[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data

Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …

Label noise analysis meets adversarial training: A defense against label poisoning in federated learning

E Hallaji, R Razavi-Far, M Saif… - Knowledge-Based …, 2023 - Elsevier
Data decentralization and privacy constraints in federated learning systems withhold user
data from the server. As a result, intruders can take advantage of this privacy feature by …

Cyber vulnerabilities of energy systems

AP Zhao, S Li, C Gu, X Yan, PJH Hu… - IEEE Journal of …, 2024 - ieeexplore.ieee.org
In an era characterized by extensive use of and reliance on information and communications
technology (ICT), cyber–physical power systems (CPPSs) have emerged as a critical …

Decentralized federated learning: A survey on security and privacy

E Hallaji, R Razavi-Far, M Saif… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Federated learning has been rapidly evolving and gaining popularity in recent years due to
its privacy-preserving features, among other advantages. Nevertheless, the exchange of …

Intrusion detection for Industrial Internet of Things based on deep learning

Y Lu, S Chai, Y Suo, F Yao, C Zhang - Neurocomputing, 2024 - Elsevier
Intrusion detection technology can actively detect abnormal behaviors in the network and is
important to the security of Industrial Internet of Things (IIOT). However, there are some …

[HTML][HTML] Identifying novelties and anomalies for incremental learning in streaming time series forecasting

L Melgar-García, D Gutiérrez-Avilés… - … Applications of Artificial …, 2023 - Elsevier
Time series data can be defined as a chronological sequence of observations on a variable
of interest. A streaming time series is a time series that arrives continuously at high speed …

Fault detection and robust security control for implicit jump systems against random FDI attacks and packet loss under memorized output-perceptive event-triggered …

Y Pang, G Zhuang, J **a, X **e - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper investigates fault detection and robust security control of implicit Markovian jump
(IMJ) systems affected by random false data injection (FDI) attacks and packet loss under …

Detection-performance tradeoff for watermarking in industrial control systems

H Zhu, M Liu, C Fang, R Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The watermarking method, which adds unique watermarks to data, has been widely used for
integrity attack detection in industrial control systems (ICSs). Existing literature generally …

Dynamic Event-Triggered Fuzzy Control of Networked Unmanned Surface Vehicles Under Hybrid Cyber Attacks

Y Ma, Z Hu, X Qi, S Hu, X **e, Y Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the realm of networked control systems for unmanned surface vehicles (USVs),
guaranteeing the precise positioning and stable control of USVs against cyber attacks has …

Stealthy false data injection attacks against the summation detector in cyber-physical systems

Y Liu, L Cheng, D Ye - IEEE Transactions on Industrial Cyber …, 2024 - ieeexplore.ieee.org
This article proposes an alternating false data injection attack strategy, which can bypass the
summation detector in cyber-physical systems. This attack strategy offsets the impact on …