Search Results - "Yau, David K Y"
-
1
On Optimal Information Capture by Energy-Constrained Mobile Sensors
Published in IEEE transactions on vehicular technology (01-06-2010)“…A mobile sensor is used to cover a number of points of interest (PoIs), where dynamic events appear and disappear according to the given random processes. The…”
Get full text
Journal Article -
2
Detection of Intelligent Mobile Target in a Mobile Sensor Network
Published in IEEE/ACM transactions on networking (01-02-2010)“…We study the problem of a mobile target (the mouse ) trying to evade detection by one or more mobile sensors (we call such a sensor a cat ) in a closed network…”
Get full text
Journal Article -
3
A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks
Published in IEEE access (2023)“…Deep neural networks (DNNs) are highly vulnerable to neural Trojan attacks. To carry out such an attack, an adversary retrains a DNN with poisoned data or…”
Get full text
Journal Article -
4
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Published in Sensors (Basel, Switzerland) (03-05-2018)“…We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the…”
Get full text
Journal Article -
5
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Published in Risk analysis (01-04-2016)“…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
Get full text
Journal Article -
6
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach
Published in IEEE/ACM transactions on networking (01-06-2016)“…Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But…”
Get full text
Journal Article -
7
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
Published in IEEE transactions on information forensics and security (2020)“…Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch…”
Get full text
Journal Article -
8
Vulnerability of the Load Frequency Control Against the Network Parameter Attack
Published in IEEE transactions on smart grid (01-01-2024)“…By integrating the communication-enabled high-voltage electronic devices into the supervisory control and data acquisition (SCADA) system, the smart grid…”
Get full text
Journal Article -
9
Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation
Published in IEEE transactions on power systems (01-05-2013)“…Electricity grids are critical infrastructures. They are credible targets of active (e.g., terrorist) attacks since their disruption may lead to sizable losses…”
Get full text
Journal Article -
10
Cyber-physical correlation effects in defense games for large discrete infrastructures
Published in Games (01-09-2018)“…In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to…”
Get full text
Journal Article -
11
Optimal-Cost Scheduling of Electrical Vehicle Charging Under Uncertainty
Published in IEEE transactions on smart grid (01-09-2018)“…Electric vehicle (EV) charging stations are increasingly set up to meet the recharge demand of EVs, and the stations equipped with local renewable energy…”
Get full text
Journal Article -
12
Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems
Published in IEEE transactions on smart grid (01-07-2021)“…Control and communication technologies are key building blocks of cyber-physical systems (CPSes) that can improve the efficiency of the physical processes…”
Get full text
Journal Article -
13
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control
Published in IEEE transactions on information forensics and security (01-07-2017)“…This paper studies the impact of false data injection (FDI) attacks on automatic generation control (AGC), a fundamental control system used in all power grids…”
Get full text
Journal Article -
14
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service
Published in IEEE transactions on vehicular technology (01-07-2024)“…Air Smart Vehicular Networks (ASVNs) have become increasingly essentials in military and commercial industries in recent years, where drones are deployed to…”
Get full text
Journal Article -
15
Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls
Published in IEEE journal on selected areas in communications (01-01-2020)“…Due to recent cyber attacks on various cyber-physical systems (CPSes), traditional isolation based security schemes in the critical systems are insufficient to…”
Get full text
Journal Article -
16
Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds
Published in Computer networks (Amsterdam, Netherlands : 1999) (18-10-2006)“…We consider how to construct and maintain a structured overlay P2P network based on the small-world paradigm. Two main attractive properties of a small-world…”
Get full text
Journal Article -
17
Cost-Benefit Analysis of Moving-Target Defense in Power Grids
Published in IEEE transactions on power systems (01-03-2021)“…We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart stealthy false data injection (FDI) attacks against state…”
Get full text
Journal Article -
18
Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications
Published in IEEE transactions on vehicular technology (01-08-2023)“…Due to high effectiveness and robust security protocols, lattice-based cryptography becomes a very broadly applicable optimistic post-quantum technique that is…”
Get full text
Journal Article -
19
Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid
Published in IEEE internet of things journal (15-04-2021)“…Data integrity attack (DIA) is one class of threatening cyber attacks against the Internet-of-Things (IoT)-based smart grid. With the assumption that the…”
Get full text
Journal Article -
20
Distributed mechanism in detecting and defending against the low-rate TCP attack
Published in Computer networks (Amsterdam, Netherlands : 1999) (15-09-2006)“…In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered…”
Get full text
Journal Article