In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
详细信息
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
The increase in the number of sensitive loads in power systems has made power quality,particularly voltage sag,a prominent problem due to its effects on consumers from both the utility and customer ***,to evaluate the...
详细信息
The increase in the number of sensitive loads in power systems has made power quality,particularly voltage sag,a prominent problem due to its effects on consumers from both the utility and customer ***,to evaluate the effects of voltage sag caused by short circuits,it is necessary to determine the areas of vulnerability(AOVs).In this paper,a new method is proposed for the AOV determination that is applicable to large-scale *** false position method(FPM)is proposed for the precise calculation of the critical points of the system ***,a new method is proposed for the voltage sag monitor(VSM)placement to detect the fault locations.A systematic placement scheme is used to provide the highest fault location detection(FLD)index at buses and lines for various short-circuit fault *** assess the efficiency of the proposed methods for AOV determination and VSM placement,simulations are conducted in IEEE standard *** results demonstrate the accuracy of the proposed method for AOV *** addition,through VSM placement,the fault locations at buses and lines are detected.
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this pap...
详细信息
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this paper,we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the *** analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station(BS)leads to better outage probability *** also introduce an optimum low complexity Equilibrium Optimization(EO)-based algorithm to further improve the outage *** simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.
Photovoltaic(PV)arrays are usually installed in open areas;hence,they are vulnerable to lightning strikes that can result in cell degradation,complete damage,service disruption,and increased maintenance *** a result,i...
详细信息
Photovoltaic(PV)arrays are usually installed in open areas;hence,they are vulnerable to lightning strikes that can result in cell degradation,complete damage,service disruption,and increased maintenance *** a result,it is imperative to develop an effective and efficient lightning protection system by evaluating the transient behaviour of PV arrays during lightning *** aim is to evaluate the transient analysis of large-scale PV systems when subjected to lightning strikes using the finite difference time domain(FDTD)*** overvoltages are calculated at various points within the mounting *** optimise the FDTD method's execution time and make it more suitable for less powerful hardware,a variable cell size approach is ***,larger cell dimensions are used in the earthing system and smaller cell dimensions are used in the mounting *** FDTD method is utilised to calculate the temporal variation of transient overvoltages for large-scale PV systems under different scenarios,including variations in the striking point,soil resistivity,and the presence of a metal *** results indicate that the highest transient overvoltages occur at the striking point,and these values increase with the presence of a PV metal frame as well as with higher soil ***,a comparison is performed between the overvoltage results obtained from the FDTD approach and the partial element equivalent circuit(PEEC)method at the four corner points of the mounting systems to demonstrate the superior accuracy of the FDTD ***,a laboratory experiment is conducted on a small-scale PV system to validate the simulation *** calculated overvoltages obtained from the FDTD and PEEC methods are compared with the measured values,yielding a mean absolute error of 5%and 11%for the FDTD and PEEC methods,respectively,thereby confirming the accuracy of the FDTD simulation model.
Distance and size estimation of objects of interests is an inevitable task for many navigation and obstacle avoidance algorithms mainly used in autonomus and robotic systems. Stereo vision systems, inspired by human v...
详细信息
Semi-supervised learning techniques utilize both labeled and unlabeled images to enhance classification performance in scenarios where labeled images are limited. However, challenges such as integrating unlabeled imag...
详细信息
Semi-supervised learning techniques utilize both labeled and unlabeled images to enhance classification performance in scenarios where labeled images are limited. However, challenges such as integrating unlabeled images with incorrect pseudo-labels, determining appropriate thresholds for the pseudo-labels, and label prediction fluctuations on low-confidence unlabeled images, hinder the effectiveness of existing methods. This research introduces a novel framework named Interpolation Consistency for Bad Generative Adversarial Networks (IC-BGAN) that utilizes a new loss function. The proposed model combines bad adversarial training, fusion techniques, and regularization to address the limitations of semi-supervised learning. IC-BGAN creates three types of image augmentations and label consistency regularization in interpolation of bad fake images, real and bad fake images, and unlabeled images. It demonstrates linear interpolation behavior, reducing fluctuations in predictions, improving stability, and facilitating the identification of decision boundaries in low-density areas. The regularization techniques boost the discriminative capability of the classifier and discriminator, and send a better signal to the bad generator. This improves the generalization and the generation of diverse inter-class fake images as support vectors with information near the true decision boundary, which helps to correct the pseudo-labeling of unlabeled images. The proposed approach achieves notable improvements in error rate from 2.87 to 1.47 on the Modified National Institute of Standards and Technology (MNIST) dataset, 3.59 to 3.13 on the Street View House Numbers (SVHN) dataset, and 12.13 to 9.59 on the Canadian Institute for Advanced Research, 10 classes (CIFAR-10) dataset using 1000 labeled training images. Additionally, it reduces the error rate from 22.11 to 18.40 on the CINIC-10 dataset when using 700 labeled images per class. The experiments demonstrate the IC-BGAN framework outp
The work presented in this paper has great significance in improving electromagnetic models based on the strong coupling between the magnetic and electric fields transient equations while considering a realistic rando...
详细信息
The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of *** this paper,we propose a model for survivability quantification,w...
详细信息
The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of *** this paper,we propose a model for survivability quantification,which is acceptable for networks carrying complex traffic *** network traffic is considered as general multi-rate,heterogeneous traffic,where the individual bandwidth demands may aggregate in complex,nonlinear *** probability is the chosen measure for survivability *** study an arbitrary topology and some other known topologies for the *** and dependent failure scenarios as well as deterministic and random traffic models are ***,we provide survivability evaluation results for different network *** results show that by using about 50%of the link capacity in networks with a relatively high number of links,the blocking probability remains near zero in the case of a limited number of failures.
Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands subst...
详细信息
暂无评论