditional Cyber-Physical Attacks Revisited
2.2. The Emergence of AI-Augmented Attacks
2.3. Multi-Agent, Multi-Stage, and Coordinated Threat Dynamics
2.4. Summary of Evolving Adversarial Dynamics
3. AI for Defense: Current Capabilities and Limitations
3.1. Machine Learning-Based Anomaly Detection
3.2. Reinforcement Learning for Autonomous Defense
3.3. Federated Learning and Collaborative Defense
3.4. Challenges in Interpretability, Robustness, and Adaptation
4. Adversarial AI for Attack Strategy Evolution
4.1. GANs for Stealthy Attack Crafting
4.2. Reinforcement Learning-Based Attack Policy Optimization
4.3. Model Poisoning and Backdoor Attacks on AI Defenses
4.4. Exploiting Federated Learning in Distributed Defense
5. Co-Evolutionary Defense Frameworks
5.1. Adversarial Game Theory for Cyber-Physical Defense Design
5.2. Digital Twins and Co-Simulation Platforms for Dynamic Validation
5.3. Adaptive Defense Mechanisms with Human-in-the-Loop
5.4. Metrics for Evaluating Co-Evolutionary Resilience
6. Research Gaps and Future Directions
6.1. Theoretical Gaps in Adversarial Dynamics Modeling
6.2. Experimental Gaps in Large-Scale, Realistic Testing
6.3. Organizational and Policy Challenges in Adaptive Defense Adoption
6.4. Toward Fully Autonomous but Human-Supervised Defense Ecosystems
7. Conclusion
References
- Hassan Y G, Collins A, Babatunde G O, et al. AI-powered cyber-physical security framework for critical industrial IoT systems[J]. Machine learning, 2023: 27: 1158-1164. [CrossRef]
- Whig P, Aggarwal A, Ganeshan V, et al. AI for Secure and Resilient Cyber-Physical Systems[M]//Artificial Intelligence Solutions for Cyber-Physical Systems. Auerbach Publications, 40-63.
- Qu Z, Zhao T, Zhang Y, et al. Determination Method of Network Risk Propagation Threshold in Power CPS Based on Percolation Theory[J]. Automation of Electric Power Systems, 2020, 44(4): 16-23.
- Li Y, Yang Z, et al. Optimal scheduling of an isolated microgrid with battery storage considering load and renewable generation uncertainties[J]. IEEE Transactions on Industrial Electronics, 2018, 66(2): 1565-1575. [CrossRef]
- Chang J, Li Z, Kaveh M, et al. A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer[C]//2023 IEEE 9th World Forum on Internet of Things (WF-IoT). IEEE, 2023: 1-7.
- Zhang F, Huang Z, Kou L, et al. Data Encryption Based on a 9D Complex Chaotic System with Quaternion for Smart Grid[J]. Chinese Physics B, 2023, 32(1): 010502. [CrossRef]
- Bo X, Chen X, Li H, et al. Modeling Method for the Coupling Relations of Microgrid Cyber-Physical Systems Driven by Hybrid Spatiotemporal Events[J]. IEEE Access, 2021, 9: 19619-19631. [CrossRef]
- Li Y, Wang C, Li G, et al. Improving operational flexibility of integrated energy system with uncertain renewable generations considering thermal inertia of buildings[J]. Energy Conversion and Management, 2020, 207: 112526.. [CrossRef]
- Zeng Y, Dong P, Shi Y, et al. Analyzing the co-evolution of green technology diffusion and consumers’ pro-environmental attitudes: An agent-based model[J]. Journal of Cleaner Production, 2020, 256: 120384. [CrossRef]
- Lalouani W. AI Cyber Threat in Cyber Physical Systems[D]. University of Maryland, Baltimore County, 2022.
- Cao J, Wang Q, Qu Z, et al. Method for identifying false data injection attacks in power grid based on improved CNN-LSTM[J]. Electrical Engineering, 2025: 1-26.
- Kavitha D, Thejas S. Ai enabled threat detection: Leveraging artificial intelligence for advanced security and cyber threat mitigation[J]. IEEE Access, 2024, 12: 173127-173136.
- Tooki O O, Popoola O M. A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems[J]. Renewable Energy Focus, 2024: 100628. [CrossRef]
- Jiang Y, Wu S, Ma R, et al. Monitoring and defense of industrial cyber-physical systems under typical attacks: From a systems and control perspective[J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2023, 1: 192-207. [CrossRef]
- Li Y, Li Z, Chen L, et al. A false data injection attack method for generator dynamic state estimation[J]. Transactions of China Electrotechnical Society, 2019, 34: 3651-3660.
- Qu Z, Dong Y, Qu N, et al. Quantitative Assessment of Survivability of Power CPS Considering Load Optimization and Reconfiguration[J]. Automation of Electric Power Systems, 2019, 43(6): 15-24.
- Nweke L O, Yayilgan S Y. Opportunities and Challenges of Using Artificial Intelligence in Securing Cyber-Physical Systems[J]. Artificial Intelligence for Security: Enhancing Protection in a Changing World, 2024: 131-164.
- Namakshenas D, Yazdinejad A, Dehghantanha A, et al. IP2FL: Interpretation-based privacy-preserving federated learning for industrial cyber-physical systems[J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2024. [CrossRef]
- Wang L, Xu P, Qu Z, et al. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link[J]. Frontiers in Energy Research, 2021, 9: 666130. [CrossRef]
- Asevameh I O, Dopamu O M, Adesiyan J S. Enhancing resilience and security in the US power grid against cyber-physical attacks[J]. World Journal of Advanced Research and Reviews, 2024, 22(2): 1043-1052. [CrossRef]
- Li Y, Zhang S, Li Y. AI-enhanced resilience in power systems: Adversarial deep learning for robust short-term voltage stability assessment under cyber-attacks[J]. Chaos, Solitons & Fractals, 2025, 196: 116406.
- Lee S, Chae J, Jeon H, et al. Cyber-Physical AI: Systematic Research Domain for Integrating AI and Cyber-Physical Systems[J]. ACM Transactions on Cyber-Physical Systems, 2025, 9(2): 1-33. [CrossRef]
- Mala D J, Dhanapal A C T A, Sthapit S, et al. Integrating AI Techniques into the Design and Development of Smart Cyber-Physical Systems: Defense, Biomedical, Infrastructure, and Transportation[M]. CRC Press, 2025.
- Yao P, Yan B, Yang Q. Game Theoretical Decision-Making of Dynamic Defense in Cyber-Physical Power Systems under Cyber-Attacks[J]. ACM Transactions on Cyber-Physical Systems, 2025, 9(2): 1-21. [CrossRef]
- Yu Z. Cyber-Physical Security Through the Lens of AI-Enabled Systems[D]. Washington University in St. Louis, 2025.
- Abdalla* A S, Tang B, Marojevic V. AI at the Physical Layer for Wireless Network Security and Privacy[J]. Artificial Intelligence for Future Networks, 2025: 341-380.
- Kausar F, Deo S, Hussain S, et al. Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems[J]. Energies, 2024, 17(21): 5337. [CrossRef]
- Akpolat A N, Kalay M S. Defense Mechanism of PV-Powered Energy Islands Against Cyber-Attacks Utilizing Supervised Machine Learning[J]. Applied Sciences, 2025, 15(9): 5021. [CrossRef]
- Barboni A, Rezaee H, Boem F. Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach[J]. IEEE Transactions on Automatic Control, 2020, 65(9): 3728-3741. [CrossRef]
- Sharma G, Malley D J, Parle D, et al. Analysis and Study of Intelligent Testbed for Safeguarding Nuclear and Defense Industry from AI-Enabled Cyberattacks[C]//2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI). IEEE, 2024, 2: 1-6.
- Li Y, He S, Li Y, et al. Probabilistic charging power forecast of EVCS: Reinforcement learning assisted deep learning approach[J]. IEEE Transactions on Intelligent Vehicles, 2022, 8(1): 344-357.
- Oun A, Wince K, Cheng X. The Role of Artificial Intelligence in Boosting Cybersecurity and Trusted Embedded Systems Performance: A Systematic Review on Current and Future Trends[J]. IEEE Access, 2025. [CrossRef]
- Qu Z, Zhang Y, Qu N, et al. Method for Quantitative Estimation of the Risk Propagation Threshold in Electric Power CPS Based on Seepage Probability[J]. IEEE Access, 2018, 6: 68813-68823. [CrossRef]
- Lian Z, Shi P, Chen M. A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense and Design[J]. IEEE Internet of Things Journal, 2024. [CrossRef]
- Rani S, Kataria A, Kumar S, et al. A New Generation Cyber-Physical System: A Comprehensive Review from Security Perspective[J]. Computers & Security, 2024: 104095. [CrossRef]
- Kumari M, Gaikwad M, Chavan S A. A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare[J]. Discover Internet of Things, 2025, 5(1): 1-16. [CrossRef]
- Wang L, Qu Z, et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal-Topological Correlation[J]. IEEE Access, 2020, 8: 57260-57272. [CrossRef]
- Degtiareva O, Shyriaieva N, Kuklinova T. Artificial Intelligence Solutions for Cybersecurity in Energy Systems[C]//2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense). IEEE, 2024: 177-182.
- Wang Y, et al. Collaborative optimization of multi-microgrids system with shared energy storage based on multi-agent stochastic game and reinforcement learning[J]. Energy, 2023, 280: 128182. [CrossRef]
- Wang L, Qu Z, Li Y, et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation[J]. IEEE Access, 2020, 8: 57260-57272. [CrossRef]
- Bo X, Qu Z, Liu Y, et al. Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective[J]. Energy Reports, 2022, 8: 11235-11248. [CrossRef]
- Qu Z, Qu N, Zhou Y, et al. Extraction of Typical Operating Scenarios of New Power System Based on Deep Time Series Aggregation[J]. CAAI Transactions on Intelligence Technology, 2024, 1-17. [CrossRef]
- Okegbile S D, Gambo I P. Artificial intelligence-driven security framework for internet of things-enhanced digital twin networks[J]. Internet of Things, 2025, 31: 101564. [CrossRef]
- Chen L, Gu S, Wang Y, et al. Stacked Autoencoder Framework of False Data Injection Attack Detection in Smart Grid[J]. Mathematical Problems in Engineering, 2021, 2021(1): 2014345. [CrossRef]
- Li Y, Cao J, Xu Y, et al. Deep learning based on Transformer architecture for power system short-term voltage stability assessment with class imbalance[J]. Renewable and Sustainable Energy Reviews, 2024, 189: 113913. [CrossRef]
- Ijaz A, Raza W, Farooq H, et al. An ai-enabled framework to defend ingenious mdt-based attacks on the emerging zero touch cellular networks[J]. IEEE Network, 2023, 38(1): 228-237. [CrossRef]
- Wang R, Zhou Z, Song J, et al. MORTAR: A Model-based Runtime Action Repair Framework for AI-enabled Cyber-Physical Systems[J]. arXiv preprint arXiv:2408.03892, 2024.
- Qu Z, Dong Y, Qu N, et al. Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation[J]. Mathematical Problems in Engineering, 2019, 2019: 2817586. [CrossRef]
- Lyu D, Song J, Zhang Z, et al. Autorepair: Automated repair for ai-enabled cyber-physical systems under safety-critical conditions[J]. arXiv preprint arXiv:2304.05617, 2023.
- Li Y, Li J, Chen L. Dynamic state estimation of synchronous machines based on robust cubature Kalman filter under complex measurement noise conditions[J]. Transactions of china electrotechnical society, 2019, 34(17): 3651-60.
- Gaba S, Budhiraja I, Kumar V, et al. An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning[J]. Ad Hoc Networks, 2024, 163: 103578. [CrossRef]
- El-Hajj M, Itäpelto T, Gebremariam T. Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications[J]. Security and Privacy, 2024, 7(5): e396. [CrossRef]
- Chen L, Jin P, Yang J, et al. Robust Kalman Filter-Based Dynamic State Estimation of Natural Gas Pipeline Networks[J]. Mathematical Problems in Engineering, 2021, 2021(1): 5590572. [CrossRef]
- Guinea-Cabrera M A, Holgado-Terriza J A. Digital twins in software engineering—a systematic literature review and vision[J]. Applied Sciences, 2024, 14(3): 977. [CrossRef]
- Aghazadeh Ardebili A, Zappatore M, Ramadan A I H A, et al. Digital Twins of smart energy systems: a systematic literature review on enablers, design, management and computational challenges[J]. Energy Informatics, 2024, 7(1): 94. [CrossRef]
- Opranescu V, Ionita A D. Review of Cyber-Physical Systems Modeling with UML, SysML and MARTE[J]. IEEE Access, 2025. [CrossRef]
- Pirbhulal S, Chockalingam S, Abie H, et al. Cognitive digital twins for improving security in IT-OT enabled healthcare applications[C]//International Conference on Human-Computer Interaction. Cham: Springer Nature Switzerland, 2024: 153-163.
- González J, Barzellay Ferreira da Costa B, Tam V W Y, et al. Integration of 4.0 technologies towards the creation of digital twins[J]. International Journal of Construction Management, 2024: 1-18.
- Peruzzini M, Bilancia P, Majić T, et al. Human-centric digital twin: a transdisciplinary view[M]//Leveraging Transdisciplinary Engineering in a Changing and Connected World. IOS Press, 2023: 923-932.
- Li Y, Wei X, Li Y, et al. Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach[J]. IEEE Transactions on Smart Grid, 2022, 13(6): 4862-4872.
- Ngadi H, Bounceur A, Bezoui M, et al. Toward a digital twin IoT for the validation of AI algorithms in smart-city applications[C]//International Conference on Machine Learning for Networking. Cham: Springer Nature Switzerland, 2023: 108-117.
- Szymoniak S, Piątkowski J, Kurkowski M. Defense and Security Mechanisms in the Internet of Things: A Review[J]. Applied Sciences (2076-3417), 2025, 15(2). [CrossRef]
- Pourmadadkar M, Lezzi M, Corallo A. Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions[J]. IEEE Transactions on Engineering Management, 2024. [CrossRef]
- Metibemu O C, Adesokan-Imran T O, Ajayi A J, et al. Developing Proactive Threat Mitigation Strategies for Cloud Misconfiguration Risks in Financial SaaS Applications[J]. Journal of Engineering Research and Reports, 2025, 27(3): 393-413. [CrossRef]
- Li Y, Gao J, Li Y, et al. Physical Informed-Inspired Deep Reinforcement Learning Based Bi-Level Programming for Microgrid Scheduling[J]. IEEE Transactions on Industry Applications, 2025, 61(1): 1488-1500.
- Zhao Z, Li Z, Xie X, et al. Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing[J]. IEEE Journal on Selected Areas in Communications, 2025. [CrossRef]
- Majeed A, Patni S, Hwang S O. A Comprehensive Analysis of Privacy-Preserving Solutions Developed for IoT-Based Systems and Applications[J]. Electronics, 2025, 14(11): 2106. [CrossRef]
- Li Y, Li J, Wang Y. Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach[J]. IEEE Transactions on Industrial Informatics, 2021, 18(4): 2310-2320. [CrossRef]
- Routray K, Bera P. ZTAAC: Zero Trust Adaptive Authorization with CP-ABE for Context-Aware Data Protection[C]//2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS). IEEE, 2025: 814-816.
- He S, et al. Boosting communication efficiency in federated learning for multiagent-based multimicrogrid energy management[J]. IEEE Transactions on Neural Networks and Learning Systems, 2025, 36(5): 8592–8605. [CrossRef]
- Yu J, Shvetsov A V, Alsamhi S H. Leveraging machine learning for cybersecurity resilience in industry 4.0: Challenges and future directions[J]. IEEE Access, 2024. [CrossRef]
- Ullah H, Uzair M, Jan Z, et al. Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities[J]. Array, 2024: 100358. [CrossRef]
- Li Y, Li J, Wang Y, et al. Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach[J]. IEEE Transactions on Industrial Informatics, 2022, 18(4): 2310–2320. [CrossRef]
- Rizqi Z U, Chou S Y, Cahyo W N. A simulation-based Digital Twin for smart warehouse: Towards standardization[J]. Decision Analytics Journal, 2024, 12: 100509. [CrossRef]
- Qudus L. Resilient systems: building secure cyber-physical infrastructure for critical industries against emerging threats[J]. Int J Res Publ Rev, 2025, 6(1): 3330-46. [CrossRef]
- Shakeri Z, Benfriha K, Varmazyar M, et al. Production scheduling with multi-robot task allocation in a real industry 4.0 setting[J]. Scientific Reports, 2025, 15(1): 1795. [CrossRef]
- Huang H, Wlazlo P, Mao Z, et al. Cyberattack defense with cyber-physical alert and control logic in industrial controllers[J]. IEEE Transactions on Industry Applications, 2022, 58(5): 5921-5934. [CrossRef]
- Qu Z, Shi H, Wang Y, et al. Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability[J]. Processes, 2022, 10(7): 1351. [CrossRef]
- Aleisa M A. Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique[J]. Scientific Reports, 2025, 15(1): 1-21.
- Acquaah Y T, Kaushik R. Normal-only Anomaly detection in environmental sensors in CPS: A comprehensive review[J]. IEEE Access, 2024. [CrossRef]
- Laxmi Lydia E, Ramesh S N, Denisovich V, et al. African buffalo optimization with deep learning-based intrusion detection in cyber-physical systems[J]. Scientific Reports, 2025, 15(1): 10219. [CrossRef]
- Li Y, Zhang S, Li Y, et al. PMU Measurements-Based Short-Term Voltage Stability Assessment of Power Systems via Deep Transfer Learning[J]. IEEE Transactions on Instrumentation and Measurement, 2023, 72: 2526111.
- Sun J, et al. Indicator & crowding distance-based evolutionary algorithm for combined heat and power economic emission dispatch[J]. Applied Soft Computing, 2020, 90: 106158. [CrossRef]
- Hallaji E, Razavi-Far R, Saif M. Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems[J]. Applied Sciences, 2024, 14(19): 8840. [CrossRef]
- Chen L, Li Y, Huang M, et al. Robust Dynamic State Estimator of Integrated Energy Systems Based on Natural Gas Partial Differential Equations[J]. IEEE Transactions on Industry Applications, 2022, 58(3): 3303-3312. [CrossRef]
- Fard N E, Selmic R R, Khorasani K. A review of techniques and policies on cybersecurity using artificial intelligence and reinforcement learning algorithms[J]. IEEE Technology and Society Magazine, 2023, 42(3): 57-68. [CrossRef]
- Pimple J F, Sharma A, Mishra J K. Elevating Security Measures in Cyber-Physical Systems: Deep Neural Network-Based Anomaly Detection with Ethereum Blockchain for Enhanced Data Integrity[J]. Journal of Electrical Systems, 2023, 19(2).
- Al-Jaburi L R, Fadare O A, Al-Turjman F. Integrated AI Architecture and Fog Computing for Cyber-Physical Systems Autonomous Vehicles[M]//Smart Infrastructures in the IoT Era. Cham: Springer Nature Switzerland, 2025: 969-983.
- Wei L, Zhang Q. Detection of False Data Attacks in Smart Grids Based on Improved UKF[J]. Journal of System Simulation, 2023, 35(7): 1508.
- Pavão J, Bastardo R, Rocha N P. Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review[C]//International Conference on Information Technology and Applications. Singapore: Springer Nature Singapore, 2022: 501-512.
- Chunduri V, Alsaadi M, Gupta S, et al. Blockchain-Based Secure Trust Management Scheme for Internet of Vehicles Over Cyber-Physical System[J]. IEEE Transactions on Intelligent Transportation Systems, 2024. [CrossRef]
- Li Y, Ma W, Li Y, et al. Enhancing Cyber-Resilience in Integrated Energy System Scheduling with Demand Response Using Deep Reinforcement Learning[J]. Applied Energy, 2025, 379:124831.
- Byeon H, Jena S R, Bhargavi K N, et al. An intelligent cyber-physical system based-consensus algorithm for sustainable edge service provisioning in 6G-based IIoT applications[J]. Cyber-Physical Systems, 2025: 1-28. [CrossRef]
- Karimipour H, Derakhshan F. Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges[J]. AI-Enabled Threat Detection and Security Analysis for Industrial IoT, 2021: 1-6.
- Chehida S, Rutten E, Giraud G, et al. A model-based approach for self-adaptive security in CPS: Application to smart grids[J]. Journal of Systems Architecture, 2024, 150: 103118. [CrossRef]
- Pene P, Musa A A, Musa U, et al. Edge intelligence in smart energy CPS[M]//Edge Intelligence in Cyber-Physical Systems. Academic Press, 2025: 169-192.
- Chen L, Wang B. Robustness assessment of weakly coupled cyber-physical power systems under multi-stage attacks[J]. Electric Power Systems Research, 2024, 231: 110325. [CrossRef]
- Luo X, He J, Wang X, et al. Topology Optimization for Resilient Defense Strategies Against False Data Injection Attacks in Smart Grids[J]. Acta Automatica Sinica, 2023, 49(6): 1326-1338.
- Bahaa A, Sayed A, Elfangary L, et al. A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach[J]. Plos one, 2022, 17(12): e0278493. [CrossRef]
- Ahsan M S, Islam S, Shatabda S. A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT[J]. Swarm and Evolutionary Computation, 2025, 96: 101984.
- Liu F, et al. Bitcoin transaction strategy construction based on deep reinforcement learning[J]. Applied Soft Computing, 2021, 113: 107952. [CrossRef]
- Seema P N, Nair M G. The key modules involved in the evolution of an effective instrumentation and communication network in smart grids: a review[J]. Smart Science, 2023, 11(3): 519-537.
- Buksh Z, Sharma N A, Chand R, et al. Cybersecurity Challenges in Smart Grid IoT[J]. IoT for Smart Grid: Revolutionizing Electrical Engineering, 2025: 175-206.
- Mortlock T, Al Faruque M A. Adaptive Data Fusion for State Estimation and Control of Power Grids Under Attack[J]. IEEE Transactions on Industrial Informatics, 2024. [CrossRef]
- Wang Q, Tai W, Tang Y, et al. A review of false data injection attacks on cyber-physical power systems[J]. Acta Automatica Sinica, 2019, 45(1): 72-83.
- Chen L, Hui X, et al. Dynamic state estimation for integrated natural gas and electric power systems[C]//2021 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). IEEE, 2021: 397-402.
- Yang T, Liu Y C, Liu Y Z, et al. A review of the current status and trends in cyber-physical systems technology[J]. Journal of Electronics and Information, 2021, 43(12): 3393-3406.
- Zhu B Q, Guo Y H, Guo C X, et al. A review of security assessment and defense strategies for power cyber-physical systems under information failure threats[J]. Power System Protection and Control, 2021, 49(1): 178-187.
- Zhang B, Liu X, Yu Z C, et al. A review of artificial intelligence-based network attack detection in power systems[J]. High Voltage Engineering, 2022, 48(11): 4413-4426.
- Wang X J, Dou J M, Liu Z H, et al. A review and outlook on the application of explainable artificial intelligence in power systems[J]. Automation of Electric Power Systems, 2024, 48(4): 169-191.
- Chen Y F, Zhao Q, He Y J, et al. A review of artificial intelligence applications in power systems[J]. Distributed Energy, 2023, 8(6): 49-57.
- Yang B, Chen Y J, Yao W, et al. A review of power system stability assessment and decision-making based on next-generation artificial intelligence technologies[J]. Automation of Electric Power Systems, 2022, 46(22): 200-223.
- Patel C D, Aggarwal M, Chaubey N K. Enhancing Cyber-Physical Systems Security Through Advanced Defense Mechanisms[M]//Advancing Cyber Security Through Quantum Cryptography. IGI Global, 2025: 307-342.
- Li Y, He S, Li Y, et al. Federated multiagent deep reinforcement learning approach via physics-informed reward for multimicrogrid energy management[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024, 35(5): 5902 - 5914.
- Li B, Gao Z Y. Analysis and outlook on the application of artificial intelligence technology in smart grids[J]. China Electric Power, 2017, 50(12): 136.
- Zhou X, Feng J, et al. Non-intrusive load decomposition based on CNN–LSTM hybrid deep learning model[J]. Energy Reports, 2021, 7: 5762-5771. [CrossRef]
- Ding X, Wang H, Zhang X, et al. Dual nature of cyber–physical power systems and the mitigation strategies[J]. Reliability Engineering & System Safety, 2024, 244: 109958. [CrossRef]
- Zhou Z, Zhang J, Zhang X. A review on defense mechanism against the denial of service and false data injection in cyber-physical power systems[C]//2023 IEEE 6th International Electrical and Energy Conference (CIEEC). IEEE, 2023: 4539-4545.
- Bitirgen K, Filik Ü B. Markov game based on reinforcement learning solution against cyber–physical attacks in smart grid[J]. Expert Systems with Applications, 2024, 255: 124607. [CrossRef]
- Li J, Li H, Su Q. Dynamic load altering attack detection for cyber physical power systems via sliding mode observer[J]. International Journal of Electrical Power & Energy Systems, 2023, 153: 109320. [CrossRef]
- Dong L, Xu H, Park J H, et al. Intermediate-Variable-Based Robust State Estimation for Cyber–Physical Systems Against FDI Attacks[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2024, 71(5): 2719-2723. [CrossRef]
- Bitirgen K, Filik Ü B. Markov game based on reinforcement learning solution against cyber–physical attacks in smart grid[J]. Expert Systems with Applications, 2024, 255: 124607. [CrossRef]
- Huang J, Yang J, Zheng Z, et al. A novel probabilistic modeling for multilateral random attacks in cyber-physical system reliability analysis[J]. Quality and Reliability Engineering International, 2024, 40(5): 2620-2637. [CrossRef]
- Li J, Li Y, Su Q. Sequential Recovery of Cyber-Physical Power Systems Considering Cyber-Attacks[J]. Information Sciences, 2025: 122310. [CrossRef]
- Li Y, Li Z, Chen L. Dynamic State Estimation of Generators Under Cyber Attacks[J]. IEEE Access, 2019, 7: 125252-125267. [CrossRef]
- Liu F, Wu L, Liu Q, et al. Dynamic-Memory Event-Triggered Secure Control for Cyber-Physical Power Systems Under Hybrid Attacks[J]. IEEE Transactions on Network Science and Engineering, 2025. [CrossRef]
- Sun C, Su Q, Li J. Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems based on Integrated Control Decision[J]. IEEE Transactions on Information Forensics and Security, 2024. [CrossRef]
- Sun Z, Chen G, Ding Y, et al. Joint safety and security risk analysis in industrial cyber-physical systems: A survey[J]. IET Cyber-Physical Systems: Theory & Applications, 2024, 9(4): 334-349. [CrossRef]
- Qu Z, Xie Q, Liu Y, et al. Power Cyber-Physical System Risk Area Prediction Using Dependent Markov Chain and Improved Grey Wolf Optimization[J]. IEEE Access, 2020, 8: 82844-82854. [CrossRef]
- Zhong C, Li H, Zhou Y, et al. Virtual synchronous generator of PV generation without energy storage for frequency support in autonomous microgrid[J]. International Journal of Electrical Power & Energy Systems, 2022, 134: 107343. [CrossRef]
- Li Y, Zhang M, Chen C. A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems[J]. Applied Energy, 2022, 308: 118347. [CrossRef]
- Zhao A P, Gu C, Bao Z, et al. Optimizing Cyber Insurance and Defense for Multi-Energy Systems Under False Data Injections[J]. IET Renewable Power Generation, 2025, 19(1): e70011.
- Yang B, He G, Xin L, et al. Multi-sensor CPS security state estimation based on distributed detection and alarm switching[J]. Control Theory & Applications, 2024, 41(11):11-21.
- Bahrami J, Ebrahimabadi M, Younis M, et al. Digital Twin Based Topology Fingerprinting for Detecting False Data Injection Attacks in Cyber-Physical Systems[C]//ICC 2024-IEEE International Conference on Communications. IEEE, 2024: 2053-2058.
- Krishnaveni S, Chen T M, Sathiyanarayanan M, et al. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems[J]. Cluster Computing, 2024, 27(6): 7273-7306. [CrossRef]
- Zhang Y, Du C, Chen Z, et al. Digital Twin-Based Resilient Model Predictive Control for Industrial Cyber-Physical Systems[J]. IEEE Journal of Emerging and Selected Topics in Industrial Electronics, 2025. [CrossRef]
- Ma J, Guo Y, Fang C, et al. Digital-twin-based CPS anomaly diagnosis and security defense countermeasure recommendation[J]. IEEE Internet of Things Journal, 2024. [CrossRef]
- Li Q, Zhao F, Zhuang L, et al. Steady-state risk prediction analysis of power system based on power digital twinning[J]. Sustainability, 2023, 15(3): 2555. [CrossRef]
- Aziz A, Schelén O, Bodin U. Digital twin as a proxy for industrial cyber-physical systems[C]//Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks. 2023: 85-92.
- Adeyemo H B, Bahsoon R, Tiño P. Surrogate-based digital twin for predictive fault modelling and testing of cyber physical systems[C]//2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT). IEEE, 2022: 166-169.
- Kabir M R, Halder D, Ray S. Digital Twins for IoT-Driven Energy Systems: A Survey[J]. IEEE Access, 2024.
- Erceylan G, Akbarzadeh A, Gkioulos V. Leveraging digital twins for advanced threat modeling in cyber-physical systems cybersecurity[J]. International Journal of Information Security, 2025, 24(3): 1-18. [CrossRef]
- Long X, Ding Y, et al. Privacy-Preserving Graph Inference Network for Multi-Entity Wind Power Forecast: A Federated Learning Approach[J]. IEEE Transactions on Network Science and Engineering, 2025. [CrossRef]
- Lucchese M, Salerno G, Pugliese A. A Digital Twin-Based Approach for Detecting Cyber–Physical Attacks in ICS Using Knowledge Discovery[J]. Applied Sciences, 2024, 14(19): 8665. [CrossRef]
- Qu Z, Dong Y, Li Y, et al. Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach[J]. Applied Energy, 2024, 360: 122736. [CrossRef]
- Safavat S, Rawat D B. Digital Twin Based Asynchronous Federated Learning Enabled IDS for False Data Injection Attacks in Vehicular CPS[C]//2024 8th International Conference on Computer, Software and Modeling (ICCSM). IEEE, 2024: 19-23.
- Danilczyk W C. Digital Twin for Intelligent Cyber-Physical Systems[M]. University of Rhode Island, 2023.
- Krishnaveni S, Sivamohan S, Jothi B, et al. TwinSec-IDS: An Enhanced Intrusion Detection System in SDN-Digital-Twin-Based Industrial Cyber-Physical Systems[J]. Concurrency and Computation: Practice and Experience, 2025, 37(3): e8334.
- Ahmed C M, Umer M A, Liyakkathali B S S B, et al. Machine Learning for CPS Security: Applications, Challenges[J]. Machine Intelligence and Big Data Analytics for Cybersecurity Applications, 2020, 919: 397.
- Patel H, Akbarfam A J, Maleki H. A Survey on Digital Twin: From Industrial Applications to Cybersecurity[C]//2024 IEEE Smart World Congress (SWC). IEEE, 2024: 2111-2118.
- Choi W, Hudachek K, Koskey S, et al. Digital twin in the power generation industry[J]. JMST Advances, 2024, 6(1): 103-119. [CrossRef]
- Jayasinghe H, Gunawardane K, Nicholson R. Applications of Electrical Load Modelling in Digital Twins of Power Systems[J]. Energies (19961073), 2025, 18(4). [CrossRef]
- Zhou H, Li M, Sun Y, et al. Digital Twin-Based Cyber Range for Industrial Internet of Things[J]. IEEE Consumer Electronics Magazine, 2022, 12(6): 66-77. [CrossRef]
- Ribas Monteiro L F, Rodrigues Y R, Zambroni de Souza A C. Cybersecurity in cyber–physical power systems[J]. Energies, 2023, 16(12): 4556.
- Qu Z, Bo X, Yu T, et al. Active and Passive Hybrid Detection Method for Power CPS False Data Injection Attacks with Improved AKF and GRU-CNN[J]. IET Renewable Power Generation, 2022, 16: 1490-1508. [CrossRef]
- Heininger R, Jost T E, Stary C. Developing and Operating Digital Process Twins While Preserving Autonomy in CPS[C]//2024 26th International Conference on Business Informatics (CBI). IEEE, 2024: 50-59.
- Atalay M. A Service-Oriented Digital Twins Framework for Smart Grid Management[C]//2022 International Workshop on Secure and Reliable Microservices and Containers (SRMC). IEEE, 2022: 9-17.
- Van Dinter R, Tekinerdogan B, Catal C. Reference architecture for digital twin-based predictive maintenance systems[J]. Computers & Industrial Engineering, 2023, 177: 109099. [CrossRef]
- Pires F, Ahmad B, Moreira A P, et al. Digital twin based what-if simulation for energy management[C]//2021 4th IEEE international conference on industrial cyber-physical systems (ICPS). IEEE, 2021: 309-314.
- Jeong D Y, Baek M S, Lim T B, et al. Digital twin: Technology evolution stages and implementation layers with technology elements[J]. IEEE Access, 2022, 10: 52609-52620.
- Negri E, Cattaneo L, Pandhare V, et al. Integrating PHM into production scheduling through a Digital Twin-based framework[J]. IFAC-PapersOnLine, 2022, 55(19): 31-36. [CrossRef]
- Wang J, Jin C, Lee Y, et al. Energy Use Prediction Model in Digital Twin[C]//International conference on construction engineering and project management. Korea Institute of Construction Engineering and Management, 2022: 1256-1263.
- Jovanovic V, Kuzlu M, Cali U, et al. Digital twin in industry 4.0 and beyond applications[M]//Digital Twin Driven Intelligent Systems and Emerging Metaverse. Singapore: Springer Nature Singapore, 2023: 155-174.
- Wang Y, Wang S, Yang W, et al. A digital-twin-based adaptive multi-objective Harris Hawks Optimizer for dynamic hybrid flow green scheduling problem with dynamic events[J]. Applied Soft Computing, 2023, 143: 110274. [CrossRef]
- Li J, Wang J. Digital twin-driven management strategies for logistics transportation systems[J]. Scientific Reports, 2025, 15(1): 12186. [CrossRef]
- Li Y, Han M, Shahidehpour M, et al. Data-driven distributionally robust scheduling of community integrated energy systems with uncertain renewable generations considering integrated demand response[J]. Applied Energy, 2023, 335: 120749. [CrossRef]
- Sheikh Z A, Singh Y, Singh P K, et al. Defending the defender: Adversarial learning based defending strategy for learning based security methods in cyber-physical systems (cps)[J]. Sensors, 2023, 23(12): 5459. [CrossRef]
- Bai M, Liu P, Lv F, et al. Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations[C]//2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). IEEE, 2024: 816-825.
- Yang X, et al. Gaussian Mixture Model Uncertainty Modeling for Power Systems Considering Mutual Assistance of Latent Variables[J]. IEEE Transactions on Sustainable Energy, 2024, 1-4. [CrossRef]
- Feng X, Liu Y, Hu S. Machine learning for cyber-physical power system security[M]//Machine Learning for Embedded System Security. Cham: Springer International Publishing, 2022: 105-124.
- Sharma A, Kejriwal D, Pakina A K. Adversarial AI and cyber–physical system resilience: Protecting critical[J]. International Journal of Artificial Intelligence and Data Research, 2023, 14(2). [CrossRef]
- Tian P, Liao W, Qian C, et al. Foundation of secured edge intelligence in CPS[M]//Edge Intelligence in Cyber-Physical Systems. Academic Press, 2025: 297-323.
- Bhattacharjee A, Bai G, Tushar W, et al. Deebbaa: A benchmark deep black box adversarial attack against cyber-physical power systems[J]. IEEE Internet of Things Journal, 2024. [CrossRef]
- Alqaralleh B A Y, Aldhaban F, AlQarallehs E A, et al. Optimal machine learning enabled intrusion detection in cyber-physical system environment[J]. Computers, Materials & Continua, 2022, 72(3): 4691-4707. [CrossRef]
- Alqaralleh B A Y, Aldhaban F, AlQarallehs E A, et al. Optimal machine learning enabled intrusion detection in cyber-physical system environment[J]. Computers, Materials & Continua, 2022, 72(3): 4691-4707. [CrossRef]
- Figueroa H, Wang Y, Giakos G C. Adversarial attacks in industrial control cyber physical systems[C]//2022 IEEE international conference on imaging systems and techniques (IST). IEEE, 2022: 1-6.
- Kou L, Wu J, Zhang F, et al. Image encryption for Offshore wind power based on 2D-LCLM and Zhou Yi Eight Trigrams[J]. International Journal of Bio-Inspired Computation, 2023, 22(1): 53-64. [CrossRef]
- Vähäkainu J P, Lehto M J, Kariluoto A J E. Adversarial attack’s impact on machine learning model in cyber-physical systems[J]. Journal of Information Warfare, 2020, 19(4): 57-69.
- Pene P, Musa A A, Musa U, et al. Secured edge intelligence in smart energy CPS[M]//Edge Intelligence in Cyber-Physical Systems. Academic Press, 2025: 325-351.
- Li Y, Yang Z. Application of EOS-ELM with Binary Jaya-Based Feature Selection to Real-Time Transient Stability Assessment Using PMU Data[J]. IEEE Access, 2017, 5: 23092-23101. [CrossRef]
- Gipiškis R, Chiaro D, Preziosi M, et al. The impact of adversarial attacks on interpretable semantic segmentation in cyber–physical systems[J]. IEEE Systems Journal, 2023, 17(4): 5327-5334. [CrossRef]
- Chan M. Trustworthy machine learning for securing cyber-physical systems[D]. Rutgers University-School of Graduate Studies, 2024.
- Wu Y, Wei-Kocsis J. A practical and stealthy adversarial attack for cyber-physical applications[C]//The AAAI-22 Workshop on Adversarial Machine Learning and Beyond. 2022.
- Barve Y, Karve P, Gokhale A, et al. Research challenges in the design and composition of surrogate models for robust CPS: position paper[C]//Proceedings of the Workshop on Design Automation for CPS and IoT. 2021: 26-29.
- Madabhushi S, Dewri R. Mitigating Over-Generalization in Anomalous Power Consumption Detection using Adversarial Training[J]. ACM Transactions on Cyber-Physical Systems, 2025. [CrossRef]
- Lakshmiranganatha S, Manjunatha K A. Machine Learning and Deep Learning Approaches in Cyber-Physical Systems[M]//Secure and Smart Cyber-Physical Systems. CRC Press, 2024: 1-29.
- Zhang S, Xu Y, Xie X. Universal Adversarial Perturbations Against Machine Learning-Based Intrusion Detection Systems in Industrial Internet of Things[J]. IEEE Internet of Things Journal, 2024. [CrossRef]
- Li Y, Wang R, Li Y, et al. Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach[J]. Applied Energy, 2023, 329: 120291.
- Sayin B, Zoppi T, Marchini N, et al. Bringing Machine Learning Classifiers Into Critical Cyber-Physical Systems: a Matter of Design[J]. IEEE Access, 2025. [CrossRef]
- Haque N I, Shahriar M H, Dastgir M G, et al. A survey of machine learning-based cyber-physical attack generation, detection, and mitigation in smart-grid[C]//2020 52nd North American Power Symposium (NAPS). IEEE, 2021: 1-6.
- Olowononi F O, Rawat D B, Garuba M, et al. Security engineering with machine learning for adversarial resiliency in cyber physical systems[C]//Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications. SPIE, 2019, 11006: 605-611.
- Li F, Shen W, Bi Z, et al. Sparse Adversarial Learning for FDIA Attack Sample Generation in Distributed Smart Grids[J]. Computer Modeling in Engineering & Sciences (CMES), 2024, 139(2). [CrossRef]
- Neema H, Volgyesi P, Koutsoukos X, et al. Online testbed for evaluating vulnerability of deep learning based power grid load forecasters[C]//2020 8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems. IEEE, 2020: 1-6.
- Olowononi F O, Rawat D B, Liu C. Trust-based adversarial resiliency in vehicular cyber physical systems using reinforcement learning[C]//International Symposium on Security in Computing and Communication. Singapore: Springer Singapore, 2020: 139-151.
- Tahsini A, Dunstatter N, Guirguis M, et al. Deepbloc: a framework for securing cps through deep reinforcement learning on stochastic games[C]//2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020: 1-9.
- Riya F F, Hoque S, Sun J S, et al. Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid[J]. arXiv preprint arXiv:2301.12487, 2023.
- Broda-Milian K. The ART of CityLearn: Observation Perturbation Attacks and Mitigation for Reinforcement Learning Agents in a Cyber Physical Power System[J]. 2024.
- Song Q, Tan R, Ren C, et al. On credibility of adversarial examples against learning-based grid voltage stability assessment[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 21(2): 585-599. [CrossRef]
- Kou L, Li Y, Zhang F, et al. Review on monitoring, operation and maintenance of smart offshore wind farms[J]. Sensors, 2022, 22(8): 2822.
- Verma N, Kumar N, Sheikh Z A, et al. Machine Learning for the Cybersecurity of Robotic Cyber-Physical Systems: A Review[J]. Procedia Computer Science, 2025, 259: 1817-1826. [CrossRef]
- Edara P, Banerjee S, Joardar B K. Localization of Data Compromised by Hardware Attacks in Machine Learning enabled Cyber-Physical Edge Devices[J]. ACM Transactions on Cyber-Physical Systems, 2024. [CrossRef]
- Sarkar S. CAREER: Robustifying Machine Learning for Cyber-Physical Systems[J]. NSF Award Number 1845969. Directorate for Computer and Information Science and Engineering, 2019, 18(1845969): 45969.
- Cao Y, Yan J, Feng H, et al. SCAAE: Using Self-Supervised Contrastive Learning in Adversarial AutoEncoder for Anomaly Detection of Multivariate Time Series in Cyber Physics Systems[C]//2023 China Automation Congress (CAC). IEEE, 2023: 8102-8107.
- Ramachandran A, Gayathri K, Alkhayyat A, et al. Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems[J]. Computer Systems Science & Engineering, 2023, 46(2). [CrossRef]
- Jaisingh W, Nanjundan P, George J P. Machine learning in cyber threats intelligent system[M]//Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024: 1-20.
- Zhong K, Yang Z, Yu S, et al. Deep Reinforcement Learning-based Multi-Layer Cascaded Resilient Recovery for Cyber-Physical Systems[J]. IEEE Transactions on Services Computing, 2024. [CrossRef]
- Meyer T, Kaloudi N, Li J. A systematic literature review on malicious use of reinforcement learning[C]//2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS). IEEE, 2021: 21-28.
- Selvi K, Dilip G. Enhancing Cyber-Physical Systems Security: A Review of Deep Learning and Blockchain Integration[C]//2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN). IEEE, 2024: 725-734.
- Li Y, Wang B, Yang Z, et al. Hierarchical stochastic scheduling of multi-community integrated energy systems in uncertain environments via Stackelberg game[J]. Applied Energy, 2022, 308: 118392. [CrossRef]
- Hudani D, Haseeb M, Taufiq M, et al. A data-centric approach to generate invariants for a smart grid using machine learning[C]//Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems. 2022: 31-36.
- Li J, Jia C, Zhu X, et al. Dual-layer model for capacity optimization of hybrid energy storage system to reduce thermal power frequency modulation loss[J]. High Voltage Engineering, 2023, 49: 3965-3976.
- [212 Li K, Li F, Wang B, et al. False data injection attack sample generation using an adversarial attention-diffusion model in smart grids[J]. AIMS Energy, 2024, 12(6). [CrossRef]
- Babadi N, Karimipour H, Islam A. An Ensemble Learning to Detect Decision-Based Adversarial Attacks in Industrial Control Systems[C]//2023 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 2023: 879-884.
- Elsisi M, Su C L, Lin C H, et al. Enhancing resilient operation of distributed energy resources using reliable machine learning-based iot connectivity[C]//2024 IEEE/IAS 60th Industrial and Commercial Power Systems Technical Conference (I&CPS). IEEE, 2024: 1-6.
- Fang Z, Zhao D, Chen C, et al. Nonintrusive Appliance Identification with Appliance-Specific Networks[J]. IEEE Transactions on Industry Applications, 2020, 56(4): 3443-3452.
- Fernandes J M, Rivadeneira J E, Rodrigues A, et al. People 4.0—A model for Human-in-the-Loop CPS-based systems[J]. Computer Standards & Interfaces, 2025, 91: 103895.
- Li Y, Li J, Qi J, et al. Robust Cubature Kalman Filter for Dynamic State Estimation of Synchronous Machines Under Unknown Measurement Noise Statistics[J]. IEEE Access, 2019, 7: 29139-29148. [CrossRef]
- Maity A, Banerjee A, Gupta S K S. Detection of Unknown-Unknowns in Human-in-Loop Human-in-Plant Safety Critical Systems[J]. IEEE Transactions on Artificial Intelligence, 2025. [CrossRef]
- Cambeiro J M R A P. The Human in the loop in Cyber-Physical Systems: the case of Building Automation[D]. Universidade NOVA de Lisboa (Portugal), 2019.
- Banerjee A, Lamrani I, Gupta S K S. Synthesizing Operationally Safe Controllers for Human-in-the-Loop Human-in-the-Plant Hybrid Close Loop Systems[C]//International Conference on Pattern Recognition. Cham: Springer Nature Switzerland, 2024: 17-35.
- Nota G, Petraglia G. The Design of Human-in-the-Loop Cyber-Physical Systems for Monitoring the Ecosystem of Historic Villages[J]. Smart Cities, 2024, 7(5): 2966-2994. [CrossRef]
- Makri C, Gürdür Broo D, Neely A. Human-in-Loop Decision-Making and Autonomy: Lessons Learnt from the Aviation Industry Transferred to Cyber-Physical Systems[J]. Technologies, 2022, 10(6): 120. [CrossRef]
- Manolova A, Poulkov V, Tonchev K, et al. Challenges in the design of smart vehicular cyber physical systems with human in the loop[M]//Breakthroughs in smart city implementation. River Publishers, 2017: 165-186.
- Qin B, Liu D. Research Progress and Prospects on Analysis and Control of Power Grid Cyber-Physical Systems[J]. Proceedings of the CSEE, 2020, 40(18): 5816-5826.
- Gil M, Albert M, Fons J, et al. Engineering human-in-the-loop interactions in cyber-physical systems[J]. Information and software technology, 2020, 126: 106349. [CrossRef]
- Qu Z, Dong Y, Mugemanyi S, et al. Dynamic Exploitation Gaussian Bare-Bones Bat Algorithm for Optimal Reactive Power Dispatch to Improve the Safety and Stability of Power System[J]. IET Renewable Power Generation, 2022, 16: 1401-1424. [CrossRef]
- Rivadeneira J E, Borges G A, Rodrigues A, et al. A unified privacy preserving model with AI at the edge for Human-in-the-Loop Cyber-Physical Systems[J]. Internet of Things, 2024, 25: 101034. [CrossRef]
- Eskandar S, Wang J, Razavi S. Human-in-the-loop cyber-physical systems for construction safety[J]. Cyber-physical systems in the built environment, 2020: 161-173.
- Zhong C, Ding Y, Wang H, et al. Model predictive control strategy in waked wind farms for optimal fatigue loads[J]. Electric Power Systems Research, 2023, 224: 109793. [CrossRef]
- Jena S, Sundarrajan S, Meena A, et al. Human-in-the-loop control and security for intelligent cyber-physical systems (CPSs) and IoT[C]//XVIII International Conference on Data Science and Intelligent Analysis of Information. Cham: Springer International Publishing, 2022: 393-403.
- Cao J, Jin J, Ming Y, et al. Human-cyber-physical systems for energy internet—A review[J]. Energies, 2023, 16(15): 5624.
- Karunamurthy A, Kiruthivasan R, Gauthamkrishna S. Human-in-the-Loop Intelligence: Advancing AI-Centric Cybersecurity for the Future[J]. Quing: International Journal of Multidisciplinary Scientific Research and Development, 2023, 2(3): 20-43.
- Yang L, Sun Q, Zhang N, et al. Optimal energy operation strategy for we-energy of energy internet based on hybrid reinforcement learning with human-in-the-loop[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020, 52(1): 32-42. [CrossRef]
- Zeng Q, Nait-Abdesselam F. Enhancing UAV Network Security: A Human-in-the-Loop and GAN-Based Approach to Intrusion Detection[J]. IEEE Internet of Things Journal, 2025. [CrossRef]
- Han Q L. Secure and Safe MetaControl for Cyber Physical Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(12): 2177-2178.
- Sakhnini J, Karimipour H. AI and security of cyber physical systems: Opportunities and challenges[J]. Security of Cyber-Physical Systems: Vulnerability and Impact, 2020: 1-4.
- Guidotti D, Pandolfo L, Pulina L. A Systematic Literature Review of Supervised Machine Learning Techniques for Predictive Maintenance in Industry 4.0[J]. IEEE Access, 2025. [CrossRef]
- Parizad A, Baghaee H R, Alizadeh V, et al. Emerging Technologies and Future Trends in Cyber-Physical Power Systems: Toward a New Era of Innovations[J]. Smart Cyber-Physical Power Systems: Solutions from Emerging Technologies, 2025, 2: 525-565.
- Trivedi S, Aggarwal V, Rastogi R. Enhancing the Power of Cyber-Physical Systems Enabled with AI: An Introduction—Facts and Myths along with Modular Approach[J]. Artificial Intelligence Solutions for Cyber-Physical Systems, 1-39.
- Menon U V, Kumaravelu V B, Kumar C V, et al. AI-Powered IoT: A Survey on Integrating Artificial Intelligence with IoT for Enhanced Security, Efficiency, and Smart Applications[J]. IEEE Access, 2025.
- Cui J, Jin Y, Yu R, et al. A robust approach for the decomposition of high-energy-consuming industrial loads with deep learning[J]. Journal of Cleaner Production, 2022, 349: 131208. [CrossRef]
- Mohamed N. Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms[J]. Knowledge and Information Systems, 2025: 1-87. [CrossRef]
- Akinsola J E T, Abimbola R O, Adeagbo M A, et al. Application of Artificial Intelligence for DDoS Attack Detection and Prevention on Cyber Physical Systems Using Deep Learning[M]//Internet of Things and Cyber Physical Systems. CRC Press, 2022: 83-126.
- Ding D, Han Q L, Ge X, et al. Privacy-preserving filtering, control and optimization for industrial cyber-physical systems[J]. Science China Information Sciences, 2025, 68(4): 1-17.
- Abshari D, Sridhar M. A survey of anomaly detection in cyber-physical systems[J]. arXiv preprint arXiv:2502.13256, 2025.
- Tooki O O, Popoola O M. A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems[J]. Renewable Energy Focus, 2024: 100628. [CrossRef]
- Alomari M A, Al-Andoli M N, Ghaleb M, et al. Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions[J]. Energies, 2025, 18(1): 141. [CrossRef]
- Mejdi H, Elmadssia S, Koubaa M, et al. A Comprehensive Survey on Game Theory Applications in Cyber-Physical System Security: Attack Models, Security Analyses, and Machine Learning Classifications[J]. IEEE Access, 2024. [CrossRef]
- Zhong K, Yang Z, Yu S, et al. Deep Reinforcement Learning-based Multi-Layer Cascaded Resilient Recovery for Cyber-Physical Systems[J]. IEEE Transactions on Services Computing, 2024. [CrossRef]
- Ghorbani M, Ghassemi A, Alikhani M, et al. Using Kolmogorov–Arnold network for cyber-physical system security: A fast and efficient approach[J]. International Journal of Critical Infrastructure Protection, 2025: 100768. [CrossRef]
- Liu F, Lao K W, Gao L, et al. Predicting Power Outage at Low-Lying Area Substations During Storm Surge Disasters Using Multi-Grained Cascaded Forest[J]. IEEE Transactions on Industry Applications, 2025, 61(2): 2803-2812. [CrossRef]
- Ye X, Esnaola I, Perlaza S M, et al. Decentralized Stealth Attacks on Cyber-Physical Systems[J]. arXiv preprint arXiv:2505.07029, 2025.
- Mäkelburg J, Perez-Palacin D, Mirandola R, et al. Surveying Uncertainty Representation: A Unified Model for Cyber-Physical Systems[J]. arXiv preprint arXiv:2503.23892, 2025.
- Reiter H, Rathje P, Landsiedel O, et al. DPM-Bench: Benchmark for Distributed Process Mining Algorithms on Cyber-Physical Systems[J]. arXiv preprint arXiv:2502.09975, 2025.
- Bashir A, Shamszaman Z U, Song Z, et al. Co-evolutionary Dynamics of Attack and Defence in Cybersecurity[J]. arXiv preprint arXiv:2505.19338, 2025.
- Yamany W. Optimised Learning Models for Defending Against Cyber Attacks in Cyber-Physical Systems[D]. University of New South Wales (Australia), 2023.
- Sun Q, Yang G H. Anti-Disturbance Secure State Estimation for Continuous-Time Cyber-Physical Systems Under Sparse Sensor Attacks[J]. IEEE Internet of Things Journal, 2025.
- Kaloudi N, Li J. The ML-based sensor data deception targeting cyber–physical systems: A review[J]. Computer Science Review, 2025, 57: 100753. [CrossRef]
- Niu H, Jagannathan S. Optimal defense and control of dynamic systems modeled as cyber-physical systems[J]. The Journal of Defense Modeling and Simulation, 2015, 12(4): 423-438. [CrossRef]
- Casola V, De Benedictis A, Mazzocca C, et al. Designing secure and resilient cyber-physical systems: A model-based moving target defense approach[J]. IEEE Transactions on Emerging Topics in Computing, 2022. [CrossRef]
- Busari W A, Bello A A. Security, Trust, and Privacy in Cyber-physical Systems (CPS)[C]//2024 2nd International Conference on Cyber Physical Systems, Power Electronics and Electric Vehicles (ICPEEV). IEEE, 2024: 1-6.
| Threat Evolution Dimension | Traditional Attacks | AI-Enhanced Attacks |
|---|---|---|
| Attack Design | Scripted, rule-based | Data-driven, optimized using AI |
| Adaptability | Static strategies | Dynamic, adaptive, and learning-based |
| Coordination | Isolated attacks on single points | Multi-agent, cross-layer, and synchronized campaigns |
| Attack Objectives | Disrupt single processes or components | Maximize system-wide impact with stealth and persistence |
| Defense Evasion Techniques | Basic obfuscation or replay attacks | GAN-based evasion, adversarial ML, reinforcement learning |
| Exploitation of AI-Defense Limitations | Rare or non-existent | Model poisoning, backdoors, federated learning manipulation |
| Defense Strategy | Strengths | Limitations |
|---|---|---|
| ML-Based Anomaly Detection | Effective for known patterns; scalable to large datasets | High false positives; poor explainability; blind spots |
| Reinforcement Learning for Defense | Learns adaptive policies; minimizes operational impact | Simulation-reality gap; slow convergence; risk of unsafe decisions |
| Federated Learning for Collaboration | Privacy-preserving; scalable; context-specific learning | Model poisoning; Sybil attacks; communication overhead |
| General Challenges | Enhances detection and response automation | Vulnerable to adversarial attacks; lacks explainability; poor adaptation |
| Adversarial AI Technique | Offensive Capabilities | Defense Implications |
|---|---|---|
| GAN-Based Attack Crafting | Generates realistic but malicious data to evade detection | Requires temporal and cross-source anomaly validation |
| RL-Based Attack Optimization | Learns optimal multi-stage attack policies under operational constraints | Demands adaptive, game-theoretic defense strategies |
| Model Poisoning and Backdoors | Corrupts AI defenses to ignore or misclassify attacks | Necessitates secure training and model validation pipelines |
| Federated Learning Exploits | Manipulates distributed learning processes to degrade defense performance | Requires Byzantine-resilient aggregation and participant authentication |
| Defense Component | Capabilities | Challenges |
|---|---|---|
| Adversarial Game Theory | Models strategic interactions; optimizes defense resource allocation | Model realism and computational complexity |
| Digital Twins and Co-Simulation | Realistic multi-layer validation; operator training platforms | Scalability and integration complexity |
| Human-in-the-Loop Adaptive Defense | Combines AI automation with human judgment and oversight | Balancing speed and reliability in decision-making |
| Resilience Evaluation Metrics | Quantifies dynamic defense effectiveness and operational impacts | Defining standardized, actionable, and validated resilience metrics |
| Category | Key Gaps | Future Directions |
|---|---|---|
| Theoretical Modeling | Limited formalization of co-evolutionary dynamics and multi-agent adversarial games | Develop mathematically grounded, multi-objective, and human-aware models |
| Experimental Validation | Lack of high-fidelity testbeds, data availability, and standardized benchmarks | Build open, scalable testbeds and community-driven evaluation frameworks |
| Organizational and Policy Adoption | Resistance to dynamic defense; fragmented cross-sector coordination | Develop adaptive security policies and cross-sector governance structures |
| Human-AI Integration | Risks of full autonomy; lack of human-AI teaming frameworks | Design hybrid human-AI defense ecosystems with explainable interfaces |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).