A framework for cyber-topology attacks: line-switching and new attack scenarios
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Y.
- Liang, Gaoqi, Weller, Steven R., Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang
Generalized FDIA-based cyber topology attack with application to the Australian electricity market trading mechanism
- Liang, Gaoqi, Weller, Steven R., Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang
A review of false data injection attacks against modern power systems
- Liang, Gaoqi, Zhao, Junhua, Luo, Fengji, Weller, Steven R., Dong, Zhao Yang
Composite FDIA and topology attack on the electricity market
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
False data injection attacks against modern power systems: modelling and countermeasures
False data injection attacks targeting DC model-based state estimation
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
Multiagent-based cooperative control framework for microgrids' energy imbalance
- Luo, Fengji, Chen, Yingying, Xu, Zhao, Liang, Gaoqi, Zheng, Yu, Qiu, Jing
Stochastic residential energy resource scheduling by multi-objective natural aggregation algorithm
- Luo, Fengji, Ranzi, Gianluca, Liang, Gaoqi, Dong, Zhao Yang
The 2015 Ukraine blackout: implications for false data injection attacks
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
Distributed control of air-conditioning loads for voltage regulation in active distribution network
- Wang, Dongxiao, Meng, Ke, Gao, Xiaodan, Liang, Gaoqi, Luo, Fengji, Dong, Zhao Yang
Impact analysis of false data injection attacks on power system static security assessment
- Chen, Jiongcong, Liang, Gaoqi, Cai, Zexiang, Hu, Chunchao, Xu, Yan, Luo, Fengji, Zhao, Junhua
- Gao, Xiaodan, Meng, Ke, Wang, Dongxiao, Liang, Gaoqi, Luo, Fengji, Dong, Zhao Yang
Are you sure you would like to clear your session, including search history and login status?