咨询与建议

限定检索结果

文献类型

  • 286 篇 期刊文献
  • 118 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 238 篇 电气工程
    • 115 篇 控制科学与工程
    • 115 篇 计算机科学与技术...
    • 57 篇 石油与天然气工程
    • 37 篇 信息与通信工程
    • 25 篇 仪器科学与技术
    • 20 篇 软件工程
    • 19 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 9 篇 电子科学与技术(可...
    • 7 篇 力学(可授工学、理...
    • 3 篇 交通运输工程
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 船舶与海洋工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
  • 55 篇 理学
    • 47 篇 数学
    • 24 篇 系统科学
    • 5 篇 化学
    • 4 篇 生物学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 42 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 405 篇 false data injec...
  • 66 篇 state estimation
  • 41 篇 cyber-physical s...
  • 40 篇 smart grid
  • 28 篇 cyber security
  • 21 篇 power systems
  • 16 篇 cybersecurity
  • 15 篇 attack detection
  • 15 篇 smart grids
  • 14 篇 anomaly detectio...
  • 14 篇 security
  • 12 篇 wireless sensor ...
  • 12 篇 multi-agent syst...
  • 11 篇 cyber-attacks
  • 11 篇 power system sec...
  • 11 篇 phasor measureme...
  • 10 篇 deep learning
  • 10 篇 power measuremen...
  • 10 篇 machine learning
  • 9 篇 networked contro...

机构

  • 14 篇 northeastern uni...
  • 11 篇 northeastern uni...
  • 7 篇 iit dept elect &...
  • 7 篇 univ alberta dep...
  • 6 篇 hunan univ coll ...
  • 6 篇 north china elec...
  • 6 篇 anhui polytech u...
  • 6 篇 nanjing univ sci...
  • 5 篇 shanghai univ sc...
  • 5 篇 chinese minist e...
  • 5 篇 texas a&m univ d...
  • 5 篇 qingdao univ sch...
  • 5 篇 zhejiang univ te...
  • 5 篇 liaoning univ te...
  • 4 篇 indian inst tech...
  • 4 篇 ludong univ sch ...
  • 4 篇 shandong normal ...
  • 4 篇 nanyang technol ...
  • 4 篇 nanjing univ pos...
  • 4 篇 southeast univ s...

作者

  • 12 篇 li zuyi
  • 11 篇 liu xuan
  • 8 篇 dong zhao yang
  • 8 篇 gao wengen
  • 7 篇 rudolph carsten
  • 7 篇 konstantinou cha...
  • 7 篇 zhang guoqing
  • 7 篇 yang guang-hong
  • 7 篇 xu huiling
  • 6 篇 liang hao
  • 6 篇 li yunfei
  • 6 篇 peng chen
  • 6 篇 teng fei
  • 5 篇 liu bo
  • 5 篇 li yuancheng
  • 5 篇 zhao junhua
  • 5 篇 lee hae young
  • 5 篇 dong lewei
  • 5 篇 yu wei
  • 5 篇 luo fengji

语言

  • 398 篇 英文
  • 6 篇 其他
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
检索条件"主题词=false data injection attacks"
405 条 记 录,以下是1-10 订阅
排序:
A deep learning deviation-based scheme to defend against false data injection attacks in power distribution systems
收藏 引用
ELECTRIC POWER SYSTEMS RESEARCH 2025年 238卷
作者: Dehbozorgi, Mohammad Reza Rastegar, Mohammad Arani, Mohammadreza F. M. Shiraz Univ Sch Elect & Comp Engn Dept Power & Control Engn Shiraz Iran Toronto Metropolitan Univ Fac Engn & Architectural Sci Toronto ON Canada
Defending against false data injection attacks (FDIAs) in cyber-physical power systems is crucial. Detection in power distribution systems is complex due to load variations, uncertainties, and fewer meters. Defense st... 详细信息
来源: 评论
Remote secure fusion estimation of cyber-physical systems under false data injection attacks
收藏 引用
AUTOMATICA 2025年 177卷
作者: Xing, Mengping Lu, Jianquan Liu, Yang Southeast Univ Sch Cyber Sci & Engn Nanjing 210096 Peoples R China Southeast Univ Dept Math Nanjing 210096 Peoples R China Zhejiang Normal Univ Key Lab Intelligent Educ Technol & Applicat Zhejia Jinhua 321004 Zhejiang Peoples R China Zhejiang Normal Univ Sch Math Sci Jinhua 321004 Peoples R China Zhejiang Normal Univ Hangzhou Sch Automat Hangzhou 311231 Peoples R China
This paper discusses the secure fusion estimation issue for cyber-physical systems subject to malicious attacks. Smart sensors equipped with computing modules transmit local posteriori estimations to remote fusion cen... 详细信息
来源: 评论
Predictor-based event-triggered learning control of networked control systems with false data injection attacks and output delay
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2025年 490卷
作者: Yang, Meng Zhai, Junyong Southeast Univ Sch Automat Key Lab Measurement & Control CSE Minist Educ Nanjing 210096 Jiangsu Peoples R China
This article is concerned with the predictor-based event-triggered learning control of networked control systems (NCSs) with false data injection attacks (FDIAs) and output delay. Firstly, by applying the prediction m... 详细信息
来源: 评论
A two-stage recovery strategy against false data injection attacks in smart grids
收藏 引用
ELECTRIC POWER SYSTEMS RESEARCH 2025年 245卷
作者: Zhang, Guoqing Gao, Wengen Li, Yunfei An, Fang Anhui Polytech Univ Sch Elect Engn Wuhu 241000 Peoples R China
false data injection attacks (FDIAs) exploit vulnerabilities in the bad data identification mechanisms of power systems by tampering with measurement data. These attacks compromise state estimation, posing a critical ... 详细信息
来源: 评论
Nonlinear decoration-driven adaptive neural finite-time control for USVs with two rotatable thrusters under false data injection attacks and input saturation
收藏 引用
ISA TRANSACTIONS 2025年 158卷 97-109页
作者: Meng, Xiangfei Zhang, Guichen Han, Bing Shanghai Maritime Univ Merchant Marine Coll Shanghai 201306 Peoples R China Shanghai Ship & Shipping Res Inst Co Ltd Shanghai 200000 Peoples R China Minjiang Univ Coll Phys & Elect Informat Engn Fuzhou 350108 Peoples R China
This study explores the trajectory tracking control problem in unmanned surface vessels equipped with two rotatable thrusters in an adverse network environment beset by challenges, such as false data injection attacks... 详细信息
来源: 评论
Iterative learning resilient consensus of uncertain nonlinear multi-agent systems vulnerable to false data injection attacks
收藏 引用
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE 2025年 第1期56卷 157-169页
作者: Sun, Chang-Chun Li, Yuan-Xin Liaoning Univ Technol Coll Sci Jinzhou 121001 Liaoning Peoples R China
This work investigates the iterative learning resilient consensus of uncertain nonlinear high-order multi-agent systems (MASs) against false data injection (FDI) attacks. First, in order to reduce the impact of FDI at... 详细信息
来源: 评论
Fault-tolerant bumpless transfer control for fuzzy switched delayed memristive neural networks subject to false data injection attacks
收藏 引用
CHAOS SOLITONS & FRACTALS 2025年 193卷
作者: Han, Xinyi Yu, Yongbin Wang, Xiangxiang Cai, Jingye Feng, Xiao Wang, Jingya Shi, Kaibo Zhong, Shouming Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China Chengdu Univ Sch Elect Informat & Elect Engn Chengdu 610106 Sichuan Peoples R China Chengdu Univ Key Lab Pattern Recognit & Intelligent Informat Pr Chengdu 610106 Sichuan Peoples R China Univ Elect Sci & Technol China Sch Math Sci Chengdu 611731 Sichuan Peoples R China
This article investigates the fault-tolerant bumpless transfer (FTBT) control for fuzzy switched memristive neural networks (FSMNNs) with mixed time-varying delays and false data injection (FDI) attacks. First, the pe... 详细信息
来源: 评论
Localization Detection of false data injection attacks in Novel Energy and Power Systems Based on Correlated Feature-Multi-Label Cascading Boosted Forests
ENGINEERING REPORTS
收藏 引用
ENGINEERING REPORTS 2025年 第2期7卷
作者: Wang, Lei Li, Tong Geng, Hongbi Liu, Yang Chen, Jian Zhao, Hongwei State Grid Liaoning Elect Power Supply Co Ltd Shenyang Liaoning Peoples R China State Grid Liaoning Elect Power Res Inst Shenyang Liaoning Peoples R China
Under the dual influence of power system transition to integrated energy and the evolution of cyberattack technology, a correlation feature-multilabel cascade boosted forest based false data injection attack localizat... 详细信息
来源: 评论
Graph Neural Network-Based Approach for Detecting false data injection attacks on Voltage Stability
IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY
收藏 引用
IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY 2025年 12卷 12-23页
作者: Fahim, Shahriar Rahman Atat, Rachad Kececi, Cihat Takiddin, Abdulrahman Ismail, Muhammad Davis, Katherine R. Serpedin, Erchin Texas A&M Univ Elect & Comp Engn Dept College Stn TX 77843 USA Lebanese Amer Univ Dept Comp Sci & Math Beirut 03797751 Lebanon Florida State Univ Dept Elect & Comp Engn Tallahassee FL 32310 USA Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA
The integration of information and communication technologies into modern power systems has contributed to enhanced efficiency, controllability, and voltage regulation. Concurrently, these technologies expose power sy... 详细信息
来源: 评论
Finite-time control of networked stochastic systems with disturbances and false data injection attacks
收藏 引用
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL 2025年
作者: Sun, Yuexuan Wei, Xinjiang Zhang, Huifeng Hu, Xin Ludong Univ Sch Math & Stat Sci Yantai 264025 Peoples R China Taishan Univ Tai An Peoples R China
In this paper, networked stochastic systems (NSSs) subjected to disturbances and false data injection attacks (FDIAs) is studied, which have been extensively utilized in practical engineering. To fully utilize the dis... 详细信息
来源: 评论