no code implementations • 22 Feb 2024 • Ahmad Mohammad Saber, Amr Youssef, Davor Svetinovic, Hatem Zeineldin, Deepa Kundur, Ehab El-Saadany
It can accurately classify PQEs under the aforementioned conditions with an accuracy varying between 99. 81%$-$91. 43% depending on the signal-to-noise ratio, DC offsets, and variations in the signal amplitude and frequency.
no code implementations • 19 Sep 2023 • Ahmad Mohammad Saber, Amr Youssef, Davor Svetinovic, Hatem Zeineldin, Ehab El-Saadany
In contrast with previous works that proposed methods to mitigate the oscillations after they are already present in the system, this paper presents an intrusion detection method to detect malicious VVC curves once they are communicated to the inverter.
no code implementations • 8 Mar 2023 • Amir Mohammad Naseri, Walter Lucia, Amr Youssef
Our key agreement scheme leverages a nonlinear unknown input observer and an error correction code mechanism to allow the robot to securely agree on a secret key with its remote controller.
no code implementations • 27 Sep 2021 • Omniyah Gul M Khan, Amr Youssef, Ehab El-Saadany, Magdy Salama
In this paper, we focus on Load Altering Attacks that would compromise the operation of market-based congestion management methods.
no code implementations • 7 May 2021 • Walter Lucia, Amr Youssef
In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions.
no code implementations • 16 Mar 2021 • Omniyah Gul M Khan, Ehab El-Saadany, Amr Youssef, Mostafa Shaaban
Moreover, the effect of the botnet of the transmission network is also studied.