Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles J Tian, B Wang, R Guo, Z Wang, K Cao, X Wang IEEE Internet of Things Journal 9 (22), 22399-22409, 2021 | 143 | 2021 |
Achieving reliable and secure communications in wireless-powered NOMA systems K Cao, B Wang, H Ding, L Lv, J Tian, H Hu, F Gong IEEE transactions on vehicular technology 70 (2), 1978-1983, 2021 | 127 | 2021 |
Joint adversarial example and false data injection attacks for state estimation in power systems J Tian, B Wang, Z Wang, K Cao, J Li, M Ozay IEEE Transactions on Cybernetics 52 (12), 13699-13713, 2021 | 79 | 2021 |
Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission K Cao, H Ding, B Wang, L Lv, J Tian, Q Wei, F Gong IEEE Internet of Things Journal 9 (24), 24669-24681, 2022 | 76 | 2022 |
Secure transmission designs for NOMA systems against internal and external eavesdropping K Cao, B Wang, H Ding, T Li, J Tian, F Gong IEEE Transactions on Information Forensics and Security 15, 2930-2943, 2020 | 75 | 2020 |
On the security enhancement of uplink NOMA systems with jammer selection K Cao, B Wang, H Ding, L Lv, J Tian, F Gong IEEE Transactions on Communications 68 (9), 5747-5763, 2020 | 68 | 2020 |
Adversarial attacks and defense for CNN based power quality recognition in smart grid J Tian, B Wang, J Li, Z Wang IEEE Transactions on Network Science and Engineering 9 (2), 807-819, 2021 | 57 | 2021 |
Coordinated cyber‐physical attacks considering DoS attacks in power systems J Tian, B Wang, T Li, F Shang, K Cao International Journal of Robust and Nonlinear Control 30 (11), 4345-4358, 2020 | 54 | 2020 |
Exploring targeted and stealthy false data injection attacks via adversarial machine learning J Tian, B Wang, J Li, Z Wang, B Ma, M Ozay IEEE Internet of Things Journal 9 (15), 14116-14125, 2022 | 40 | 2022 |
LESSON: Multi-label adversarial false data injection attack for deep learning locational detection J Tian, C Shen, B Wang, X Xia, M Zhang, C Lin, Q Li IEEE Transactions on Dependable and Secure Computing, 2024 | 37 | 2024 |
ADS-B anomaly data detection model based on VAE-SVDD P Luo, B Wang, T Li, J Tian Computers & Security 104, 102213, 2021 | 37 | 2021 |
Adversarial attack and defense methods for neural network based state estimation in smart grid J Tian, B Wang, J Li, C Konstantinou IET Renewable Power Generation 16 (16), 3507-3518, 2022 | 31 | 2022 |
TOTAL: Optimal protection strategy against perfect and imperfect false data injection attacks on power grid cyber–physical systems J Tian, B Wang, T Li, F Shang, K Cao, R Guo IEEE Internet of Things Journal 8 (2), 1001-1015, 2020 | 31 | 2020 |
Adaptive cooperative jamming for secure communication in energy harvesting relay networks K Cao, B Wang, H Ding, J Tian IEEE Wireless Communications Letters 8 (5), 1316-1319, 2019 | 31 | 2019 |
Data‐Driven and Low‐Sparsity False Data Injection Attacks in Smart Grid J Tian, B Wang, X Li Security and Communication Networks 2018 (1), 8045909, 2018 | 28 | 2018 |
Dynamic temporal ADS-B data attack detection based on sHDP-HMM T Li, B Wang, F Shang, J Tian, K Cao Computers & Security 93, 101789, 2020 | 24 | 2020 |
Adaptive normalized attacks for learning adversarial attacks and defenses in power systems J Tian, T Li, F Shang, K Cao, J Li, M Ozay 2019 IEEE International Conference on Communications, Control, and Computing …, 2019 | 20 | 2019 |
Datadriven false data injection attacks against cyber-physical power systems J Tian, B Wang, J Li, C Konstantinou Computers & Security 121, 102836, 2022 | 16 | 2022 |
Deep reinforcement learning based uav for securing mmwave communications R Dong, B Wang, J Tian, T Cheng, D Diao IEEE Transactions on Vehicular Technology 72 (4), 5429-5434, 2022 | 15 | 2022 |
Online sequential attack detection for ADS-B data based on hierarchical temporal memory T Li, B Wang, F Shang, J Tian, K Cao Computers & Security 87, 101599, 2019 | 15 | 2019 |