Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on detection and localisation of false data injection attacks in smart grids
M Irfan, A Sadighian, A Tanveer… - IET Cyber‐Physical …, 2024 - Wiley Online Library
In the recent years, cyberattacks to smart grids are becoming more frequent. Among the
many malicious activities that can be launched against smart grids, the False Data Injection …
many malicious activities that can be launched against smart grids, the False Data Injection …
Markov game based on reinforcement learning solution against cyber–physical attacks in smart grid
K Bitirgen, ÜB Filik - Expert Systems with Applications, 2024 - Elsevier
The rapid expansion of information networks has amplified vulnerabilities in cyberspace,
particularly within the power grid and communication layers of smart grid systems …
particularly within the power grid and communication layers of smart grid systems …
Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features
T Zhu, J Wang, Y Zhu, H Chen, H Zhang… - International Journal of …, 2024 - Elsevier
The stability of power systems is paramount to industrial operations. The deleterious
inherent characteristics of false data injection attacks (FDIA) have drawn substantial interest …
inherent characteristics of false data injection attacks (FDIA) have drawn substantial interest …
Practical privacy-preserving electricity theft detection for smart grid
The detection of electricity theft, which focuses on privacy preservation and system security,
has been extensively researched in the smart grid. However, existing solutions have not …
has been extensively researched in the smart grid. However, existing solutions have not …
A Review and Analysis of Attack and Countermeasure Approaches for Enhancing Smart Grid Cybersecurity
A Meydani, H Shahinzadeh… - 2024 28th …, 2024 - ieeexplore.ieee.org
The Smart Grid (SG) is an advanced power network that facilitates the two-way exchange of
energy and information between consumers and providers. The field of cyber-physical smart …
energy and information between consumers and providers. The field of cyber-physical smart …
FDIA localization and classification detection in smart grids using multi-modal data and deep learning technique
J Wang, H Chen, Y Si, Y Zhu, T Zhu, S Yin… - Computers and Electrical …, 2024 - Elsevier
False data injection attacks (FDIA) exploit the vulnerabilities of bad data detection in energy
management systems to maliciously tamper with state estimation results, seriously …
management systems to maliciously tamper with state estimation results, seriously …
Embedding-enhanced graph attention networks for imbalanced industrial fault diagnosis
C Zhang, Y Li, L Fan, L Shen, T Qin - IEEE Access, 2024 - ieeexplore.ieee.org
Intricate nonlinear interactions among measurements and imbalanced distribution of fault
samples pose considerable challenges for accurate fault diagnosis in modern industrial …
samples pose considerable challenges for accurate fault diagnosis in modern industrial …
Localization of coordinated cyber-physical attacks in power grids using moving target defense and machine learning
J Yu, Q Li, L Li - Electronics, 2024 - mdpi.com
Coordinated cyber-physical attacks (CCPAs) are dangerously stealthy and have
considerable destructive effects against power grids. The problem of stealthy CCPA …
considerable destructive effects against power grids. The problem of stealthy CCPA …
Distributed Unsupervised Detection for Robust Power System False Data Attacks via Flexible Dynamic Time War** Strategy
Z Wu, H Zhang, L Jiang, X Li - IEEE Transactions on Industrial …, 2024 - ieeexplore.ieee.org
This article studies the modeling method of false data injection attacks (FDIAs) considering
topological changes and relevant countermeasures. A novel robust FDIA model is built …
topological changes and relevant countermeasures. A novel robust FDIA model is built …
Nonlinear decoration-driven adaptive neural finite-time control for USVs with two rotatable thrusters under false data injection attacks and input saturation
X Meng, G Zhang, B Han - ISA transactions, 2025 - Elsevier
This study explores the trajectory tracking control problem in unmanned surface vessels
equipped with two rotatable thrusters in an adverse network environment beset by …
equipped with two rotatable thrusters in an adverse network environment beset by …