Author of the publication

Joint Meter Coding and Moving Target Defense for Detecting Stealthy False Data Injection Attacks in Power System State Estimation.

, , , , and . IEEE Trans. Ind. Informatics, 20 (3): 3371-3381 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing-delay tradeoff for communication in cognitive radio enabled smart grid., , , , , and . SmartGridComm, page 155-160. IEEE, (2011)False Data Injection Attacks and Corresponding Countermeasure in DC Microgrid., , , , , and . CoRR, (2020)Scheduling of EV Battery Swapping-Part II: Distributed Solutions., , , , , , and . IEEE Trans. Control. Netw. Syst., 5 (4): 1920-1930 (2018)Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid., , , and . IEEE Trans. Ind. Informatics, 11 (6): 1597-1606 (2015)BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid., , , and . IEEE Internet Things J., 3 (2): 190-205 (2016)High-Reliability and Low-Energy Sensor Sharing in Vehicle Platoon Based on Multihop Millimeter-Wave Communication., , , and . IEEE Internet Things J., 9 (19): 18514-18526 (2022)On Reliability Bound and Improvement of Sensing-Based Semipersistent Scheduling in LTE-V2X., , and . IEEE Internet Things J., 8 (7): 6101-6113 (2021)A Survey on Electric Buses - Energy Storage, Power Management, and Charging Scheduling., , , and . IEEE Trans. Intell. Transp. Syst., 22 (1): 9-22 (2021)Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review., , , , , , , and . CoRR, (2023)Energy-efficient power allocation in cognitive sensor networks: a coupled constraint game approach., , , , and . Wirel. Networks, 21 (5): 1577-1589 (2015)