Search Results - "Yau, David K Y"

Refine Results
  1. 1

    On Optimal Information Capture by Energy-Constrained Mobile Sensors by Shibo He, Jiming Chen, Youxian Sun, Yau, David K Y, Nung Kwan Yip

    Published in IEEE transactions on vehicular technology (01-06-2010)
    “…A mobile sensor is used to cover a number of points of interest (PoIs), where dynamic events appear and disappear according to the given random processes. The…”
    Get full text
    Journal Article
  2. 2

    Detection of Intelligent Mobile Target in a Mobile Sensor Network by Jren-Chit Chin, Yu Dong, Wing-Kai Hon, Ma, C.Y.-T., Yau, D.K.Y.

    Published in IEEE/ACM transactions on networking (01-02-2010)
    “…We study the problem of a mobile target (the mouse ) trying to evade detection by one or more mobile sensors (we call such a sensor a cat ) in a closed network…”
    Get full text
    Journal Article
  3. 3

    A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks by Ghahremani, Shahram, Bidgoly, Amir Jalaly, Nguyen, Uyen Trang, Yau, David K. Y.

    Published in IEEE access (2023)
    “…Deep neural networks (DNNs) are highly vulnerable to neural Trojan attacks. To carry out such an attack, an adversary retrains a DNN with poisoned data or…”
    Get full text
    Journal Article
  4. 4

    Defense Strategies for Asymmetric Networked Systems with Discrete Components by Rao, Nageswara S V, Ma, Chris Y T, Hausken, Kjell, He, Fei, Yau, David K Y, Zhuang, Jun

    Published in Sensors (Basel, Switzerland) (03-05-2018)
    “…We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the…”
    Get full text
    Journal Article
  5. 5

    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models by Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, Yau, David K. Y.

    Published in Risk analysis (01-04-2016)
    “…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
    Get full text
    Journal Article
  6. 6

    Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach by Jongho Won, Ma, Chris Y. T., Yau, David K. Y., Rao, Nageswara S. V.

    Published in IEEE/ACM transactions on networking (01-06-2016)
    “…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
    Get full text
    Journal Article
  7. 7

    Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid by Zhang, Zhenyong, Deng, Ruilong, Yau, David K. Y., Cheng, Peng, Chen, Jiming

    “…Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch…”
    Get full text
    Journal Article
  8. 8

    Vulnerability of the Load Frequency Control Against the Network Parameter Attack by Zhang, Zhenyong, Deng, Ruilong, Yau, David K. Y.

    Published in IEEE transactions on smart grid (01-01-2024)
    “…By integrating the communication-enabled high-voltage electronic devices into the supervisory control and data acquisition (SCADA) system, the smart grid…”
    Get full text
    Journal Article
  9. 9

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation by Ma, Chris Y. T., Yau, David K. Y., Xin Lou, Rao, Nageswara S. V.

    Published in IEEE transactions on power systems (01-05-2013)
    “…Electricity grids are critical infrastructures. They are credible targets of active (e.g., terrorist) attacks since their disruption may lead to sizable losses…”
    Get full text
    Journal Article
  10. 10

    Cyber-physical correlation effects in defense games for large discrete infrastructures by Rao, Nageswara S. V, Ma, Chris Y. T, He, Fei, Yau, David K. Y, Zhuang, Jun

    Published in Games (01-09-2018)
    “…In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to…”
    Get full text
    Journal Article
  11. 11

    Optimal-Cost Scheduling of Electrical Vehicle Charging Under Uncertainty by Zhou, Yaqin, Yau, David K. Y., You, Pengcheng, Cheng, Peng

    Published in IEEE transactions on smart grid (01-09-2018)
    “…Electric vehicle (EV) charging stations are increasingly set up to meet the recharge demand of EVs, and the stations equipped with local renewable energy…”
    Get full text
    Journal Article
  12. 12

    Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems by Ganesh, Prakhar, Lou, Xin, Chen, Yao, Tan, Rui, Yau, David K. Y., Chen, Deming, Winslett, Marianne

    Published in IEEE transactions on smart grid (01-07-2021)
    “…Control and communication technologies are key building blocks of cyber-physical systems (CPSes) that can improve the efficiency of the physical processes…”
    Get full text
    Journal Article
  13. 13

    Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control by Rui Tan, Hoang Hai Nguyen, Foo, Eddy Y. S., Yau, David K. Y., Kalbarczyk, Zbigniew, Iyer, Ravishankar K., Hoay Beng Gooi

    “…This paper studies the impact of false data injection (FDI) attacks on automatic generation control (AGC), a fundamental control system used in all power grids…”
    Get full text
    Journal Article
  14. 14

    BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service by Bera, Basudeb, Bisht, Abhishek, Das, Ashok Kumar, Bhargava, Bharat, Yau, David K. Y., Lorenz, Pascal, Sikdar, Biplab

    Published in IEEE transactions on vehicular technology (01-07-2024)
    “…Air Smart Vehicular Networks (ASVNs) have become increasingly essentials in military and commercial industries in recent years, where drones are deployed to…”
    Get full text
    Journal Article
  15. 15

    Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls by Lou, Xin, Tran, Cuong, Tan, Rui, Yau, David K. Y., Kalbarczyk, Zbigniew T., Banerjee, Ambarish Kumar, Ganesh, Prakhar

    “…Due to recent cyber attacks on various cyber-physical systems (CPSes), traditional isolation based security schemes in the critical systems are insufficient to…”
    Get full text
    Journal Article
  16. 16

    Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds by Hui, Ken Y.K., Lui, John C.S., Yau, David K.Y.

    “…We consider how to construct and maintain a structured overlay P2P network based on the small-world paradigm. Two main attractive properties of a small-world…”
    Get full text
    Journal Article
  17. 17

    Cost-Benefit Analysis of Moving-Target Defense in Power Grids by Lakshminarayana, Subhash, Yau, David K.Y.

    Published in IEEE transactions on power systems (01-03-2021)
    “…We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart stealthy false data injection (FDI) attacks against state…”
    Get full text
    Journal Article
  18. 18

    Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications by Bagchi, Prithwi, Maheshwari, Raj, Bera, Basudeb, Das, Ashok Kumar, Park, Youngho, Lorenz, Pascal, Yau, David K. Y.

    Published in IEEE transactions on vehicular technology (01-08-2023)
    “…Due to high effectiveness and robust security protocols, lattice-based cryptography becomes a very broadly applicable optimistic post-quantum technique that is…”
    Get full text
    Journal Article
  19. 19

    Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid by Zhang, Zhenyong, Deng, Ruilong, Yau, David K. Y., Cheng, Peng

    Published in IEEE internet of things journal (15-04-2021)
    “…Data integrity attack (DIA) is one class of threatening cyber attacks against the Internet-of-Things (IoT)-based smart grid. With the assumption that the…”
    Get full text
    Journal Article
  20. 20

    Distributed mechanism in detecting and defending against the low-rate TCP attack by Sun, Haibin, Lui, John C.S., Yau, David K.Y.

    “…In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered…”
    Get full text
    Journal Article