A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Active Learning-Based XGBoost for Cyber Physical System Against Generic AC False Data Injection Attacks
2020
IEEE Access
In this mechanism, a two-stage FDIA model is developed to generate training dataset for the machine learning-based detector, and an extreme gradient boosting (XGBoost) classifier is meticulously designed ...
INDEX TERMS Cyber physical energy system (CPES), false data injection attack (FDIA), extreme gradient boosting (XGBoost), FDIA defense. strategy. ...
In the proposed attack model, the attacker's goal is to create an illusion that any/some transmission lines in the attacking region are overloaded and thus result in a cascading failure of the target CPES ...
doi:10.1109/access.2020.3014644
fatcat:vtsg3bf2zjcijhnp5ocxykwjve
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
[article]
2022
arXiv
pre-print
In the end, the paper puts forward our security considerations on the future development of DT-based smart grid. ...
The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid. ...
ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants ...
arXiv:2205.11783v1
fatcat:fz43u2e6g5gyfepqz44tezelba
Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation
2021
Energies
This paper presents an extensive study of cybersecurity concerns in Smart grids in line with latest developments. ...
Relevant standardization and mitigation efforts are discussed in detail and then the classification of different cyber-attacks in smart grid domain with special focus on false data injection (FDI) attack ...
Conclusions This paper presents a review of cybersecurity vulnerabilities in smart grids. ...
doi:10.3390/en14092657
doaj:03eacdede5334708b849696c510e060c
fatcat:id4jsl26prdrvnttd76aka3yiu
Table of Contents
2020
2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2)
Based on Bloom Filter Classification for
on-site Sensing Tasks
751
Pa23-01
Application of Optical Wireless Communications for the 5G enforced Smart Grids
756
Pa23-02
Vulnerability Analysis ...
Smart Grids
3134
Po08-11
Correlation Analysis of Reactor Internal and External Vibration Based on Sum Squared
Residual
3139
Po08-12
Decoupling Analysis of Electromagnetic Loop Network Based ...
doi:10.1109/ei250167.2020.9347098
fatcat:uzijufuzb5ab3blgftr5niughe
2021 Index IEEE Internet of Things Journal Vol. 8
2021
IEEE Internet of Things Journal
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
Note that the item title is found only under the primary entry in the Author Index. ...
., +, JIoT June 15, 2021 10160-10169 Failure analysis A Dynamic Membership Group-Based Multiple-Data Aggregation Scheme for Smart Grid. ...
doi:10.1109/jiot.2022.3141840
fatcat:42a2qzt4jnbwxihxp6rzosha3y
Machine Learning Methods in Smart Lighting Towards Achieving User Comfort: A Survey
2022
IEEE Access
The Internet of things (IoT) concept with the end device, platform, and application layer plays an essential role in optimizing the advantages of LED lighting in the emergence of smart lighting. ...
Finally, an in-depth discussion of open issues and future challenges in increasing user comfort in smart lighting using activity recognition is also provided. ...
ACKNOWLEDGMENT The authors would like to thank Telkom University for funding the writing of this survey paper through the doctoral dissertation research scheme. ...
doi:10.1109/access.2022.3169765
fatcat:pg7usldrxvb33ejgorkbewtk2u
Massively Digitized Power Grid: Opportunities and Challenges of Use-inspired AI
[article]
2022
arXiv
pre-print
in the power grid. ...
This article presents a use-inspired perspective of the opportunities and challenges in a massively digitized power grid. ...
., cloud computing), the grid is vulnerable to the same cyber-attacks as a website, except the stakes are much higher: outages, energy theft, and loss of private data. ...
arXiv:2205.05180v1
fatcat:ecmq2wqy2nhk7e2zcabwdkhltq
Applications of Machine Learning in Networking: A Survey of Current Issues and Future Challenges
2021
IEEE Access
attack (Probe) Attacker attempt to locate the target systems in the network and subsequently exploit known vulnerabilities Remote-to-local (R2L) Attacker use to gain local access to the vulnerable machine ...
However, ML-based IDS requires features engineering, which can be complex and time consuming.
E. MALWARE ATTACKS IN MOBILE DEVICES Mobile devices are vulnerable to attacks, such as malware attacks. ...
doi:10.1109/access.2021.3069210
fatcat:4i7vykwabbattm5uh3mgsdmhvi
Program
2022
2022 International Conference on Decision Aid Sciences and Applications (DASA)
A maximum of 92.90% classification accuracy is obtained using the features of IMF-4 with 10-fold cross-validation. The results conclude that the proposed method can detect AD patients efficiently. ...
The present study aims to develop an automatic AD detection using Electroencephalogram (EEG) signal to alleviate these problems and to support neurologists. ...
Comparative analysis of the characteristics of various compensation topologies has been outlined in tabular form. ...
doi:10.1109/dasa54658.2022.9765271
fatcat:ttqppf4j3navnaxe653mrzmezi
Emerging Technologies for Smart Cities' Transportation: Geo-Information, Data Analytics and Machine Learning Approaches
2022
ISPRS International Journal of Geo-Information
With the recent increase in urban drift, which has led to an unprecedented surge in urban population, the smart city (SC) transportation industry faces a myriad of challenges, including the development ...
An objective of this paper was to acquaint researchers with the recent trends and emerging technologies for SC transportation applications, and to give useful insights to researchers on how these technologies ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/ijgi11020085
fatcat:bjkv6cu7zbfqbl7q7ezfhai5ya
A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications
2021
IEEE Access
In healthcare, practical use of a model requires it to be highly accurate and to have ample measures against security attacks. ...
The Internet of Things (IoT) is playing a vital role in the rapid automation of the healthcare sector. ...
CNNs are used extensively in areas that require visual interpretation of images with a grid-like topology. Alhussein et al. ...
doi:10.1109/access.2021.3059858
fatcat:gwdku6me2fhzbfwf7agtt5vmse
International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]
2020
2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)
ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study. ...
Kelaniya for their immense support and encouragement they gave throughout the development phase of the data sets. ...
Stealthy targeted attack 2. Double registration attack 3. Stale information attack 4. Denial of service attack 5. ...
doi:10.1109/scse49731.2020.9313027
fatcat:gjk5az2mprgvrpallwh6uhvlfi
State of the Art of Audio- and Video-Based Solutions for AAL
2022
Zenodo
In this respect, video- and audio-based AAL applications have several advantages, in terms of unobtrusiveness and information richness. ...
AAL capitalizes on the growing pervasiveness and effectiveness of sensing and computing facilities to supply the persons in need with smart assistance, by responding to their necessities of autonomy, independence ...
, the sinkhole attack and the traffic analysis attack. ...
doi:10.5281/zenodo.6390708
fatcat:6qfwqd2v2rhe5iuu5zgz77ay4i
Table of Contents
2021
2021 40th Chinese Control Conference (CCC)
unpublished
SHAO Yong, YAO Yufan, LIU Huafeng, LV Rong, ZAN Peng 6784 Reinforcement Learning Based Vulnerability Analysis of Data Injection Attack on Smart Grids . . . . . . . . . . . . . . . . . . . . . . . . . . ...
LI Po, ZHANG Shurong, JIN Wentao, LI Xiang 6903 An Improved Dynamic State Estimation Algorithm of Smart Grid under Packet Losses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.23919/ccc52363.2021.9550117
fatcat:55y7a2gagfhtpc6llmfvl7gqpm
Challenges of Artificial Intelligence -- From Machine Learning and Computer Vision to Emotional Intelligence
[article]
2022
Computer vision has been central to the development of AI. The book provides a general introduction to computer vision, and includes an exposure to the results and applications of our own research. ...
However, there is also a lot of hype in the current AI debate. AI based on so-called deep learning has achieved impressive results in many problems, but its limits are already visible. ...
and Machine Intelligence and the International Journal of Computer Vision. ...
doi:10.48550/arxiv.2201.01466
fatcat:uqltsrhu5naf7pyyo2b622y36q