Author of the publication

Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures.

, , , and . IEEE Trans. Circuits Syst. II Express Briefs, 66-II (6): 1058-1062 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Ramp-Induced Data Attacks on Power System Operational Security., , , and . IEEE Trans. Ind. Informatics, 15 (9): 5064-5075 (2019)DC Microgrids: Economic Operation and Enhancement of Resilience by Hierarchical Control., and . IEEE Trans. Smart Grid, 5 (5): 2517-2526 (2014)A Data-Driven Finite-State Machine-Based Control for Hybrid Parallel Multiconverters: Fusion Topology for High-Power Applications., , , , , , , , and . IEEE Trans. Ind. Electron., 70 (12): 11853-11864 (2023)Screening Hidden N- $k$ Line Contingencies in Smart Grids Using a Multi-Stage Model., , and . IEEE Trans. Smart Grid, 10 (2): 1280-1289 (2019)Application of Rough Set Theory in Coal Gangue Image Process., and . IAS, page 87-90. IEEE Computer Society, (2009)EV Charging Command Fast Allocation Approach Based on Deep Reinforcement Learning With Safety Modules., , , and . IEEE Trans. Smart Grid, 15 (1): 757-769 (January 2024)Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 66-II (6): 1058-1062 (2019)A 1V fractional-N PLL with nonlinearity-insensitive modulator., , and . A-SSCC, page 1-4. IEEE, (2015)Gamification Design for Increasing Customer Purchase Intention in a Mobile Marketing Campaign App., , , , and . HCI (18), volume 8527 of Lecture Notes in Computer Science, page 440-448. Springer, (2014)SweetBuildingGreeter: A Demonstration of Persuasive Technology for Public Space., , , and . HCI (7), volume 9175 of Lecture Notes in Computer Science, page 475-486. Springer, (2015)