Zeyu Mao

ORCID: 0000-0003-0841-5123
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Power System Optimization and Stability
  • Real-time simulation and control systems
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Power Systems and Technologies
  • Anomaly Detection Techniques and Applications
  • Network Traffic and Congestion Control
  • Infrastructure Resilience and Vulnerability Analysis
  • HVDC Systems and Fault Protection
  • Security and Verification in Computing
  • Optimal Power Flow Distribution
  • Power Systems Fault Detection
  • Software-Defined Networks and 5G
  • Information and Cyber Security
  • Caching and Content Delivery
  • Green IT and Sustainability
  • Human-Automation Interaction and Safety
  • Ionosphere and magnetosphere dynamics
  • Sustainability and Ecological Systems Analysis
  • Software Testing and Debugging Techniques
  • IoT-based Smart Home Systems
  • Network Time Synchronization Technologies

Waseda University
2024

Texas A&M University
2019-2023

Mitchell Institute
2020-2023

University of Michigan
2008-2022

Tsinghua University
2022

Hangzhou Dianzi University
2022

Global Energy Interconnection Research Institute North America
2020

University of Illinois Urbana-Champaign
2016-2017

Microsoft (United States)
2014

Chongqing University
2014

Many threats that plague today's networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem attack programs commonly called malware. To combat these threats, defenders have turned to the collection, analysis, and reverse engineering malware as mechanisms understand programs, generate signatures, facilitate cleanup infected hosts. Recently however, new instances emerged with capability check often thwart defensive activities — essentially leaving blind...

10.1109/dsn.2008.4630086 article EN 2008-01-01

Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In MiTM attack, an intruder embeds itself within conversation between two devices either eavesdrop or impersonate one of the devices, making it appear be normal exchange information. Thus, can perform false data injection (FDI) and command (FCI) that compromise power system operations, such as state estimation, economic dispatch, automatic generation control (AGC). Very few researchers have focused on methods are...

10.1049/cps2.12014 article EN IET Cyber-Physical Systems Theory & Applications 2021-06-28

Connected and Autonomous Vehicles (CAVs) heavily rely on 3D sensors such as LiDARs, radars, stereo cameras. However, from a single vehicle suffer two fundamental limitations: vulnerability to occlusion loss of details far-away objects. To overcome both limitations, in this paper, we design, implement, evaluate EMP, novel edge-assisted multi-vehicle perception system for CAVs. In multiple nearby CAVs share their raw sensor data with an edge server which then merges CAVs' individual views form...

10.1145/3447993.3483242 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2021-10-25

Modern power systems equipped with advanced communication infrastructure are cyber-physical in nature. The traditional approach of leveraging physical measurements for detecting cyber-induced contingencies insufficient to reflect the accurate states. Moreover, deploying conventional rule-based and anomaly-based intrusion detection cyberattack results higher false positives. Hence, independent usage tools cyberattacks cyber sides has a limited capability. In this work, mechanism fuse...

10.1109/access.2021.3106873 article EN cc-by IEEE Access 2021-01-01

With 5G's support for diverse radio bands and different deployment modes, e.g., standalone (SA) vs. non-standalone (NSA), mobility management - especially the handover process becomes far more complex. Measurement studies have shown that frequent handovers cause wild fluctuations in 5G throughput, worst, service outages. Through a cross-country (6,200 km+) driving trip, we conduct in-depth measurements to study current practices adopted by three major U.S. carriers. Using this rich dataset,...

10.1145/3544216.3544217 article EN 2022-08-11

An important issue in anomaly detection smart manufacturing systems is the lack of consistency formal definitions anomalies, faults, and attacks. The term used to cover a wide range situations that are addressed by different types solutions. In this letter, we categorize anomalies machines, controllers, networks along with their mechanisms, unify them under common framework aid identification potential main contribution proposed categorization it allows gaps systems.

10.1109/lra.2017.2714135 article EN publisher-specific-oa IEEE Robotics and Automation Letters 2017-06-09

Identifying the multiple critical components in power systems whose absence together has severe impact on system performance is a crucial problem for known as <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$(N-x)$</tex-math></inline-formula> contingency analysis. However, inherent combinatorial feature of notation="LaTeX">$N-x$</tex-math></inline-formula> analysis incurs by increase...

10.1109/jsyst.2021.3089548 article EN publisher-specific-oa IEEE Systems Journal 2021-10-08

While it is widely recognized that weather impacts the power flow, historically information has only been implicitly included. This paper presents an approach for direct inclusion of in flow. Key issues addressed by include availability information, mapping to electric grid components, a flexible and extensible modeling relating values flow models, visualization impacts. The demonstrated on several grids ranging size from 7000 82,000 buses using data over different years.

10.24251/hicss.2023.330 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2023-01-01

A power system is a complex cyber-physical whose security critical to its function. major challenge model, analyse and visualise the communication backbone of systems concerning cyber threats. To achieve this, design evaluation (CPPS) testbed called Resilient Energy Systems Lab (RESLab) are presented capture realistic cyber, physical, protection features. RESLab architected be fundamental platform for studying improving resilience CPPS The network emulated using Common Open Research Emulator...

10.1049/cps2.12018 article EN IET Cyber-Physical Systems Theory & Applications 2021-06-16

Traditional <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">optimal power flow</i> (OPF) ensures systems are operated safely at minimum cost. Recent disasters have highlighted that a focus on minimizing cost can result in fragile system, such as the immense economic loss and adverse societal impacts after 2021 Texas Winter Storm. Resilience objectives must also be considered to guide system operation through unexpected non-ideal conditions....

10.1109/tpwrs.2022.3168226 article EN cc-by IEEE Transactions on Power Systems 2022-04-19

We present a measurement study analyzing DDoS attacks from multiple data sources, relying on both direct measurements of flow-level information, and more traditional indirect using backscatter analysis. Understanding the nature is critically important to development effective counter measures this pressing problem. While much community's current understanding result measurements, our analysis suggests that such studies do not give comprehensive view witnessed in today's Internet....

10.1145/1162666.1162675 article EN 2006-09-11

In this work, we conduct the first systematic study in understanding security properties of usage Unix domain sockets by both Android apps and system daemons as an IPC (Inter-process Communication) mechanism, especially for cross-layer communications between Java native layers. We propose a tool called SInspector to expose potential vulnerabilities using through process identifying socket addresses, detecting authentication checks, performing data flow analysis. Our in-depth analysis...

10.1145/2976749.2978297 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Power systems are critical infrastructure for reliable and secure electric energy delivery. Incidents increasing, as unexpected multiple hazards ranging from natural disasters to cyberattacks threaten the security functionality of society. Inspired by resilient ecosystems, this paper presents a network design approach with an ecological robustness (R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ECO</sub> )-oriented optimization improve power...

10.1109/tpwrs.2023.3262501 article EN cc-by IEEE Transactions on Power Systems 2023-03-28

Signature-based Intrusion Detection Systems (IDSes) such as Snort, BRO or Suricata depend on specific patterns and byte sequences in network traffic to detect intrusions; hence, they cannot prevent intrusions for unknown zero-day attacks. Various anomaly-based IDSes that have been proposed based machine learning (ML) techniques incur high false positives. To overcome this, we explore different types of data processing, i.e. balancing, feature correlation, normalization, reduction, whether...

10.1109/cqr47547.2020.9101394 article EN 2020-05-01

In this work, nanoscale SnO 2 with various geometrical morphologies, including pine needle‐like, sphere‐like, sheet‐like, grape‐like nanostructures, was prepared via a facile hydrothermal process. Microstructures and morphologies of all the as‐synthesized products were characterized by X‐ray diffraction (XRD) field emission scanning electron microscopy (FESEM). Meanwhile, specific surface areas as‐prepared nanostructures determined Brunauer‐Emmett‐Teller (BET) analysis. Gas sensors...

10.1155/2014/291273 article EN cc-by Journal of Nanomaterials 2014-01-01

Power system simulation environments with appropriate time-fidelity are needed to enable rapid testing of new smart grid technologies and for coupled simulations the underlying cyber infrastructure. This paper presents such an environment which operates power models in PMU time frame, including data visualization interactive control action capabilities. The flexible extensible capabilities demonstrated by interfacing a infrastructure simulation.

10.1109/tpec.2017.7868264 article EN 2017-02-01

The electric power system is an essential cornerstone of modern society, enabling everything from the internet to refrigeration.Due a variety forces including climate change, changing economics, and digital computer revolution, grid undergoing period major change.In order overcome current upcoming challenges in system, such as integrating renewable resources into that was not designed for intermittent sources, researchers industry practitioners must simulate grid, its component devices,...

10.21105/joss.02289 article EN cc-by The Journal of Open Source Software 2020-06-17

Power system substations have intelligent electronic devices (IEDs) that collect data and control other devices. As the bridge between physical cyber parts of power system, IEDs capture some key behaviors. Since adversaries can modify system’s behavior, be used to infer characteristics about adversary. In this article, we present alert logic for hardware-based defense using communication status in substation <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tia.2022.3186660 article EN publisher-specific-oa IEEE Transactions on Industry Applications 2022-06-27
Coming Soon ...