Author of the publication

Invited Paper: Detection of False Data Injection Attacks in Power Systems Using a Secured-Sensors and Graph-Based Method.

, , , , , and . SSS, volume 14310 of Lecture Notes in Computer Science, page 240-258. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invited Paper: Detection of False Data Injection Attacks in Power Systems Using a Secured-Sensors and Graph-Based Method., , , , , and . SSS, volume 14310 of Lecture Notes in Computer Science, page 240-258. Springer, (2023)Causality-based Cost Allocation for Peer-to-Peer Energy Trading in Distribution System., , and . CoRR, (2023)Computing a Strategic Decarbonization Pathway: A Chance-Constrained Equilibrium Problem., , and . CoRR, (2020)Distributionally Robust Decision Making Leveraging Conditional Distributions., , and . CDC, page 5652-5659. IEEE, (2022)Identification of Intraday False Data Injection Attack on DER Dispatch Signals., , , and . SmartGridComm, page 40-46. IEEE, (2022)The Content-Aware Caching for Cooperative Transcoding Proxies., , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 766-775. Springer, (2005)Load balancing algorithm of parallel vision processing system for real-time navigation., and . IROS, page 1860-1865. IEEE, (2000)An Efficient Iterative Procedure for Use With the Finite-Element Method. University of Illinois Urbana-Champaign, USA, (1973)Massive Multiple Sequence Alignment of 16S Bacterial Ribosomal RNAs Using ClustalW-Message Passing Interface (MPI) Based on Beowulf Linux System., , , , , and . CSB Workshops, page 241-242. IEEE Computer Society, (2005)