Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks., , , and . SmartGridComm, page 1-6. IEEE, (2018)Implication of Unobservable State-and-topology Cyber-physical Attacks., and . CoRR, (2015)Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization., , , and . CoRR, (2016)A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid., , , , , , , , , and 3 other author(s). CoRR, (2021)Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks., and . IEEE Trans. Smart Grid, 7 (4): 2016-2025 (2016)Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks., , , and . CoRR, (2017)A general method for estimating zonal transmission interface limits from nodal network data., , , , , , and . CoRR, (2023)The Role of Extended Horizon Methodology in Renewable-Dense Grids With Inter-Day Long-Duration Energy Storage., , , , , and . CoRR, (2024)N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences., , , and . CoRR, (2020)False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition., , , and . CoRR, (2017)