Results 61 to 70 of about 46,655 (287)
Detection and Estimation of False Data Injection Attacks for Load Frequency Control Systems
False data injection attacks (FDIAs) against the load frequency control (LFC) system can lead to unstable operation of power systems. In this paper, the problems of detecting and estimating the FDIAs for the LFC system in the presence of external ...
Jun Ye, Xiang Yu
doaj +1 more source
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho +9 more
wiley +1 more source
Impact of optimal false data injection attacks on local energy trading in a residential microgrid
This paper illustrates the vulnerability of local energy trading to false data injection attacks in a smart residential microgrid and demonstrates the impact of such attacks on the financial benefits earned by the participants.
Shama N. Islam, M.A. Mahmud, A.M.T. Oo
doaj +1 more source
False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication and control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Data Injection (FDI) into the ...
Abrar Mahi-al-rashid +3 more
doaj +1 more source
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón +6 more
wiley +1 more source
False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment
In this paper, a new class of false data injection attacks (FDIAs) on contingency analysis (CA) through state estimation (SE) is proposed, and the economic impact of the proposed attacks on real-time power market operations is quantified.
Jeong-Won Kang +2 more
doaj +1 more source
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex +3 more
core +1 more source
A high‐throughput in vivo mRNA LNP screening platform is developed and employed to screen a large library of 122 mRNA LNPs in vivo for delivery to immune, stromal, and parenchymal cells, identifying promising LNP candidates. A novel small particle flow cytometry‐based protein adsorption analysis method is utilized to interrogate protein corona ...
Alex G. Hamilton +17 more
wiley +1 more source
Tuning Windowed Chi-Squared Detectors for Sensor Attacks
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the ...
aström +6 more
core +1 more source

