Results 51 to 60 of about 63,938 (281)
CFDI: Coordinated false data injection attack in active distribution network
The active distribution network (ADN) can obtain measurement data, estimate system states, and control distributed energy resources (DERs) and flexible loads to ensure voltage stability.
Yang Liu +7 more
doaj +1 more source
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex +3 more
core +1 more source
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho +9 more
wiley +1 more source
Observer-based H∞ PID control for discrete-time systems under hybrid cyber attacks
In this paper, the observer-based $ H_{\infty } $ PID control problem is studied for linear discrete-time systems subject to hybrid cyber attacks. Two sets of Bernoulli distributed stochastic variables are utilized to characterize the random nature of ...
Pengyu Wen +4 more
doaj +1 more source
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich +19 more
core +1 more source
Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón +6 more
wiley +1 more source
False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment
In this paper, a new class of false data injection attacks (FDIAs) on contingency analysis (CA) through state estimation (SE) is proposed, and the economic impact of the proposed attacks on real-time power market operations is quantified.
Jeong-Won Kang +2 more
doaj +1 more source
State vulnerability assessment against false data injection attacks in AC state estimators
The transformation of the conventional power grid into a smart grid has revolutionised the power industry. However, this has also made the power grid vulnerable to various cyberattacks.
Gaurav Khare +2 more
doaj +1 more source
Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles.
Kargl, Frank +2 more
core +1 more source
De Rerum Natura: How Do Halide Perovskites Self‐Heal From Damage?
How can lead‐halide‐perovskites self‐heal after damage from light, heat, mechanical strain, or radiation? We show that reversible chemical defects underly performance losses and recovery, highlighting the roles of halide and proton migration, redox‐driven reactions, and acid‐base equilibria.
Davide Raffaele Ceratti +2 more
wiley +1 more source

