[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data
Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …
management of power systems, complex and covert false data attacks pose a serious threat …
Label noise analysis meets adversarial training: A defense against label poisoning in federated learning
Data decentralization and privacy constraints in federated learning systems withhold user
data from the server. As a result, intruders can take advantage of this privacy feature by …
data from the server. As a result, intruders can take advantage of this privacy feature by …
Cyber vulnerabilities of energy systems
In an era characterized by extensive use of and reliance on information and communications
technology (ICT), cyber–physical power systems (CPPSs) have emerged as a critical …
technology (ICT), cyber–physical power systems (CPPSs) have emerged as a critical …
Decentralized federated learning: A survey on security and privacy
Federated learning has been rapidly evolving and gaining popularity in recent years due to
its privacy-preserving features, among other advantages. Nevertheless, the exchange of …
its privacy-preserving features, among other advantages. Nevertheless, the exchange of …
Intrusion detection for Industrial Internet of Things based on deep learning
Y Lu, S Chai, Y Suo, F Yao, C Zhang - Neurocomputing, 2024 - Elsevier
Intrusion detection technology can actively detect abnormal behaviors in the network and is
important to the security of Industrial Internet of Things (IIOT). However, there are some …
important to the security of Industrial Internet of Things (IIOT). However, there are some …
[HTML][HTML] Identifying novelties and anomalies for incremental learning in streaming time series forecasting
L Melgar-García, D Gutiérrez-Avilés… - … Applications of Artificial …, 2023 - Elsevier
Time series data can be defined as a chronological sequence of observations on a variable
of interest. A streaming time series is a time series that arrives continuously at high speed …
of interest. A streaming time series is a time series that arrives continuously at high speed …
Fault detection and robust security control for implicit jump systems against random FDI attacks and packet loss under memorized output-perceptive event-triggered …
Y Pang, G Zhuang, J **a, X **e - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper investigates fault detection and robust security control of implicit Markovian jump
(IMJ) systems affected by random false data injection (FDI) attacks and packet loss under …
(IMJ) systems affected by random false data injection (FDI) attacks and packet loss under …
Detection-performance tradeoff for watermarking in industrial control systems
The watermarking method, which adds unique watermarks to data, has been widely used for
integrity attack detection in industrial control systems (ICSs). Existing literature generally …
integrity attack detection in industrial control systems (ICSs). Existing literature generally …
Dynamic Event-Triggered Fuzzy Control of Networked Unmanned Surface Vehicles Under Hybrid Cyber Attacks
Y Ma, Z Hu, X Qi, S Hu, X **e, Y Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the realm of networked control systems for unmanned surface vehicles (USVs),
guaranteeing the precise positioning and stable control of USVs against cyber attacks has …
guaranteeing the precise positioning and stable control of USVs against cyber attacks has …
Stealthy false data injection attacks against the summation detector in cyber-physical systems
This article proposes an alternating false data injection attack strategy, which can bypass the
summation detector in cyber-physical systems. This attack strategy offsets the impact on …
summation detector in cyber-physical systems. This attack strategy offsets the impact on …