REFERENCES

1. Qu B, Wang Z, Shen B, Dong H, Zhang X. Secure particle filtering with paillier encryption-decryption scheme: application to multi-machine power grids. IEEE T Smart Grid 2024;15:863-73.

2. Huang R, Li Y. Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE T Smart Grid 2023;14:2367-76.

3. Zhou T, Xiahou K, Zhang LL, Wu QH. Real-time detection of cyber-physical false data injection attacks on power systems. IEEE Trans Ind Inf 2021;17:6810-9.

4. Cheng Z, Yue D, Shen S, Hu S, Chen L. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE T Inf Foren Sec 2022;17:1172-84.

5. Hu Z, Liu S, Luo W, Wu L. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Trans Cybern 2022;52:2396-406.

6. Zhang Y, Peng C, Xie S, Du X. Deterministic network calculus-based H load frequency control of multiarea power systems under malicious DoS attacks. IEEE T Smart Grid 2022;13:1542-54.

7. Yan S, Gu Z, Park JH, Xie X, Sun W. Distributed cooperative voltage control of networked islanded microgrid via proportional-integral observer. IEEE T Smart Grid 2024.

8. Wang X, Guang W, Huang T, Kurths J. Optimized adaptive finite-time consensus control for stochastic nonlinear multiagent systems with non-affine nonlinear faults. IEEE Trans Autom Sci Eng 2023:1-12.

9. Xiao S, Ge X, Ding L, Yue D. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE T Smart Grid 2024;15:3739-50.

10. Xiao S, Ge X, Han QL, Zhang Y. Secure and collision-free multi-platoon control of automated vehicles under data falsification attacks. Automatica 2022;145:110531.

11. Zhang H, Cheng P, Shi L, Chen J. Optimal denial-of-service attack scheduling with energy constraint. IEEE T Automat Contr 2015;60:3023-8.

12. Qin J, Li M, Shi L, Yu X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE T Automat Contr 2018;63:1648-63.

13. Zhang Y, Du L, Lewis FL. Stochastic DoS attack allocation against collaborative estimation in sensor networks. IEEE/CAA J Autom Sin 2020;7:1225-34.

14. Liu R, Hao F, Yu H. Optimal SINR-based DoS attack scheduling for remote state estimation via adaptive dynamic programming approach. IEEE Trans Syst Man Cybern 2021;51:7622-32.

15. Zhang H, Qi Y, Wu J, Fu L, He L. DoS attack energy management against remote state estimation. IEEE Trans Control Network Syst 2018;5:383-94.

16. Zhang XG, Yang GH. Optimal sensor attacks in cyber-physical systems with round-robin protocol. Inf Sci 2021;548:85-100.

17. Zhang J, Sun J, Lin H. Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol. Automatica 2021;127:109517.

18. Zhang J, Sun J. Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems. Syst Control Lett 2020;144:104771.

19. Tian E, Chen H, Wang C, Wang L. Security-ensured state of charge estimation of lithium-ion batteries subject to malicious attacks. IEEE T Smart Grid 2023;14:2250-61.

20. Zhu D, Wang H, Wang R, Duan J, Bai J. Identification of key nodes in a power grid based on modified PageRank algorithm. Energies 2022;15:797.

21. Wang X, Tian E, Zheng WX, Xie X. Important-data-based DoS attack mechanism and resilient H filter design for networked T-S fuzzy systems. IEEE Trans Cybern 2024;54:3352-62.

22. Kumar R JR, Natarajan B, Pahwa A. Neumann series based voltage sensitivity analysis for three phase distribution system. IEEE Trans Power Syst 2022;37:3145-8.

23. Chang JW, Kang M, Oh S. Data-driven estimation of voltage-to-power sensitivities considering their mutual dependency in medium voltage distribution networks. IEEE Trans Power Syst 2022;37:3173-6.

24. Liu JH, Li ZH. Distributed voltage security enhancement using measurement-based voltage sensitivities. IEEE Trans Power Syst 2024;39:836-49.

25. Xie B, Chen W, Zhou Q, Du J, Cui L. Partition of the development stage of air-gap discharge in oil-paper insulation based on wavelet packet energy entropy. IEEE T Dielect El In 2016;23:866-72.

26. Bian Q, Qiu Y, Wu W, Xin H, Fu X. Generation dispatch method based on maximum entropy principle for power systems with high penetration of wind power. J Mod Power Syst Clean Energy 2018;6:1213-22.

27. Zhao Z, Huang Y, Zhen Z, Li Y. Data-driven false data-injection attack design and detection in cyber-physical systems. IEEE Trans Cybern 2021;51:6179-87.

28. Liu C, He W, Deng R, Tian YC, Du W. False-data-injection-enabled network parameter modifications in power systems: attack and detection. IEEE Trans Ind Inf 2023;19:177-88.

29. Liu C, Liang H, Chen T. Network parameter coordinated false data injection attacks against power system AC state estimation. IEEE T Smart Grid 2021;12:1626-39.

30. Yue D, Tian E, Han QL. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans Automat Contr 2013;58:475-81.

Intelligence & Robotics
ISSN 2770-3541 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/