Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Adaptive protection based on multi-agent systems for AC microgrids: A review
The bidirectional power flow, voltage/frequency dynamics, and reduced fault current
observed in microgrids pose significant challenges to the protection of electrical systems …
observed in microgrids pose significant challenges to the protection of electrical systems …
Cyber-physical integration for future green seaports: Challenges, state of the art and future prospects
To achieve the “carbon neutrality” target, multiple heterogeneous energy networks are
integrated within seaport areas to form a special energy system with tight “transportation …
integrated within seaport areas to form a special energy system with tight “transportation …
Multi-agent-based fault location and cyber-attack detection in distribution system
Accurate fault location is challenging due to the distribution network's various branches,
complicated topology, and the increasing penetration of distributed energy resources …
complicated topology, and the increasing penetration of distributed energy resources …
Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networks
State estimation plays a vital role in the stable operation of modern power systems, but it is
vulnerable to cyber attacks. False data injection attacks (FDIA), one of the most common …
vulnerable to cyber attacks. False data injection attacks (FDIA), one of the most common …
[HTML][HTML] Borderline SMOTE algorithm and feature selection-based network anomalies detection strategy
Y Sun, H Que, Q Cai, J Zhao, J Li, Z Kong, S Wang - Energies, 2022 - mdpi.com
This paper proposes a novel network anomaly detection framework based on data balance
and feature selection. Different from the previous binary classification of network intrusion …
and feature selection. Different from the previous binary classification of network intrusion …
Adaptive deep reinforcement learning algorithm for distribution system cyber attack defense with high penetration of DERs
With grid modernization, smart inverters are increasingly used to execute advanced controls
for distribution network reliability. However, this also increases the cyber-attack space. This …
for distribution network reliability. However, this also increases the cyber-attack space. This …
Anomaly detection using bi-directional long short-term memory networks for cyber-physical electric vehicle charging stations
With the increasing integration of electric vehicles (EVs) into the distributed energy
resources (DER) system, the security of EV charging stations (EVCS) from cyber-attacks is …
resources (DER) system, the security of EV charging stations (EVCS) from cyber-attacks is …
Recent control techniques and management of AC microgrids: A critical review on issues, strategies, and future trends
Distributed generation is considered as a key component of the emerging microgrid (MG)
concept, enabling the integration of renewable sources in a distributed network. The MG has …
concept, enabling the integration of renewable sources in a distributed network. The MG has …
A Hierarchical approach for isolating sensor faults from un-stealthy attacks in large-scale systems
M Ramadan, F Abdollahi - Journal of the Franklin Institute, 2024 - Elsevier
This paper proposes a novel hierarchical-adaptive threshold abnormal behavior
discrimination scheme (HATAD) for Lipschitz nonlinear large-scale systems with …
discrimination scheme (HATAD) for Lipschitz nonlinear large-scale systems with …
Distributed robust tracking control for multiple Euler–Lagrange systems with full‐state constraints and input saturation using an event‐triggered scheme
H Liu, G Du, X Tian, L Zou - International Journal of Robust and …, 2022 - Wiley Online Library
In this article, distributed tracking control is studied for multiple Euler–Lagrange systems in
the presence of external disturbances and input saturation. Specifically, full‐state …
the presence of external disturbances and input saturation. Specifically, full‐state …