Results 271 to 280 of about 474,494 (357)
Some of the next articles are maybe not open access.
Reinforcement Learning-Based False Data Injection Attacks in Smart Grids
IEEE Transactions on Industrial InformaticsFalse data injection (FDI) attacks construct attack vectors to inject false data into tampered meters with the goal of falsifying state estimation, but resulting in low successful attack rate with high attack costs in terms of the number of tampered ...
Liang Xiao +5 more
semanticscholar +1 more source
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
IEEE Transactions on Dependable and Secure ComputingDeep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have been studied in the field of single-label
Jiwei Tian +6 more
semanticscholar +1 more source
False data injection on EKF-based navigation control
2017 International Conference on Unmanned Aircraft Systems (ICUAS), 2017Small consumer unmanned aircraft systems (sUASs) have been involved in many security incidents recently. Current defense methods have serious limitations because they mostly try to physically capture an sUAS or jam its communications and its GPS signals to trigger its fail-safe features.
Wenxin Chen, Zhenhai Duan, Yingfei Dong
openaire +1 more source
IEEE transactions on industrial electronics (1982. Print)
In this article, we investigate the impact of potential state-dependent false data injection cyber-attacks on frequency synchronization and active power management in islanded ac microgrids.
Mahmood Jamali +4 more
semanticscholar +1 more source
In this article, we investigate the impact of potential state-dependent false data injection cyber-attacks on frequency synchronization and active power management in islanded ac microgrids.
Mahmood Jamali +4 more
semanticscholar +1 more source
Resilient Distributed Control Against False Data Injection Attacks for Demand Response
IEEE Transactions on Power SystemsTo maintain the power system balance, flexible load resources have been widely employed to provide operating reserves, which is named demand response (DR).
Shaohua Yang +3 more
semanticscholar +1 more source
IEEE Transactions on Automation Science and Engineering
In this paper, we consider the need for deployment in the long-distance safe longitudinal formation control task when the connected autonomous vehicle (CAV) platoon is subjected to malicious cyber attacks.
Panpan Zhu +3 more
semanticscholar +1 more source
In this paper, we consider the need for deployment in the long-distance safe longitudinal formation control task when the connected autonomous vehicle (CAV) platoon is subjected to malicious cyber attacks.
Panpan Zhu +3 more
semanticscholar +1 more source
IEEE Transactions on Automation Science and Engineering
To further the penetration level of renewable energy sources (RESs) in power systems, the paper integrates wind turbines into conventional load frequency control (LFC). A resilient model predictive control (MPC) framework is constructed in the context of
Zhijian Hu +4 more
semanticscholar +1 more source
To further the penetration level of renewable energy sources (RESs) in power systems, the paper integrates wind turbines into conventional load frequency control (LFC). A resilient model predictive control (MPC) framework is constructed in the context of
Zhijian Hu +4 more
semanticscholar +1 more source
Consensus-based filtering under false data injection attacks
European Journal of Control, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xia, Yuanyuan, Yang, Wen, Zhao, Zhiyun
openaire +2 more sources
IEEE Transactions on Automatic Control
This article provides a secure distributed output feedback model predictive control (DOFMPC) solution for the leader-following consensus problems of homogeneous linear disturbed multi-agent systems against multiple cyber attacks. The false data injection
Zhengcai Li +4 more
semanticscholar +1 more source
This article provides a secure distributed output feedback model predictive control (DOFMPC) solution for the leader-following consensus problems of homogeneous linear disturbed multi-agent systems against multiple cyber attacks. The false data injection
Zhengcai Li +4 more
semanticscholar +1 more source
DAMGAT-Based Interpretable Detection of False Data Injection Attacks in Smart Grids
IEEE Transactions on Smart GridFalse data injection attacks (FDIAs) significantly disrupt the secure operation of smart grids by manipulating the measured values collected by intelligent instruments.
Xiangjing Su +6 more
semanticscholar +1 more source

