Search Results - "Mohammadpourfard, Mostafa"

Refine Results
  1. 1

    Electric load forecasting under False Data Injection Attacks using deep learning by Moradzadeh, Arash, Mohammadpourfard, Mostafa, Konstantinou, Charalambos, Genc, Istemihan, Kim, Taesic, Mohammadi-Ivatloo, Behnam

    Published in Energy reports (01-11-2022)
    “…Precise electric load forecasting at different time horizons is an essential aspect for electricity producers and consumers who participate in energy markets…”
    Get full text
    Journal Article
  2. 2

    Cyber-Physical Attack Conduction and Detection in Decentralized Power Systems by Mohammadpourfard, Mostafa, Weng, Yang, Khalili, Abdullah, Genc, Istemihan, Shefaei, Alireza, Mohammadi-Ivatloo, Behnam

    Published in IEEE access (2022)
    “…The expansion of power systems over large geographical areas renders centralized processing inefficient. Therefore, the distributed operation is increasingly…”
    Get full text
    Journal Article
  3. 3

    Image Processing Based Approach for False Data Injection Attacks Detection in Power Systems by Moayyed, Hamed, Mohammadpourfard, Mostafa, Konstantinou, Charalambos, Moradzadeh, Arash, Mohammadi-Ivatloo, Behnam, Aguiar, A. Pedro

    Published in IEEE access (2022)
    “…With more sensors being installed by utilities for accurate control of power grids, there is a growing risk of vulnerability to sophisticated data integrity…”
    Get full text
    Journal Article
  4. 4

    Identification of False Data Injection Attacks With Considering the Impact of Wind Generation and Topology Reconfigurations by Mohammadpourfard, Mostafa, Sami, Ashkan, Weng, Yang

    Published in IEEE transactions on sustainable energy (01-07-2018)
    “…Robust control of the power grid relies on accurate state estimation. Recent studies show that state estimators are vulnerable to false data injection attacks…”
    Get full text
    Journal Article
  5. 5

    Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks by Kesici, Mert, Mohammadpourfard, Mostafa, Aygul, Kemal, Genc, Istemihan

    Published in Electric power systems research (01-08-2023)
    “…Cyber-attacks can degrade the performance of online transient stability prediction (TSP) and assessment functions offered for power systems. This paper…”
    Get full text
    Journal Article
  6. 6

    A statistical unsupervised method against false data injection attacks: A visualization-based approach by Mohammadpourfard, Mostafa, Sami, Ashkan, Seifi, Ali Reza

    Published in Expert systems with applications (30-10-2017)
    “…•An unsupervised method is proposed for detecting cyber-attacks after topology changes.•Detection is performed by quantifying the probability distributions of…”
    Get full text
    Journal Article
  7. 7

    Ensuring cybersecurity of smart grid against data integrity attacks under concept drift by Mohammadpourfard, Mostafa, Weng, Yang, Pechenizkiy, Mykola, Tajdinian, Mohsen, Mohammadi-Ivatloo, Behnam

    “…•Differences between a physical grid change and data manipulation change is investigated.•Shows how line outage contingencies can affect attack detection…”
    Get full text
    Journal Article
  8. 8

    Cyber-Resilient Smart Cities: Detection of Malicious Attacks in Smart Grids by Mohammadpourfard, Mostafa, Khalili, Abdullah, Genc, Istemihan, Konstantinou, Charalambos

    Published in Sustainable cities and society (01-12-2021)
    “…•Introduces a new type of attack against distributed state estimation of power systems, which operates on inter-area boundary buses.•The proposed attack can…”
    Get full text
    Journal Article
  9. 9

    Deep learning-based cyber resilient dynamic line rating forecasting by Moradzadeh, Arash, Mohammadpourfard, Mostafa, Genc, Istemihan, Şeker, Şahin Serhat, Mohammadi-Ivatloo, Behnam

    “…•DLR forecasting of overhead transmission lines is done based on hybrid applications of deep learning.•The performance of forecasting models presented under…”
    Get full text
    Journal Article
  10. 10

    Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks by Aygul, Kemal, Mohammadpourfard, Mostafa, Kesici, Mert, Kucuktezcan, Fatih, Genc, Istemihan

    Published in Internet of things (Amsterdam. Online) (01-04-2024)
    “…This study addresses the problem of ensuring accurate online transient stability prediction in modern power systems that are increasingly dependent on smart…”
    Get full text
    Journal Article
  11. 11

    Preserving microgrid sustainability through robust islanding detection scheme ensuring cyber-situational awareness by Tajdinian, Mohsen, Mohammadpourfard, Mostafa, Weng, Yang, Genc, Istemihan

    Published in Sustainable cities and society (01-09-2023)
    “…Along with the numerous environmental and operational benefits of renewable energy sources (RESs) integration into modern distribution networks, maintaining…”
    Get full text
    Journal Article
  12. 12

    Hierarchical Extreme Learning Machine Enabled Dynamic Line Rating Forecasting by Mansour Saatloo, Amin, Moradzadeh, Arash, Moayyed, Hamed, Mohammadpourfard, Mostafa, Mohammadi-Ivatloo, Behnam

    Published in IEEE systems journal (01-09-2022)
    “…Dynamic line rating (DLR) is a technology introduced to rectify an overhead line's current carrying capacity based on climatic conditions. Reducing congestion…”
    Get full text
    Journal Article
  13. 13

    Revealing a New Vulnerability of Distributed State Estimation: A Data Integrity Attack and an Unsupervised Detection Algorithm by Shefaei, Alireza, Mohammadpourfard, Mostafa, Mohammadi-ivatloo, Behnam, Weng, Yang

    “…This article proposes a distributed false data injection attack (FDIA) by attacking to the boundary buses in an interconnected power system. The proposed…”
    Get full text
    Journal Article
  14. 14

    ESIV: an end-to-end secure internet voting system by Shakiba, Nafise Mohammadi, Doostari, Mohammad-Ali, Mohammadpourfard, Mostafa

    Published in Electronic commerce research (01-09-2017)
    “…Nowadays, with the growing popularity of e-Government services, security of client platforms and violation of citizen e-rights are of great concerns. Since…”
    Get full text
    Journal Article
  15. 15

    Employing Machine Learning Algorithms to Identify False Data Injection in Smart Grid by Tajdinian, Mohsen, Mohammadpourfard, Mostafa, Goodarzi, Ali

    “…Enhancement in demand of electrical energy from industrial or residential consumers has resulted in encouraging policy makers to utilize of new generation of…”
    Get full text
    Conference Proceeding
  16. 16

    A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept by Mohammadpourfard, Mostafa, Doostari, Mohammad Ali, Ghaznavi Ghoushchi, Mohammad Bagher, Shakiba, Nafiseh

    Published in Security and communication networks (25-01-2015)
    “…ABSTRACT Recently, there has been a spate of interest in Internet voting systems because of advantages such as participation, efficiency, accuracy, and…”
    Get full text
    Journal Article
  17. 17

    Attack Detection and Localization in Smart Grid with Image-based Deep Learning by Mohammadpourfard, Mostafa, Genc, Istemihan, Lakshminarayana, Subhash, Konstantinou, Charalambos

    “…Smart grid's objective is to enable electricity and information to flow two-way while providing effective, robust, computerized, and decentralized energy…”
    Get full text
    Conference Proceeding
  18. 18

    Identifying Concept Drift with Supervised Algorithms in Smart Grids by Sayin, Ayse, Mohammadpourfard, Mostafa, Sandikkaya, Mehmet Tahir

    “…Early and correct disclosure of anomality is critical for realiable and secure activity of the smart grid. Machine learning based outlier detection schemes…”
    Get full text
    Conference Proceeding
  19. 19

    An Accurate False Data Injection Attack (FDIA) Detection in Renewable-Rich Power Grids by Mohammadpourfard, Mostafa, Weng, Yang, Genc, Istemihan, Kim, Taesic

    “…An accurate state estimation (SE) considering increased uncertainty by the high penetration of renewable energy systems (RESs) is more and more important to…”
    Get full text
    Conference Proceeding
  20. 20

    Generation of False Data Injection Attacks using Conditional Generative Adversarial Networks by Mohammadpourfard, Mostafa, Ghanaatpishe, Fateme, Mohammadi, Marziyeh, Lakshminarayana, Subhash, Pechenizkiy, Mykola

    “…The growing adoption of information and communication technologies (ICTs) is enabling intelligent power grid applications. However, strong reliance on ICTs…”
    Get full text
    Conference Proceeding