Distributed quickest detection of cyber-attacks in smart grid
In this paper, online detection of false data injection attacks and denial of service attacks in
the smart grid is studied. The system is modeled as a discrete-time linear dynamic system …
the smart grid is studied. The system is modeled as a discrete-time linear dynamic system …
Real-time detection of hybrid and stealthy cyber-attacks in smart grid
For a safe and reliable operation of the smart grid, timely detection of cyber-attacks is of
critical importance. Moreover, considering smarter and more capable attackers, robust …
critical importance. Moreover, considering smarter and more capable attackers, robust …
Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems
Jamming attack is one of the common malicious attacks in cyber-physical power systems
(CPPSs) to intervene measurements and systems. Timely detection of jamming attacks is …
(CPPSs) to intervene measurements and systems. Timely detection of jamming attacks is …
Jamming-resistant receivers for the massive MIMO uplink
We design a jamming-resistant receiver scheme to enhance the robustness of a massive
MIMO uplink system against jamming. We assume that a jammer attacks the system both in …
MIMO uplink system against jamming. We assume that a jammer attacks the system both in …
Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer
In this paper, we consider a wireless powered communication network with an energy
harvesting (EH) jammer where eavesdroppers try to wiretap the communication between …
harvesting (EH) jammer where eavesdroppers try to wiretap the communication between …
Denial-of-service attacks on communication systems: Detectability and jammer knowledge
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …
paper, two classes of such jammers are considered: those with partial and full knowledge …
Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer
The broadcast nature of energy harvesting wireless sensor networks (EH-WSNs) allows
sensor nodes (SNs) within the coverage range of a transmitter to capture its signals …
sensor nodes (SNs) within the coverage range of a transmitter to capture its signals …
Smart jamming using reconfigurable intelligent surface: Asymptotic analysis and optimization
We take the viewpoint of wireless attackers, and investigate the use of the reconfigurable
intelligent surface (RIS) in degrading the communications performance of a time-division …
intelligent surface (RIS) in degrading the communications performance of a time-division …
R-SFLLM: Jamming Resilient Framework for Split Federated Learning with Large Language Models
Split federated learning (SFL) is a compute-efficient paradigm in distributed machine
learning (ML), where components of large ML models are outsourced to remote servers. A …
learning (ML), where components of large ML models are outsourced to remote servers. A …
Suppression of multiple spatially correlated jammers
Effective suppression of inadvertent or deliberate jamming signals is crucial to ensure
reliable wireless communication. However, as demonstrated in this paper, when the …
reliable wireless communication. However, as demonstrated in this paper, when the …