Results 51 to 60 of about 67,029 (331)
Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection
Recently, power systems are drastically developed and shifted towards cyber-physical power systems (CPPS). The CPPS involve numerous sensor devices which generates enormous quantities of information. The data gathered from each sensing component needs to
Hayam Alamro +5 more
doaj +1 more source
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang +3 more
core +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
CFDI: Coordinated false data injection attack in active distribution network
The active distribution network (ADN) can obtain measurement data, estimate system states, and control distributed energy resources (DERs) and flexible loads to ensure voltage stability.
Yang Liu +7 more
doaj +1 more source
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich +19 more
core +1 more source
An epi‐intraneural interface is developed through in silico optimization and a novel tridimensional microfabrication pipeline. The device integrates penetrating and epineural contacts on a flexible substrate. Mechanical, electrochemical, and in vivo testing in rat and pig reveal robust implantation, low‐threshold activation, and site‐dependent ...
Federico Ciotti +14 more
wiley +1 more source
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of ...
Pengyu Wen +4 more
doaj +1 more source
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
This study develops a placenta‐targeted nanodelivery system co‐loading HMGB1 protein and the NLRP3 agonist nigericin to establish an animal model of atonic postpartum hemorrhage. The model accurately recapitulates clinical phenotypes, including prolonged labor and uterine contractility dysfunction, while revealing inflammatory activation in placental ...
Jiangxue Qu +10 more
wiley +1 more source
False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment
In this paper, a new class of false data injection attacks (FDIAs) on contingency analysis (CA) through state estimation (SE) is proposed, and the economic impact of the proposed attacks on real-time power market operations is quantified.
Jeong-Won Kang +2 more
doaj +1 more source

