Articles with "false data" as a keyword



Photo from wikipedia

False data injection against state estimation in power systems with multiple cooperative attackers.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.02.003

Abstract: Given the strong cyber-physical interactions in today's smart grid, false data injection (FDI) attack can readily mislead the state estimation and influence the system operation by manipulating meter measurements. In this paper, a new FDI… read more here.

Keywords: attack; data injection; power systems; false data ... See more keywords
Photo from wikipedia

Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.10.002

Abstract: The paper discusses the cooperative tracking problem of partially known cyber-physical multi-agent networked systems. In this system, there exist two cascaded chances for cyber-attacks. The local agent is of networked system type that is subjected… read more here.

Keywords: false data; control; data injection; cyber attacks ... See more keywords

Resilient event-triggered practically predefined-time heading control of ships with delay of steering gear and false-data-injection attacks

Sign Up to like & get
recommendations!
Published in 2025 at "Automatika"

DOI: 10.1080/00051144.2025.2546168

Abstract: The presence of time delays prevents the controller from responding to disturbances promptly, resulting in excessive overshoot and prolonged settling times. Moreover, traditional predefined-time stability theorems are not directly applicable to systems with operational delays.… read more here.

Keywords: time; control; false data; predefined time ... See more keywords

Secure control design for cooperative adaptive cruise control with a time-varying input delays under false data injection attacks

Sign Up to like & get
recommendations!
Published in 2024 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2024.2393696

Abstract: ABSTRACT Connected and Autonomous Vehicles (CAVs) are shaping the future of transportation systems; however, their future development requires consideration of the upcoming challenges with cyber-physical attacks. Cooperative Adaptive Cruise Control (CACC) is one of the… read more here.

Keywords: adaptive cruise; control; false data; cruise control ... See more keywords

False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2018.2888582

Abstract: False data injection (FDI) attack causes a disadvantage to the safety of a power system. In the past, the adversary launching FDI attack mostly needed the complete network topology information of the power system and… read more here.

Keywords: data injection; attack; topology; false data ... See more keywords

Detection of False Data Injection Attacks in Smart Grid Utilizing ELM-Based OCON Framework

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2902910

Abstract: False data injection (FDI) attacks, as a new class of cyberattacks, bring a severe threat to the security and reliable operation of the smart grid by damaging the state estimation of the power system. To… read more here.

Keywords: bus; data injection; false data; smart grid ... See more keywords

OLTC-Induced False Data Injection Attack on Volt/VAR Optimization in Distribution Systems

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2904959

Abstract: This paper presents a new class of false data injection attacks (FDIAs) on volt/VAR optimization (VVO), which may result in abnormal voltage conditions along the radial medium voltage (MV) distribution feeder with an on-load tap… read more here.

Keywords: optimization; data injection; volt var; attack ... See more keywords

Active Learning-Based XGBoost for Cyber Physical System Against Generic AC False Data Injection Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3014644

Abstract: With the exponential growth of information and communication technology, the traditional power system is gradually evolving into a cyber physical energy system (CPES) with frequently interactions between physical and cyber components. CPES indeed revolutionize the… read more here.

Keywords: system; cyber physical; data injection; learning based ... See more keywords
Photo from wikipedia

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3051300

Abstract: Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security. False data injection attacks (FDIAs) by manipulating measurements may cause wrong state estimation (SE) solutions… read more here.

Keywords: attack detection; data injection; attack; false data ... See more keywords

Reinforcement Learning-Based Detection for State Estimation Under False Data Injection

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3076538

Abstract: We consider the problem of network security under false data injection attacks over wireless sensor networks.To resist the attacks which can inject false data into communication channels according to a certain probability, we formulate the… read more here.

Keywords: false data; data injection; detection; reinforcement learning ... See more keywords

Leader-Following Consensus of Multiple Euler-Lagrange Systems Under Deception Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3096079

Abstract: In this paper, the leader-following consensus problem of a multi-Euler-Lagrange system is studied under deception attacks, where attackers can inject the false data into the data being exchanged over the communication network between two Euler-Lagrange… read more here.

Keywords: euler lagrange; consensus; false data; multiple euler ... See more keywords