- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Smart Grid Energy Management
- Electrostatic Discharge in Electronics
- Energy Harvesting in Wireless Networks
- Microgrid Control and Optimization
- Electric Vehicles and Infrastructure
- Software-Defined Networks and 5G
- Age of Information Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Power System Optimization and Stability
- Advanced MIMO Systems Optimization
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Security and Verification in Computing
- Power Line Communications and Noise
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Advanced Battery Technologies Research
- Blockchain Technology Applications and Security
- Satellite Communication Systems
- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Physical Unclonable Functions (PUFs) and Hardware Security
- Opportunistic and Delay-Tolerant Networks
State Key Laboratory of Industrial Control Technology
2014-2025
Hunan University of Technology
2025
Zhejiang University
2013-2024
Zhejiang University of Technology
2011-2024
Dongguan People’s Hospital
2024
Nanyang Technological University
2014-2021
Zhejiang University of Science and Technology
2019-2021
Nanjing Medical University
2021
University of Alberta
2016-2020
Singapore University of Technology and Design
2020
The smart grid is widely considered to be the informationization of power grid. As an essential characteristic grid, demand response can reschedule users' energy consumption reduce operating expense from expensive generators, and further defer capacity addition in long run. This survey comprehensively explores four major aspects: 1) programs; 2) issues; 3) approaches; 4) future extensions response. Specifically, we first introduce means/tariffs that utility takes incentivize users their...
Mobile users typically have high demand on localized and location-based information services. To always retrieve the data from remote cloud, however, tends to be inefficient, which motivates fog computing. The computing, also known as edge extends cloud computing by deploying facilities at premise of users, prestores distributes mobile with fast-rate local connections. As such, introduces an intermediate layer between complements toward low-latency high-rate services users. In this...
The accurately estimated state is of great importance for maintaining a stable running condition power systems. To maintain the accuracy state, bad data detection (BDD) utilized by systems to get rid erroneous measurements due meter failures or outside attacks. However, false injection (FDI) attacks, as recently revealed, can circumvent BDD and insert any bias into value state. Continuous works on constructing and/or protecting from such attacks have been done in recent years. This survey...
This paper investigates the problem of defending against false data injection (FDI) attacks on power system state estimation. Although many research works have been previously reported addressing same problem, most them made a very strong assumption that some meter measurements can be absolutely protected. To address practically, reasonable approach is to assume whether or not measurement could compromised by an adversary does depend defense budget deployed defender meter. From this...
Future-generation wireless networks (5G and beyond) must accommodate surging growth in mobile data traffic support an increasingly high density of users involving a variety services applications. Meanwhile, the become dense, heterogeneous, decentralized, ad hoc nature, they encompass numerous diverse network entities. Consequently, different objectives, such as throughput low latency, need to be achieved terms service, resource allocation designed optimized accordingly. However, considering...
This paper investigates the residential energy consumption scheduling problem, which is formulated as a coupled-constraint game by taking interaction among users and temporally-coupled constraint into consideration. The proposed solution consists of two parts. Firstly, dual decomposition applied to transform original decoupled one. Then, Nash equilibrium proven be achievable via best response, computed gradient projection. also extended an online version, able alleviate impact price...
Fog computing, characterized by extending cloud computing to the edge of network, has recently received considerable attention. The fog is not a substitute but powerful complement cloud. It worthy studying interplay and cooperation between (fog) core (cloud). To address this issue, we study tradeoff power consumption delay in cloud-fog system. Specifically, first mathematically formulate workload allocation problem. After that, develop an approximate solution decompose primal problem into...
Smart grid, as one of the most critical infrastructures, is vulnerable to a wide variety cyber and/or physical attacks. Recently, new category threats smart named coordinated cyber-physical attacks (CCPAs), are emerging. A key feature CCPAs leverage mask which can cause power outages and potentially trigger cascading failures. In this paper, we investigate in grid show that an adversary carefully synthesize false data injection attack vector based on phasor measurement unit (PMU)...
The existing research on false data injection (FDI) attacks against state estimation in transmission systems cannot be trivially extended to distribution feeders. main reason is that a strong condition requires the attacker know estimated of needed, which makes traditional FDI difficult implemented practice. In this paper, we propose practical attack model systems, without paying expensive cost for obtaining system state. We show can approximate based power flow or measurements too much...
This paper highlights the importance of maintenance techniques in coming industrial revolution, reviews evolution techniques, and presents a comprehensive literature review on latest advancement i.e., Predictive Maintenance (PdM), with emphasis system architectures, optimization objectives, methods. In industry, any outages unplanned downtime machines or systems would degrade interrupt company's core business, potentially resulting significant penalties immeasurable reputation economic loss....
Recent studies have investigated the possibilities of proactively detecting high-profile false data injection (FDI) attacks on power grid state estimation by using distributed flexible ac transmission system (D-FACTS) devices, termed as proactive detection (PFDD) approach. However, feasibility and limitations such an approach not been systematically studied in existing literature. In this paper, we explore adopting PFDD to thwart FDI estimation. Specifically, thoroughly study detect...
Web 3.0 enables user-generated contents and user-selected authorities. With the help of decentralized wireless edge computing architectures, allows users to read, write, own contents. A core technology that goals is blockchain, which provides security services by recording content in a transparent manner. However, explosion on-chain recorded fast-growing number cause increasingly unaffordable storage resource consumption. promising paradigm analyze semantic information can convey precisely...
The rapid development of information and communications technology has enabled the use digital-controlled software-driven distributed energy resources (DERs) to improve flexibility efficiency power supply, support grid operations. However, this evolution also exposes geographically-dispersed DERs cyber threats, including hardware software vulnerabilities, communication issues, personnel errors, etc. Therefore, enhancing cyber-resiliency DER-based smart -the ability survive successful...
A promising technology that tackles the conflict between spectrum scarcity and underutilization is cognitive radio (CR), of which sensing one most important functionalities. The use dedicated sensors an emerging service for sensing, where multiple perform cooperative sensing. However, due to energy constraint battery-powered sensors, efficiency arises as a critical issue in sensor-aided CR networks. An optimal scheduling each sensor active time can effectively extend network lifetime. In...
Smart grid is widely considered to be the next generation of power grid, where generation, management, transmission, distribution, and utilization are fully upgraded improve agility, reliability, efficiency, security, economy, environmental friendliness. Demand response management (DRM) recognized as a control unit smart with attempt balance real-time load well shift peak-hour load. Communications critical accuracy optimality DRM, hence at core performance grid. In this paper, we introduce...
Demand response is a key solution in smart grid to address the ever-increasing peak energy consumption. With multiple utility companies, users will decide from which company buy electricity and how much buy. Consequently, devise distributed real-time demand multiseller–multibuyer environment emerges as critical problem future grid. In this paper, we focus on interactions among companies users. We propose algorithm determine each user's company's supply simultaneously. By applying dual...
Coordinated charging can provide efficient plans for electric vehicles (EVs) to improve the overall energy utilization while preventing an power system from overloading. However, designing coordinated strategy route mobile EVs fast-charging stations globally optimal is very challenging. In this paper, we investigate a special smart grid with enhanced communication capabilities, i.e., VANET-enhanced grid. It exploits vehicular ad-hoc networks (VANETs) support real-time communications among...
Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment MTD, it still possible for attacker to launch stealthy FDI generated with former In this paper, we prove that, an MTD has capability thwart all constructed susceptances only if (i) number branches l system not less than twice that states n...
In this paper, we consider false data injection (FDI) attacks with limited information of transmission-line susceptances and new countermeasures in smart grids. First, prove that the adversary could launch FDI to modify state variable on a bus or superbus only if he/she knows susceptance every transmission line is incident superbus. Based observation, provide countermeasure against attacks, i.e., make n-1 interconnected lines cover all buses unknown (e.g., by proactively perturbing through...
In power transmission systems, the false data injection (FDI) attacks against state estimation (SE) have been well studied. However, due to unique features of distribution systems including: low x/r ratio, existence one-and/or two-phase branches, unbalanced load distributions, and unsymmetrical line parameters; research on FDI system SE (DSSE) is still open. this paper, we investigate vulnerability DSSE attacks. particular, first propose a local state-based linear for multiphase smart which...
With the rapid development of information and communications technology in DC microgrids (DCmGs), deception attacks, which typically include false data injection replay have been widely recognized as a significant threat. However, existing literature ignores possibility intelligent attacker, who could launch attacks once obtaining necessary by exploiting zero-day vulnerabilities or bribing insiders, to affect system an unforeseeable manner. In this paper, based on observation that primary...
With the increasing expansion of wind power installed capacity, deployed farms are becoming an attractive target for malicious entities. The geographical scale farm, remoteness its location, flat logical control network, and fragile protocols make it vulnerable to cyber attacks. False data injection (FDI) attacks on value rotor speed may lead reduced generation efficiency, overload drive-train, even shutdowns potentially costly equipment damage turbines. Therefore, in this article, we...
This paper studies the network utility maximization (NUM) problem in static-routing rechargeable sensor networks (RSNs) with link and battery capacity constraints. The NUM is very challenging as these two constraints are typically coupling RSNs, which cannot be directly tackled. Existing works either do not fully consider coupled together, or heuristically remove temporally part, both of practical, will also degrade performance. In this paper, we attempt to jointly optimize sampling rate...
In this paper, we investigate the network utility maximization problem in energy harvesting cognitive radio sensor networks (CRSNs). Different from traditional networks, nodes CRSNs are embedded modules, enabling them to dynamically access licensed channels. Since dynamic channel is critical guarantee capacity for CRSNs, existing solutions without considering cannot be directly applied into CRSNs. To end, aim at maximizing by jointly controlling sampling rates and of nodes, under...