Results 51 to 60 of about 67,029 (331)

Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection

open access: yesIEEE Access, 2023
Recently, power systems are drastically developed and shifted towards cyber-physical power systems (CPPS). The CPPS involve numerous sensor devices which generates enormous quantities of information. The data gathered from each sensing component needs to
Hayam Alamro   +5 more
doaj   +1 more source

False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

open access: yes, 2017
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang   +3 more
core   +1 more source

Smarter Sensors Through Machine Learning: Historical Insights and Emerging Trends across Sensor Technologies

open access: yesAdvanced Functional Materials, EarlyView.
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee   +17 more
wiley   +1 more source

CFDI: Coordinated false data injection attack in active distribution network

open access: yesIET Generation, Transmission & Distribution
The active distribution network (ADN) can obtain measurement data, estimate system states, and control distributed energy resources (DERs) and flexible loads to ensure voltage stability.
Yang Liu   +7 more
doaj   +1 more source

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

From In‐Silico Optimized Microfabrication to Experimental Validation: Engineering a Tridimensional Epi‐Intraneural Interface

open access: yesAdvanced Functional Materials, EarlyView.
An epi‐intraneural interface is developed through in silico optimization and a novel tridimensional microfabrication pipeline. The device integrates penetrating and epineural contacts on a flexible substrate. Mechanical, electrochemical, and in vivo testing in rat and pig reveal robust implantation, low‐threshold activation, and site‐dependent ...
Federico Ciotti   +14 more
wiley   +1 more source

Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks

open access: yesSystems Science & Control Engineering, 2021
In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of ...
Pengyu Wen   +4 more
doaj   +1 more source

One Breaker is Enough: Hidden Topology Attacks on Power Grids

open access: yes, 2015
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross   +2 more
core   +1 more source

New Insights into Atonic Postpartum Hemorrhage: Animal Model Construction Based on Placental Nanodelivery Systems

open access: yesAdvanced Healthcare Materials, EarlyView.
This study develops a placenta‐targeted nanodelivery system co‐loading HMGB1 protein and the NLRP3 agonist nigericin to establish an animal model of atonic postpartum hemorrhage. The model accurately recapitulates clinical phenotypes, including prolonged labor and uterine contractility dysfunction, while revealing inflammatory activation in placental ...
Jiangxue Qu   +10 more
wiley   +1 more source

False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment

open access: yesIEEE Access, 2018
In this paper, a new class of false data injection attacks (FDIAs) on contingency analysis (CA) through state estimation (SE) is proposed, and the economic impact of the proposed attacks on real-time power market operations is quantified.
Jeong-Won Kang   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy