Your selections:
A framework for cyber-topology attacks: line-switching and new attack scenarios
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Y.
- Liang, Gaoqi, Weller, Steven R., Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang
Generalized FDIA-based cyber topology attack with application to the Australian electricity market trading mechanism
- Liang, Gaoqi, Weller, Steven R., Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang
Multi-objective generation dispatch considering the trade-off between economy and security
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao
- Qiu, Jing, Zhao, Junhua, Yang, Hongming, Wang, Dongxiao, Dong, Zhao Yang
A review of false data injection attacks against modern power systems
- Liang, Gaoqi, Zhao, Junhua, Luo, Fengji, Weller, Steven R., Dong, Zhao Yang
An operational planning framework for large-scale thermostatically controlled load dispatch
- Luo, Fengji, Dong, Zhao Yang, Meng, Ke, Wen, Junhao, Wang, Haiming, Zhao, Junhua
Composite FDIA and topology attack on the electricity market
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao, Dong, Zhao Yang
False data injection attacks targeting DC model-based state estimation
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
Flexible multi-objective transmission expansion planning with adjustable risk aversion
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao
Network reinforcement for grid resiliency under extreme events
- Qiu, Jing, Reedman, Luke J., Dong, Zhao Yang, Meng, Ke, Tian, Huiqiao, Zhao, Junhua
Probabilistic transmission expansion planning for increasing wind power penetration
- Qiu, Jing, Zhao, Junhua, Dong, Zhao Yang
The 2015 Ukraine blackout: implications for false data injection attacks
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang
Two-stage coordinated operational strategy for distributed energy resources considering wind power curtailment penalty cost
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao, Zheng, Yu
A probabilistic transmission planning framework for reducing network vulnerability to extreme events
- Qiu, Jing, Yang, Hongming, Dong, Zhao Yang, Zhao, Junhua, Luo, Fengji, Lai, Mingyong, Wong, Kit Po
A risk-based approach to multi-stage probabilistic transmission network planning
- Qiu, Jing, Dong, Zhao Yang, Zhao, Junhua, Xu, Yan, Luo, Fengji, Yang, Jiajia
- Wang, Shu, Xu, Yan, Dong, Zhao Yang, Zhao, Junhua, Yao, Weifang, Luo, Fengji, Wang, Yijia
- Xu, Yan, Zhang, Rui, Zhao, Junhua, Dong, Zhao Yang, Wang, Dianhui, Yang, Hongming, Wong, Kit Po
- Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang, Chen, Yingying, Xu, Yan, Zhang, Xin, Wong, Kit Po
Are you sure you would like to clear your session, including search history and login status?