Reconfigurable Intelligent Surfaces (RIS) also known as Intelligent Reflecting Surfaces (IRS) often depend upon metasurfaces. These typically comprise of a large array of passive elements that can be fabricated to mod...
详细信息
Machine learning-based detection of false data injection attacks (FDIAs) in smart grids relies on labeled measurement data for training and testing. The majority of existing detectors are developed assuming that the a...
详细信息
Machine learning-based detection of false data injection attacks (FDIAs) in smart grids relies on labeled measurement data for training and testing. The majority of existing detectors are developed assuming that the adopted datasets for training have correct labeling information. However, such an assumption is not always valid as training data might include measurement samples that are incorrectly labeled as benign, namely, adversarial data poisoning samples, which have not been detected before. Neglecting such an aspect makes detectors susceptible to data poisoning. Our investigations revealed that detection rates (DRs) of existing detectors significantly deteriorate by up to 9-29% when subject to data poisoning in generalized and topology-specific settings. Thus, we propose a generalized graph neural network-based anomaly detector that is robust against FDIAs and data poisoning. It requires only benign datasets for training and employs an autoencoder with Chebyshev graph convolutional recurrent layers with attention mechanism to capture the spatial and temporal correlations within measurement data. The proposed convolutional recurrent graph autoencoder model is trained and tested on various topologies (from 14, 39, and 118-bus systems). Due to such factors, it yields stable generalized detection performance that is degraded by only 1.6-3.7% in DR against high levels of data poisoning and unseen FDIAs in unobserved topologies. Impact Statement-Artificial Intelligence (AI) systems are used in smart grids to detect cyberattacks. They can automatically detect malicious actions carried out bymalicious entities that falsifymeasurement data within power grids. Themajority of such systems are data-driven and rely on labeled data for model training and testing. However, datasets are not always correctly labeled since malicious entities might be carrying out cyberattacks without being detected, which leads to training on mislabeled datasets. Such actions might degrade the d
Unmanned aerial vehicle technology is growing rapidly as it finds its application in the various industries, including military & defense, agriculture, logistics, transportation, healthcare, entertainment and many...
详细信息
Water resource management relies heavily on reliable water quality predictions. Predicting water quality metrics in the watershed system, including dissolved oxygen (DO), is the main emphasis of this work. The enhance...
详细信息
Due to power attenuation, improving transmission efficiency in the radio-frequency (RF) band remains a significant challenge, which hinders advancements in various fields of the Internet of Things (IoT), such as wirel...
详细信息
This study investigates the development of a Brain-computer Interface (BCI) for controlling car functions using the MUSE headband, a consumer-grade EEG device. The primary objective is to map EEG signals to key drivin...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber ***, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.
Modernization and intense industrialization have led to a substantial improvement in people’s quality of life. However, the aspiration for achieving an improved quality of life results in environmental contamination....
详细信息
The rapid development of mobile broadband technology has increased the need for coverage. This paper investigates the coverage mapping of the actual cell coverage provided by the three major cellular carriers in Leon ...
详细信息
With the increasing complexity of power systems and their vulnerability to cyber-attacks, robust detection mechanisms are crucial for ensuring the grid's transient and steady-state stability and resiliency. This s...
详细信息
暂无评论