Yichi Zhang

ORCID: 0000-0003-1183-8629
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Power System Reliability and Maintenance
  • Engineering Diagnostics and Reliability
  • Infrastructure Resilience and Vulnerability Analysis
  • Information and Cyber Security
  • Grey System Theory Applications
  • Smart Grid and Power Systems
  • Advanced Sensor and Control Systems
  • Industrial Technology and Control Systems
  • Fault Detection and Control Systems
  • Caching and Content Delivery
  • Software-Defined Networks and 5G
  • Gear and Bearing Dynamics Analysis
  • Oil and Gas Production Techniques
  • Neural Networks and Applications
  • Infrastructure Maintenance and Monitoring
  • Grouting, Rheology, and Soil Mechanics
  • Asphalt Pavement Performance Evaluation
  • Structural Health Monitoring Techniques
  • Power Systems Fault Detection
  • Machine Fault Diagnosis Techniques
  • Geotechnical Engineering and Analysis
  • Vibration and Dynamic Analysis
  • Advanced Algorithms and Applications

North China Electric Power University
2021-2025

Jiangsu University
2024

Politecnico di Milano
2024

China Electric Power Research Institute
2021-2023

Shandong University
2021-2023

Air Force Engineering University
2021-2022

Wuhan University of Technology
2022

Shandong Transportation Research Institute
2021

University of Southern California
2020-2021

University of California, Los Angeles
2020

As information and communication networks are highly interconnected with the power grid, cyber security of supervisory control data acquisition (SCADA) system has become a critical issue in electric sector. By exploiting vulnerabilities components intruding into local area center, corporation, substations, or by injecting false links, attackers able to eavesdrop data, reconfigure devices, send trip commands intelligent electronic devices that breakers. Reliability can thus be impacted...

10.1109/tsg.2015.2396994 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2015-02-16

By exploiting the vulnerabilities in cyber components, an attacker could intrude wind farm supervisory control and data acquisition (SCADA) system energy management (EMS), maliciously trip one or multiple turbines. The reliability of overall power thus be impacted by performance farms. In this paper, attack scenarios concerning components networks are considered integrated SCADA/EMS architecture. Two Bayesian graph models adopted to represent procedures successful attacks, a mean...

10.1109/tsg.2016.2523515 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2016-02-12

The increased complexity of power system makes the dispatch heavily rely on condition monitoring and state estimation functions. However, with massive deployment cyber technologies, grid is becoming more vulnerable to malicious attacks, including various kinds false data injection attacks. This paper quantifies influence load redistribution (LR) attack long-term supply reliability. intrusion process for manipulating measurements modeled by semi-Markov models. Considering practical...

10.1109/tsg.2016.2569589 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2016-01-01

With sufficient resources, attackers might be able to intrude into multiple substation-level networks of the supervisory control and data acquisition (SCADA) system send fabricated commands local field devices. In this paper, cyberattacks against SCADA in substations power are modeled by a modified semi-Markov process (SMP). The optimal allocation offensive defensive resources is as Colonel Blotto game, probabilities successful on 24 calculated. allocated mean time-to-compromise (MTTCs) each...

10.1109/tpwrs.2015.2510626 article EN publisher-specific-oa IEEE Transactions on Power Systems 2016-01-05

By intruding on the substations and control center of supervisory data acquisition system, trip commands can be sent to intelligent electronic devices that power system breakers. Reliability impacted through cyberattacks. In this paper, a modified semi-Markov process (SMP) model is used describe procedures normal penetration attacks against intrusion tolerant system. modeling transition probabilities between SMP states sojourn time each state, mean times compromise are calculated. With...

10.1109/tsg.2015.2439693 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2015-06-17

The imposed communication network brings more vulnerabilities to the evolving smart grid. Therefore, defensive techniques such as intrusion detection will need be deployed in this already complicated system. Deployment and runtime cost due trust systems affect original function of grid system without careful planning design. This paper is an effort address important issue. In particular, set packing algorithm used optimize placement nodes multiple layer architecture After are placed, a node...

10.1109/tsg.2012.2224390 article EN IEEE Transactions on Smart Grid 2013-02-06

As clean energy generation grows, power systems require greater flexibility to ensure safe operation. a critical emerging entity that assists the grid in balancing peak and valley load fluctuations, virtual plants can provide flexible real-time through demand response coordinate reasonable dispatch responses among all participants alleviate contradiction between supply during electricity consumption periods. Large industrial loads have characteristics of large base. Currently, there is lack...

10.1117/12.3044959 article EN 2025-01-16

Selection bias is a major obstacle toward valid causal inference in epidemiology. Over the past decade, several simple graphical rules based on diagrams have been proposed as sufficient identification conditions for addressing selection and recovering effects. However, these are usually coupled with specific strategies estimators. In this article, we show two important cases of that cannot be addressed by their estimators: one case where descendant collider treatment outcome, other affected...

10.48550/arxiv.2502.00924 preprint EN arXiv (Cornell University) 2025-02-02

The advent of the smart grid promises to usher in an era that will bring intelligence, efficiency, and optimality power grid. Most these changes occur as Internet-like communications network is superimposed on top current communication environment should be more robust, reliable, efficient. In order address this issue, work proposes a Smart Grid Communication Network (SGCN) by deploying wireless mesh technologies consisting 802.15.4 Zigbee, 802.11, WiMAX standards. These are applied...

10.1109/naps.2011.6025169 article EN North American Power Symposium 2011-08-01

10.1016/j.ijepes.2017.10.004 article EN publisher-specific-oa International Journal of Electrical Power & Energy Systems 2017-11-06

As information and communication networks are highly interconnected with the power grid, cyber security of supervisory control data acquisition (SCADA) system has become a critical issue in system. By intruding into SCADA via remote access points, attackers able to eavesdrop reconfigure devices trip breakers. The attacks impact reliability through In this paper, six attack scenarios considered. A Bayesian graph model is used evaluate probabilities successful on system, which will result...

10.1109/pesgm.2014.6939397 article EN 2014-07-01

Abstract In order to investigate the slurry flow behavior, our newly proposed numerical method is applied simulate fracture grouting with flowing water condition. First, by validation and experiment comparison, advantages of this in computation efficiency accuracy are shown. Second, initial velocity properties at different levels selected as influencing factors, reduction effect, pressure, deposition behavior cases investigated, variation characteristics field outflow analyzed. The...

10.1002/nag.3534 article EN International Journal for Numerical and Analytical Methods in Geomechanics 2023-04-25

As power grids rely more on the open communication technologies and supervisory control data acquisition (SCADA) system, they are becoming vulnerable to malicious cyber attacks. The reliability of system can be impacted by SCADA due a diverse set probable attacks it. This paper deals with impact reliability. A forced outage rate (FOR) model is proposed considering impacts characteristic generators transmission lines. Different occurrences targeting lead different effects FOR values. loss...

10.1109/cyber.2013.6705490 article EN IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems 2013-05-01

Modern power systems heavily rely on the associated cyber network, and attacks against control network may cause undesired consequences such as load shedding, equipment damage, so forth. The behaviors of attackers can be random, thus it is crucial to develop novel methods evaluate adequacy system under probabilistic attacks. In this study, external internal structures substation are introduced, possible attack paths breakers analyzed. resources vulnerability factors discussed considering...

10.1109/pesgm.2014.6939374 article EN 2014-07-01

Medium-frequency (mid-frequency) vibration analysis of complex structures plays an important role in automotive, aerospace, mechanical, and civil engineering. Flexible beam modeled by the classical Euler–Bernoulli theory have been widely used various engineering problems. A kinematic hypothesis made is that plane sections a normal to its neutral axis remain planes after experiences bending deformation, which neglects shear deformation. However, previous investigations found out deformation...

10.1142/s0219455420410096 article EN International Journal of Structural Stability and Dynamics 2020-09-22

The unified power flow controller (UPFC) has attracted much attention recently because of its capability in controlling the active and reactive flows. normal operation UPFC is dependent on both physical part associated cyber system. Thus malicious attacks may impact reliability UPFC. As more information communication technologies are being integrated into current grid, frequent occurrences possible. In this paper, architecture analyzed, possible attack scenarios considered discussed. Based...

10.1109/tdc.2014.6863469 article EN 2014-04-01

With the substantial increase in physical attacks such as gunfire, ballistic attack, vehicle knock down, terrorist attacks, etc. on electric power grid facilities worldwide and issuance by NERC CIP-014 IEEE Std1402 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">™</sup> , utility industry has boosted their investment towards strengthening security of substation to restrict future attacks. It is necessary build attack-resilient substations. This...

10.1109/iceemt59522.2023.10263232 article EN 2023-07-21

Abstract This research aimed to explore the impact of aging on molecular structure asphalts from different crude oils. The elemental composition five types original was measured. changes were analyzed with Fourier transform infrared spectroscopy (FTIR) and nuclear magnetic resonance (1H-NMR) before after thin-film oven test, ultraviolet light (UV), pressure vessel (PAV). result analysis showed that hydrogen-carbon ratio (H/C) ranges 1.347 1.602 contents sulfur, nitrogen, oxygen. FTIR...

10.1520/jte20210744 article EN Journal of Testing and Evaluation 2022-03-22

The imposed communication network brings more vulnerabilities to the evolving smart grid. Therefore, defensive techniques such as intrusion detection will need be deployed and used in this already complicated system. Deployment runtime cost due systems affect normal function of grid system without careful planning design. This paper is an effort address issue. In particular, we apply set packing algorithm optimize (minimize) placement trust nodes multiple layer architecture After are placed,...

10.1109/pesgm.2012.6345688 article EN 2012-07-01

Active worms are capable of compromising the cyber security supervisory control and data acquisition (SCADA) network in power systems within quite a short time. This may bring high vulnerability to cyber-physical system, which is becoming more dependent on communication technologies deployed SCADA system. The reliability system be compromised by spreading through networks. In this paper, impact worm attacks analyzed. A forced outage rate (FOR) model proposed considering impacts...

10.1109/appeec.2013.6837300 article EN 2013-12-01

The complex structure of the smart grid calls for a secure and reliable real-time communication network on top physical power system. security system can be guaranteed by deploying trust nodes to monitor traffic malicious attacks. In order function, an intelligent routing algorithm which is aware placement status provide optimal routes at all times needed. this paper, we design present such algorithm. addition, scenarios searching between communicating different layers are illustrated in...

10.1109/cyber.2012.6392566 article EN 2012-05-01

In recent years, multimodal large language models (MLLMs) have shown remarkable capabilities in tasks like visual question answering and common sense reasoning, while perception made significant strides tasks, such as detection segmentation. However, MLLMs mainly focus on high-level image-text interpretations struggle with fine-grained understanding, vision usually suffer from open-world distribution shifts due to their limited model capacity. To overcome these challenges, we propose the...

10.48550/arxiv.2406.15768 preprint EN arXiv (Cornell University) 2024-06-22
Coming Soon ...