Author of the publication

Identification of Successive Ünobservable" Cyber Data Attacks in Power Systems Through Matrix Decomposition.

, , , , , , and . IEEE Trans. Signal Process., 64 (21): 5557-5570 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Issue on Power Technology and Policy: Forty Years After the 1965 Blackout., , , , , and . Proc. IEEE, 93 (11): 1883-1886 (2005)Synchrophasor Missing Data Recovery via Data-Driven Filtering., , , , and . IEEE Trans. Smart Grid, 11 (5): 4321-4330 (2020)A Flexible Phasor Data Concentrator Design Leveraging Existing Software Technologies., and . IEEE Trans. Smart Grid, 1 (1): 73-81 (2010)Coherency based decomposition and aggregation., , , and . Autom., 18 (1): 47-56 (1982)Modeling, analysis and control of dynamic systems : William J. Palm, III.. Autom., 21 (3): 337 (1985)Phasor-measurement-based voltage stability margin calculation for a power transfer interface with multiple injections and transfer paths., , , , , , , , and . PSCC, page 1-6. IEEE, (2014)Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters., , and . IEEE Trans. Smart Grid, 9 (5): 5057-5066 (2018)Mass-Matrix Differential-Algebraic Equation Formulation for Transient Stability Simulation., , and . CoRR, (2020)Controller Synthesis of Wind Turbine Generator and Energy Storage System with Stochastic Wind Variations under Temporal Logic Specifications., , , and . CoRR, (2019)Optimal precooling of thermostatic loads under time-varying electricity prices., , and . ACC, page 1407-1412. IEEE, (2017)