AI-Cyber Research

成年人深夜福利在线观看

Overview

Research Infrastructure

CEROC maintains a robust and versatile research infrastructure designed to advance next鈥慻eneration AI鈥慍ybersecurity. Our capabilities center around two major pillars: cyber鈥憄hysical data generation for critical infrastructure security, and high鈥憄erformance compute resources for developing advanced AI models, including those trained on sensitive or controlled data.

Cyber-Physical Data Generation for Critical Infrastructure

CEROC operates a diverse ecosystem of cyber鈥憄hysical testbeds that enable researchers to generate high鈥慺idelity, multimodal cybersecurity datasets across multiple domains of national importance. These include:

      • Smart Power Systems Testbeds: for studying grid resilience, intrusion detection, and AI鈥慳ssisted protection of modern power infrastructures.
      • Smart Manufacturing Systems: providing realistic industrial control environments for evaluating cyber鈥憄hysical attack impacts and AI鈥慸riven anomaly detection.
      • Drone Swarm Security Testbed: supporting research on UAV swarm coordination, adversarial attacks, RF鈥憇ignal analysis, and multimodal intrusion detection.
      • Satellite and Space Systems Testbed: enabling experimentation with attack simulation, secure command鈥慳nd鈥慶ontrol, and AI鈥慹nabled anomaly detection in space鈥慳ir鈥慻round networks.

These testbeds produce rich cyber, physical, RF, and multimodal telemetry鈥攑owering cutting鈥慹dge AI models, digital twins, and cyber鈥憄hysical security research conducted by CEROC鈥檚 faculty, students, and partners.

drones flying in air

GPU鈥慐mpowered Cyber Range and AI Compute Infrastructure

Complementing the physical testbeds, CEROC operates a GPU鈥慹mpowered cyber range that provides the computational capacity required for training and deploying advanced AI models, including those built on sensitive or controlled data such as:

      • Malware datasets
      • Insider threat logs
      • Network intrusion records
      • Industrial control system telemetry
      • Drone and satellite communication traces

This secure compute environment supports training of:

      • Large Language Models (LLMs)
      • Deep learning architectures for intrusion detection
      • Generative AI models for cyber offense and defense
      • Adversarial machine learning pipelines

The cyber range allows researchers to experiment safely with high鈥憆isk datasets, explore red鈥憈eam/blue鈥憈eam AI strategies, and accelerate the development of trustworthy, resilient AI鈥慍yber solutions. The CEROC Cyber Range is a ten-node system developed at 成年人深夜福利在线观看 Tech using an internally written, dynamic platform scripting language to create training environments across the center's education, outreach, and research missions.  The combined systems provide 632 physical cores and 1256 hyper threads with 13 TB of RAM.  The system also includes four (4) Nvidia A100 80GB GPUs.  Storage includes a shared pool of 243TB and 800 GB cache store.

Selected Research Topics

  • AI鈥慉ssisted Cyber鈥慞hysical Security in Smart Manufacturing

    This research area introduces a domain鈥慳ware, AI鈥慸riven framework for securing subtractive and additive manufacturing systems. Using multi鈥憇ource data fusion and digital twin (DT) technology, the work enables safe experimentation with cyber鈥憄hysical attacks without disrupting production systems. A CNC鈥慴ased DT testbed generates diverse datasets for evaluating anomaly detection and classification methods, showing that detection accuracy varies by attack type and data fidelity. Extensions to additive manufacturing demonstrate the adaptability of the approach and highlight the importance of context鈥慳ware, data鈥慸riven monitoring to enhance the resilience of smart manufacturing environments.

  • AI鈥慐nhanced Physical Layer Security for 6G and Next鈥慓eneration Wireless Networks

    This topic explores AI鈥慸riven strategies to secure advanced wireless systems against emerging threats in dynamic environments. Contributions include a deep learning鈥慴ased physical layer secret鈥慿ey generation method that achieves high throughput and low key disagreement, as well as GAN鈥慴ased defenses that reduce eavesdropping viability by minimizing channel similarity between legitimate users and attackers. Additional work develops AI鈥慴ased physical layer authentication (PLA) techniques achieving high detection accuracy against adversarial behavior. These innovations establish a foundation for quantum鈥憆esilient, context鈥慳ware wireless communication security.

  • AI鈥慉ssisted Network Security for Cooperative Smart Farming

    This research addresses cybersecurity challenges in Cooperative Smart Farming (CSF) networks, where shared resources increase vulnerability to cross鈥慺arm attacks. Two smart鈥慺arming testbeds were built to collect network data under diverse cyberattacks. A CNN鈥慣ransformer edge anomaly detector supports real鈥憈ime intrusion detection, while a federated learning framework enables cross鈥慺arm collaboration without sharing raw data. Enhancements via transfer learning, model compression, and defenses against adversarial poisoning (including LLM鈥慴ased filtering) strengthen the robustness and scalability of secure smart agriculture ecosystems.

  • Adversarial Evasion Attacks and Defenses for ML鈥態ased Malware Detection

    This topic advances understanding of adversarial evasion (AE) attacks targeting deep learning鈥慴ased Windows malware detectors. A novel intra鈥憇ection code鈥慶ave injection method embeds adversarial perturbations while preserving malware functionality, improving stealth and flexibility. The work leverages explainable AI to optimize perturbation locations and extends to obfuscated malware and hardened detectors. Complementary defensive strategies include adversarial training and development of robust models resilient to diverse AE variants. The contributions provide a comprehensive taxonomy of AE attacks and practical defense mechanisms for modern malware classifiers.

  • AI鈥慏riven Cyber鈥慞hysical Security and Attack Classification for Power Systems

    This research theme advances the security of modern power grids by integrating cyber, physical, and topological data with state鈥憃f鈥憈he鈥慳rt machine learning. Using a comprehensive cyber鈥憄hysical testbed, multimodal datasets鈥攕uch as power measurements and network traffic鈥攁re collected to analyze complex attack scenarios including ransomware, denial鈥憃f鈥憇ervice, and multi鈥憀ocation false data injection (FDI). Advanced models such as multi鈥憈ask graph convolutional neural networks (GCNNs) capture spatial鈥憈emporal relationships across the grid, improving the detection and generalization of threats. Complementary deep learning approaches incorporate structural and topological information to enhance attack classification accuracy. Interpretability tools (e.g., SHAP) provide insights into critical cyber鈥憄hysical indicators, while transfer learning enables adaptation to new or evolving attack types. Together, these contributions establish a robust, interpretable, and scalable AI framework for defending critical power infrastructure using holistic, multi鈥憁odal analysis.

  • Multimodal Language Models (MMLMs) for Drone Swarm Threat Analysis

    This research evaluates whether multimodal language models can identify leader drones in coordinated UAV swarms using video inputs. Using a custom drone鈥憇warm testbed, state鈥憃f鈥憈he鈥慳rt MMLMs are tested for zero鈥憇hot reasoning and visual inference relevant to national security applications. While general鈥憄urpose models perform at random, fine鈥憈uned MMLMs show improved accuracy under constrained computational resources. The work demonstrates the potential for AI鈥慸riven threat analysis and real鈥憈ime disruption strategies against autonomous aerial swarms.

  • AI for Trust, Security, and Privacy in Decentralized Systems

    This topic focuses on securing decentralized infrastructures鈥攕uch as blockchains, smart contracts, smart cities, and IoT systems鈥攖hrough advanced AI, ML, and large language models (LLMs). Contributions include real鈥憈ime Ethereum full鈥憂ode monitoring for analyzing transaction propagation, mempool behavior, and miner extractable value (MEV). Research also examines vulnerabilities in consensus protocols such as BFT鈥慠aft, revealing insider attack surfaces. Additional projects include SmartComply, an LLM鈥憄owered framework that automates cybersecurity policy enforcement based on NIST 800鈥53, and an LLM鈥慸riven vulnerability detection engine that identifies smart contract flaws with higher accuracy than traditional ML models.

  • AI鈥慏riven Smishing Detection and Threat Visualization

    This research area integrates few鈥憇hot learning, graph鈥慴ased modeling, and secure language models (SLMs) to detect and interpret SMS phishing (smishing) attacks in real time. SmishViz, a graph鈥慴ased visualization system, provides dynamic monitoring and characterization of smishing campaigns to support threat intelligence workflows. Additional work analyzes the malicious use of generative AI in crafting deceptive messages, leading to AbuseGPT, a detection and mitigation framework for identifying AI鈥慻enerated smishing content. The contributions strengthen the security of mobile communication channels against evolving social engineering threats.

Publications

  • S. Poudel, J. Eileen Baugh, M. Abouyoussef, A. Takiddin, M. Ismail and S. S. Refaat, "Bidirectional GNN-Based Intrusion Detection of Malware Injection Attacks in EV Charging Stations," in IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2026.3651434.
  • U. A. Mughal, A. Elshazly, R. Atat and M. Ismail, "Generalizable Topology-Aware GNN-Based Intrusion Detection System for UAV Swarms," in IEEE Internet of Things Journal, vol. 13, no. 1, pp. 1569-1580, 1 Jan.1, 2026, doi: 10.1109/JIOT.2025.3630488.
  • C. Ke莽eci, R. Atat, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淒istributed detection and mitigation of FDIAs in smart grids via federated learning,鈥 International Journal of Electrical Power & Energy Systems, vol. 172, pp. 111126, 2025, doi: 10.1016/j.ijepes.2025.111126
  • M. Elyamani, M. F. Shaaban, M. H. Ahmed, M. Ismail, M. A. Azzouz and A. Ali, "Enhancing Observability in Distribution Grids: A Novel Approach to Mitigate Cyberattack Risks in Smart Grid Environments," in IEEE Access, vol. 13, pp. 171807-171817, 2025, doi: 10.1109/ACCESS.2025.3613488.
  • H. Keller, S. Aboelmagd, S. S. Refaat, A. Takiddin, M. Ismail and E. Serpedin, "Multi-Task Graph-Based Attack Detection and Localization in Cyber-Physical Power Systems," 2025 33rd European Signal Processing Conference (EUSIPCO), Palermo, Italy, 2025, pp. 1752-1756, doi: 10.23919/EUSIPCO63237.2025.11226574.
  • J. Richeson, S. Aboelmagd, U. Mughal, A. Takiddin and M. Ismail, "Ensemble Learning-Based Intrusion Detection System for Aerial Base Stations Against Adversarial Evasion Attacks," ICC 2025 - IEEE International Conference on Communications, Montreal, QC, Canada, 2025, pp. 2677-2682, doi: 10.1109/ICC52391.2025.11160712.
  • M. Elnour, R. Atat, A. Takiddin, M. Ismail, and E. Serpedin, 鈥淓igenvector centrality鈥慹nhanced graph network for attack detection in power distribution systems,鈥 Electric Power Systems Research, vol. 240, pp. 111339, 2025, doi: 10.1016/j.epsr.2024.111339.
  • E. Mahalal, E. Hasan, M. Ismail, Z. -Y. Wu, M. M. Fouda and Z. M. Fadlullah, "Deep Learning-based Physical Layer Authentication in LiFi Networks Under Multi - User Mobility," SoutheastCon 2025, Concord, NC, USA, 2025, pp. 776-781, doi: 10.1109/SoutheastCon56624.2025.10971591.
  • R. Atat, A. Takiddin, M. Ismail and E. Serpedin, "Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems," in IEEE Open Access Journal of Power and Energy, vol. 12, pp. 24-35, 2025, doi: 10.1109/OAJPE.2025.3530352.
  • S. R. Fahim et al., "Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability," in IEEE Open Access Journal of Power and Energy, vol. 12, pp. 12-23, 2025, doi: 10.1109/OAJPE.2024.3524268
  • S. R. Fahim, R. Atat, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淎n unsupervised approach to enhance cyber resiliency of power systems against false data injection attacks on voltage stability,鈥 International Journal of Electrical and Electronic Engineering & Telecommunications, vol. 14, no. 2, pp. 88鈥93, 2025.
  • M. M. Islam, R. Atat, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淓nhancing power grid management and incident response mechanisms through consortium blockchain,鈥 IET Smart Grid, vol. 8, no. 1, pp. e12203, 2025, doi: 10.1049/stg2.12203.
  • E. Mahalal et al., "Concept Drift Aware Wireless Key Generation in Dynamic LiFi Networks," in IEEE Open Journal of the Communications Society, vol. 6, pp. 742-758, 2025, doi: 10.1109/OJCOMS.2024.3524497.
  • U. A. Mughal, R. Atat and M. Ismail, "Graph Neural Network-Based Intrusion Detection System for a Swarm of UAVs," MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM), Washington, DC, USA, 2024, pp. 578-583, doi: 10.1109/MILCOM61039.2024.10773671.
  • E. Mahalal, M. Ismail, Z. -Y. Wu, M. M. Fouda and Z. Md Fadlullah, "GAN-Assisted Secret Key Generation Against Eavesdropping In Dynamic Indoor LiFi Networks," 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), Washington, DC, USA, 2024, pp. 1-5, doi: 10.1109/VTC2024-Fall63153.2024.10757826.
  • A. Takiddin, M. Ismail, R. Atat and E. Serpedin, "Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids," in IEEE Transactions on Artificial Intelligence, vol. 5, no. 12, pp. 6601-6616, Dec. 2024, doi: 10.1109/TAI.2024.3464511.
  • S. R. Fahim et al., "Generalized FDIA Detection in Power Dependent Electrified Transportation Systems," 2024 32nd European Signal Processing Conference (EUSIPCO), Lyon, France, 2024, pp. 1851-1855, doi: 10.23919/EUSIPCO63174.2024.10715443.
  • A. Takiddin, R. Atat, H. Mbayed, M. Ismail and E. Serpedin, "Resilience of Data-Driven Cyberattack Detection Systems in Smart Power Grids," 2024 32nd European Signal Processing Conference (EUSIPCO), Lyon, France, 2024, pp. 1992-1996, doi: 10.23919/EUSIPCO63174.2024.10715330.
  • M. A. Islam, R. Atat and M. Ismail, "Software-Defined Networking-Based Resilient Proactive Routing in Smart Grids Using Graph Neural Networks and Deep Q-Networks," in IEEE Access, vol. 12, pp. 111169-111186, 2024, doi: 10.1109/ACCESS.2024.3438938.
  • J. Potts and M. Ismail, 鈥淗ybrid cyber鈥憄hysical intrusion detection system for smart manufacturing,鈥 The International FLAIRS Conference Proceedings, vol. 37, no. 1, 2024, doi: 10.32473/flairs.37.1.135587.
  • S. R. Fahim et al., "Graph Autoencoder-Based Power Attacks Detection for Resilient Electrified Transportation Systems," in IEEE Transactions on Transportation Electrification, vol. 10, no. 4, pp. 9539-9553, Dec. 2024, doi: 10.1109/TTE.2024.3355094. 
  • S. C. Hassler, U. A. Mughal and M. Ismail, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles," in IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 6, pp. 6106-6117, June 2024, doi: 10.1109/TITS.2023.3339728. 
  • B. Williams, G. Ciocarlie, K. Saleeby, M. Ismail and C. Mulkey, "Digital Twin of Cyber-Physical CNC for Smart Manufacturing," 2023 IEEE 3rd International Conference on Digital Twins and Parallel Intelligence (DTPI), Orlando, FL, USA, 2023, pp. 1-6, doi: 10.1109/DTPI59677.2023.10365463.
  • 路S. Poudel, J. E. Baugh, A. Takiddin, M. Ismail and S. S. Refaat, "Injection Attacks and Detection Strategy in Front-End Vehicle-to-Grid Communication," 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Glasgow, United Kingdom, 2023, pp. 1-6, doi: 10.1109/SmartGridComm57358.2023.10333927.
  • U. A. Mughal, S. C. Hassler and M. Ismail, "Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles," 2023 IEEE Conference on Communications and Network Security (CNS), Orlando, FL, USA, 2023, pp. 1-9, doi: 10.1109/CNS59707.2023.10288962.
  • U. A. Mughal, M. Ismail and S. A. A. Rizvi, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge," 2023 IEEE Conference on Communications and Network Security (CNS), Orlando, FL, USA, 2023, pp. 1-9, doi: 10.1109/CNS59707.2023.10289001.
  • R. Atat, M. Ismail and E. Serpedin, "Graphon-based Synthetic Power System Model and its Application in System Risk Analysis," 2023 IEEE International Smart Cities Conference (ISC2), Bucharest, Romania, 2023, pp. 1-6, doi: 10.1109/ISC257844.2023.10293721.
  • A. Takiddin, M. Ismail, R. Atat, K. R. Davis, and E. Serpedin, 鈥淕raph autoencoder鈥慴ased detection of unseen false data injection attacks in smart grids,鈥 in Intelligent Systems and Applications (IntelliSys 2023), Lecture Notes in Networks and Systems, vol. 822, Springer, Cham, 2024, doi: 10.1007/978鈥3鈥031鈥47721鈥8_16.
  • A. Takiddin, R. Atat, M. Ismail, K. Davis and E. Serpedin, "A Graph Neural Network Multi-Task Learning-Based Approach for Detection and Localization of Cyberattacks in Smart Grids," ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 2023, pp. 1-5, doi: 10.1109/ICASSP49357.2023.10096822.

Selected Funded Projects

 

Find us on Social Media

Contact Us

Cybersecurity Education, Research and Outreach Center

Office Hours: Monday鈥揊riday, 8AM鈥4:30PM CDT
(931) 372-3519 | ceroc@tntech.edu

Street Address:

Cybersecurity Education, Research and
Outreach Center (CEROC)
Ashraf Islam Engineering Building (AIEB) 238
1021 Stadium Dr.
Cookeville, TN 38501

Mailing Address:

成年人深夜福利在线观看 Tech University
Cybersecurity Education, Research and
Outreach Center (CEROC)
Campus Box 5134
Cookeville, TN 38505

CEROC logo

Cybersecurity Education, Research & Outreach Center

 

Learn more