no code implementations • 9 May 2023 • Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun
The widespread adoption of Image Processing has propelled Object Recognition (OR) models into essential roles across various applications, demonstrating the power of AI and enabling crucial services.
no code implementations • 30 Jan 2023 • Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi
Electrical variables as input variables of the model are mainly considered to indicate the power system operation as secure or insecure, according to the reliability criteria for contingency scenarios.
no code implementations • 7 Mar 2022 • Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi
It has been shown that the power system state estimation is vulnerable to false data injection attacks.
no code implementations • 17 Feb 2021 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
False data injection attacks (FDIAs) pose a significant security threat to power system state estimation.
no code implementations • 16 Oct 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
In this work, we study the vulnerabilities of DL-based energy theft detection through adversarial attacks, including single-step attacks and iterative attacks.
1 code implementation • 2 Jun 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
Energy theft causes large economic losses to utility companies around the world.
no code implementations • 12 Mar 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
We study the potential vulnerabilities of ML applied in CPSs by proposing Constrained Adversarial Machine Learning (ConAML), which generates adversarial examples that satisfy the intrinsic constraints of the physical systems.