These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 32057420)

  • 1. False data injection against state estimation in power systems with multiple cooperative attackers.
    Yan J; Guo F; Wen C
    ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Distributed State Estimation Using a Modified Partitioned Moving Horizon Strategy for Power Systems.
    Chen T; Foo YSE; Ling KV; Chen X
    Sensors (Basel); 2017 Oct; 17(10):. PubMed ID: 29019949
    [TBL] [Abstract][Full Text] [Related]  

  • 3. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
    Kang W; Hu G; Zhu P; Liu Q; Hang Z; Liu X
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29795032
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimal Data Injection Attacks in Cyber-Physical Systems.
    Wu G; Sun J; Chen J
    IEEE Trans Cybern; 2018 Dec; 48(12):3302-3312. PubMed ID: 29994695
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays.
    Cheng Z; Ren H; Qin J; Lu R
    IEEE Trans Cybern; 2023 Apr; 53(4):2087-2096. PubMed ID: 34543217
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.
    Xue L; Ma B; Liu J; Yu Y
    ISA Trans; 2022 Nov; 130():1-9. PubMed ID: 35341584
    [TBL] [Abstract][Full Text] [Related]  

  • 13. False Data Injection Detection for Phasor Measurement Units.
    Almasabi S; Alsuwian T; Awais M; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590835
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization.
    Hu P; Gao W; Li Y; Wu M; Hua F; Qiao L
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772723
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Analysis of Cyber-Physical Systems Using Reinforcement Learning.
    Ibrahim M; Elhafiz R
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772676
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Distributed Estimation With Cross-Verification Under False Data-Injection Attacks.
    Hua Y; Wan F; Gan H; Zhang Y; Qing X
    IEEE Trans Cybern; 2023 Sep; 53(9):5840-5853. PubMed ID: 36099214
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units.
    Almasabi S; Alsuwian T; Javed E; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502682
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure State Estimation for Motion Monitoring of Intelligent Connected Vehicle Systems.
    Song X; Luo X; Zhu J; He D
    Sensors (Basel); 2020 Feb; 20(5):. PubMed ID: 32106573
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.