Ruilong Deng

ORCID: 0000-0002-8158-150X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Smart Grid Energy Management
  • Electrostatic Discharge in Electronics
  • Energy Harvesting in Wireless Networks
  • Microgrid Control and Optimization
  • Electric Vehicles and Infrastructure
  • Software-Defined Networks and 5G
  • Age of Information Optimization
  • Cognitive Radio Networks and Spectrum Sensing
  • Power System Optimization and Stability
  • Advanced MIMO Systems Optimization
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Security and Verification in Computing
  • Power Line Communications and Noise
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Advanced Battery Technologies Research
  • Blockchain Technology Applications and Security
  • Satellite Communication Systems
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Opportunistic and Delay-Tolerant Networks

State Key Laboratory of Industrial Control Technology
2014-2025

Hunan University of Technology
2025

Zhejiang University
2013-2024

Zhejiang University of Technology
2011-2024

Dongguan People’s Hospital
2024

Nanyang Technological University
2014-2021

Zhejiang University of Science and Technology
2019-2021

Nanjing Medical University
2021

University of Alberta
2016-2020

Singapore University of Technology and Design
2020

The smart grid is widely considered to be the informationization of power grid. As an essential characteristic grid, demand response can reschedule users' energy consumption reduce operating expense from expensive generators, and further defer capacity addition in long run. This survey comprehensively explores four major aspects: 1) programs; 2) issues; 3) approaches; 4) future extensions response. Specifically, we first introduce means/tariffs that utility takes incentivize users their...

10.1109/tii.2015.2414719 article EN IEEE Transactions on Industrial Informatics 2015-03-18

Mobile users typically have high demand on localized and location-based information services. To always retrieve the data from remote cloud, however, tends to be inefficient, which motivates fog computing. The computing, also known as edge extends cloud computing by deploying facilities at premise of users, prestores distributes mobile with fast-rate local connections. As such, introduces an intermediate layer between complements toward low-latency high-rate services users. In this...

10.1109/jiot.2016.2565516 article EN IEEE Internet of Things Journal 2016-01-01

The accurately estimated state is of great importance for maintaining a stable running condition power systems. To maintain the accuracy state, bad data detection (BDD) utilized by systems to get rid erroneous measurements due meter failures or outside attacks. However, false injection (FDI) attacks, as recently revealed, can circumvent BDD and insert any bias into value state. Continuous works on constructing and/or protecting from such attacks have been done in recent years. This survey...

10.1109/tii.2016.2614396 article EN IEEE Transactions on Industrial Informatics 2016-09-28

This paper investigates the problem of defending against false data injection (FDI) attacks on power system state estimation. Although many research works have been previously reported addressing same problem, most them made a very strong assumption that some meter measurements can be absolutely protected. To address practically, reasonable approach is to assume whether or not measurement could compromised by an adversary does depend defense budget deployed defender meter. From this...

10.1109/tii.2015.2470218 article EN IEEE Transactions on Industrial Informatics 2015-08-19

Future-generation wireless networks (5G and beyond) must accommodate surging growth in mobile data traffic support an increasingly high density of users involving a variety services applications. Meanwhile, the become dense, heterogeneous, decentralized, ad hoc nature, they encompass numerous diverse network entities. Consequently, different objectives, such as throughput low latency, need to be achieved terms service, resource allocation designed optimized accordingly. However, considering...

10.1109/mvt.2019.2903655 article EN IEEE Vehicular Technology Magazine 2019-05-24

This paper investigates the residential energy consumption scheduling problem, which is formulated as a coupled-constraint game by taking interaction among users and temporally-coupled constraint into consideration. The proposed solution consists of two parts. Firstly, dual decomposition applied to transform original decoupled one. Then, Nash equilibrium proven be achievable via best response, computed gradient projection. also extended an online version, able alleviate impact price...

10.1109/tsg.2013.2287494 article EN IEEE Transactions on Smart Grid 2014-03-06

Fog computing, characterized by extending cloud computing to the edge of network, has recently received considerable attention. The fog is not a substitute but powerful complement cloud. It worthy studying interplay and cooperation between (fog) core (cloud). To address this issue, we study tradeoff power consumption delay in cloud-fog system. Specifically, first mathematically formulate workload allocation problem. After that, develop an approximate solution decompose primal problem into...

10.1109/icc.2015.7248934 article EN 2015-06-01

Smart grid, as one of the most critical infrastructures, is vulnerable to a wide variety cyber and/or physical attacks. Recently, new category threats smart named coordinated cyber-physical attacks (CCPAs), are emerging. A key feature CCPAs leverage mask which can cause power outages and potentially trigger cascading failures. In this paper, we investigate in grid show that an adversary carefully synthesize false data injection attack vector based on phasor measurement unit (PMU)...

10.1109/tsg.2017.2702125 article EN IEEE Transactions on Smart Grid 2017-05-12

The existing research on false data injection (FDI) attacks against state estimation in transmission systems cannot be trivially extended to distribution feeders. main reason is that a strong condition requires the attacker know estimated of needed, which makes traditional FDI difficult implemented practice. In this paper, we propose practical attack model systems, without paying expensive cost for obtaining system state. We show can approximate based power flow or measurements too much...

10.1109/tsg.2018.2813280 article EN IEEE Transactions on Smart Grid 2018-03-07

This paper highlights the importance of maintenance techniques in coming industrial revolution, reviews evolution techniques, and presents a comprehensive literature review on latest advancement i.e., Predictive Maintenance (PdM), with emphasis system architectures, optimization objectives, methods. In industry, any outages unplanned downtime machines or systems would degrade interrupt company's core business, potentially resulting significant penalties immeasurable reputation economic loss....

10.48550/arxiv.1912.07383 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Recent studies have investigated the possibilities of proactively detecting high-profile false data injection (FDI) attacks on power grid state estimation by using distributed flexible ac transmission system (D-FACTS) devices, termed as proactive detection (PFDD) approach. However, feasibility and limitations such an approach not been systematically studied in existing literature. In this paper, we explore adopting PFDD to thwart FDI estimation. Specifically, thoroughly study detect...

10.1109/tii.2019.2922215 article EN IEEE Transactions on Industrial Informatics 2019-06-12

Web 3.0 enables user-generated contents and user-selected authorities. With the help of decentralized wireless edge computing architectures, allows users to read, write, own contents. A core technology that goals is blockchain, which provides security services by recording content in a transparent manner. However, explosion on-chain recorded fast-growing number cause increasingly unaffordable storage resource consumption. promising paradigm analyze semantic information can convey precisely...

10.1109/mwc.018.2200568 article EN IEEE Wireless Communications 2023-03-07

The rapid development of information and communications technology has enabled the use digital-controlled software-driven distributed energy resources (DERs) to improve flexibility efficiency power supply, support grid operations. However, this evolution also exposes geographically-dispersed DERs cyber threats, including hardware software vulnerabilities, communication issues, personnel errors, etc. Therefore, enhancing cyber-resiliency DER-based smart -the ability survive successful...

10.1109/tsg.2024.3373008 article EN IEEE Transactions on Smart Grid 2024-03-05

A promising technology that tackles the conflict between spectrum scarcity and underutilization is cognitive radio (CR), of which sensing one most important functionalities. The use dedicated sensors an emerging service for sensing, where multiple perform cooperative sensing. However, due to energy constraint battery-powered sensors, efficiency arises as a critical issue in sensor-aided CR networks. An optimal scheduling each sensor active time can effectively extend network lifetime. In...

10.1109/tvt.2011.2179323 article EN IEEE Transactions on Vehicular Technology 2011-12-12

Smart grid is widely considered to be the next generation of power grid, where generation, management, transmission, distribution, and utilization are fully upgraded improve agility, reliability, efficiency, security, economy, environmental friendliness. Demand response management (DRM) recognized as a control unit smart with attempt balance real-time load well shift peak-hour load. Communications critical accuracy optimality DRM, hence at core performance grid. In this paper, we introduce...

10.1109/tsg.2012.2210058 article EN IEEE Transactions on Smart Grid 2013-02-19

Demand response is a key solution in smart grid to address the ever-increasing peak energy consumption. With multiple utility companies, users will decide from which company buy electricity and how much buy. Consequently, devise distributed real-time demand multiseller–multibuyer environment emerges as critical problem future grid. In this paper, we focus on interactions among companies users. We propose algorithm determine each user's company's supply simultaneously. By applying dual...

10.1109/tpwrs.2014.2359457 article EN IEEE Transactions on Power Systems 2014-10-13

Coordinated charging can provide efficient plans for electric vehicles (EVs) to improve the overall energy utilization while preventing an power system from overloading. However, designing coordinated strategy route mobile EVs fast-charging stations globally optimal is very challenging. In this paper, we investigate a special smart grid with enhanced communication capabilities, i.e., VANET-enhanced grid. It exploits vehicular ad-hoc networks (VANETs) support real-time communications among...

10.1109/jsac.2014.2332078 article EN IEEE Journal on Selected Areas in Communications 2014-06-20

Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment MTD, it still possible for attacker to launch stealthy FDI generated with former In this paper, we prove that, an MTD has capability thwart all constructed susceptances only if (i) number branches l system not less than twice that states n...

10.1109/tifs.2019.2928624 article EN IEEE Transactions on Information Forensics and Security 2019-07-15

In this paper, we consider false data injection (FDI) attacks with limited information of transmission-line susceptances and new countermeasures in smart grids. First, prove that the adversary could launch FDI to modify state variable on a bus or superbus only if he/she knows susceptance every transmission line is incident superbus. Based observation, provide countermeasure against attacks, i.e., make n-1 interconnected lines cover all buses unknown (e.g., by proactively perturbing through...

10.1109/tii.2018.2863256 article EN IEEE Transactions on Industrial Informatics 2018-08-06

In power transmission systems, the false data injection (FDI) attacks against state estimation (SE) have been well studied. However, due to unique features of distribution systems including: low x/r ratio, existence one-and/or two-phase branches, unbalanced load distributions, and unsymmetrical line parameters; research on FDI system SE (DSSE) is still open. this paper, we investigate vulnerability DSSE attacks. particular, first propose a local state-based linear for multiphase smart which...

10.1109/tsg.2019.2895306 article EN IEEE Transactions on Smart Grid 2019-01-24

With the rapid development of information and communications technology in DC microgrids (DCmGs), deception attacks, which typically include false data injection replay have been widely recognized as a significant threat. However, existing literature ignores possibility intelligent attacker, who could launch attacks once obtaining necessary by exploiting zero-day vulnerabilities or bribing insiders, to affect system an unforeseeable manner. In this paper, based on observation that primary...

10.1109/tsg.2021.3129195 article EN IEEE Transactions on Smart Grid 2021-11-19

With the increasing expansion of wind power installed capacity, deployed farms are becoming an attractive target for malicious entities. The geographical scale farm, remoteness its location, flat logical control network, and fragile protocols make it vulnerable to cyber attacks. False data injection (FDI) attacks on value rotor speed may lead reduced generation efficiency, overload drive-train, even shutdowns potentially costly equipment damage turbines. Therefore, in this article, we...

10.1109/tste.2022.3141766 article EN IEEE Transactions on Sustainable Energy 2022-01-11

This paper studies the network utility maximization (NUM) problem in static-routing rechargeable sensor networks (RSNs) with link and battery capacity constraints. The NUM is very challenging as these two constraints are typically coupling RSNs, which cannot be directly tackled. Existing works either do not fully consider coupled together, or heuristically remove temporally part, both of practical, will also degrade performance. In this paper, we attempt to jointly optimize sampling rate...

10.1109/jsac.2016.2520181 article EN IEEE Journal on Selected Areas in Communications 2016-01-21

In this paper, we investigate the network utility maximization problem in energy harvesting cognitive radio sensor networks (CRSNs). Different from traditional networks, nodes CRSNs are embedded modules, enabling them to dynamically access licensed channels. Since dynamic channel is critical guarantee capacity for CRSNs, existing solutions without considering cannot be directly applied into CRSNs. To end, aim at maximizing by jointly controlling sampling rates and of nodes, under...

10.1109/tetc.2016.2555806 article EN IEEE Transactions on Emerging Topics in Computing 2016-04-21
Coming Soon ...