- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Power System Optimization and Stability
- Power Systems and Technologies
- Anomaly Detection Techniques and Applications
- Power Systems Fault Detection
- Smart Grid and Power Systems
- Internet Traffic Analysis and Secure E-voting
- Advanced Clustering Algorithms Research
- Real-time simulation and control systems
- Handwritten Text Recognition Techniques
- Natural Language Processing Techniques
- Vehicle License Plate Recognition
- Image Processing Techniques and Applications
- Semantic Web and Ontologies
- Topic Modeling
- Computational Physics and Python Applications
- Physical Unclonable Functions (PUFs) and Hardware Security
- Image and Object Detection Techniques
- Face and Expression Recognition
- Industrial Vision Systems and Defect Detection
- Context-Aware Activity Recognition Systems
- Image Retrieval and Classification Techniques
- Robotics and Automated Systems
- Electrostatic Discharge in Electronics
Huazhong University of Science and Technology
2017-2025
Beijing University of Posts and Telecommunications
2024-2025
Sichuan University
2024
Switch
2024
Phasor measurement unit (PMU) data manipulation attacks (PDMAs) may blind the control centers to real-time operating conditions of power systems. Detecting these accurately is essential ensure normal operation system monitoring and control. Using long-term accumulated historical PMU measurements train a machine learning model detect PDMAs has shown promising results. In this paper, deepautoencoder-based anomaly measurers are deployed throughout build distributed PDMA detection framework. The...
Searching for the Extreme Operating Conditions (EOCs) is one of core problems power system relay protection setting calculation. The current methods based on brute-force search, heuristic algorithms, and mathematical programming can hardly meet requirements today's systems in terms computation speed due to drastic changes operating conditions induced by renewables electronics. This paper proposes an EOC fast search method, named Graph Dueling Double Deep Q Network (Graph D3QN), which...
<title>Abstract</title> Prostate cancer (PCa) detection remains challenging when prostate-specific antigen (PSA) levels fall within the ambiguous 4–20 ng/mL range. This study aimed to develop a non-invasive, cost-effective method for early PCa using circulating tumor DNA (ctDNA) fragmentomic features. Whole-genome sequencing of cell-free (cfDNA) from plasma samples was performed in training cohort (78 patients, 99 non-cancer controls) and an independent test (57 non-metastatic PCa, 20...
Substation One-Line Diagrams (SOLDs) are widely used in power systems to schematically represent electrical devices and their connection relationships. They typically saved as raster images that cannot be directly parsed, making them difficult query, manage, reuse. When modeling systems, users often have manually draw SOLDs from scratch, which is time-consuming prone errors. To facilitate automated SOLD digitization, this article proposes an intelligent computer vision framework with three...
Power system cyber-physical uncertainties, including measurement ambiguities stemming from cyber attacks and data losses, along with uncertainties introduced by massive renewables complex dynamics, reduce the likelihood of enhancing quality measurements. Fortunately, denoising diffusion models exhibit powerful learning generation abilities for underlying physics real world. To this end, paper proposes an improved detection imputation based two-stage model (TSDM) to identify reconstruct...
Phasor measurement unit (PMU) data quality problems, such as loss and modification caused by communication contingencies cyber attacks, threaten the reliability stability of modern power systems. In this paper, autoregressive Bayesian low-rank matrix/Hankel tensor factorization (BLMF/BLTF) algorithms are proposed to recover corrupted synchrophasor measurements leveraging latent electrical-temporal correlations between points. To mitigate impact consecutive anomalies on recovery, adaptive...
Topology diagrams are widely seen in power system applications, but their automatic generation is often easier said than done. When facing transmission systems with strongly-meshed structures, existing approaches can hardly produce topology catering to the aesthetics of readers. This paper proposes an integrated framework for generating aesthetically-pleasing systems. Input a rough layout, first conducts visibility region analysis reduce line crossings and then solves mixed-integer linear...
The emerging Cyber-Physical Power System Co-Simulation (CPPSCS) can integrate isolated power, cyber, and control simulators to explore the interaction mechanism of energy information flows. However, one most critical challenges CPPSCS is properly settle time synchronization between continuous discrete systems. Global-event-axis-based Time Synchronization (GlobalTS) strategy requires registering all simulation events system processes into global event axis advance uniformly. This introduces a...
Hierarchical state estimation (HSE) is often deployed to evaluate the states of an interconnected power system from telemetered measurements. By HSE, each low-level control center (LCC) takes charge its internal states, whereas a trusted high-level (HCC) assumes coordination boundary states. However, HCC may not always exist in practice; cloud server can take role case no such facility available. Since it prohibited release sensitive grid data untrustworthy environments, considerations need...
As a cyber-physical attack targeting power systems, False Data Injection Attack (FDIA) has raised widespread concern in recent years. Many FDIA detection approaches the literature train learning models using historical data to distinguish attacked measurements from normal ones. These typically suffer severe generalization problems. Although they can achieve good performance when similar distribution offline training and online application phases, often perform poorly an operating condition...
Cryptographic schemes are often deployed in microgrids to protect communication security. However, most existing widely used cannot ensure forward secrecy and non-repudiation under key leakage dishonest insiders. Although some cryptographic techniques can theoretically overcome these vulnerabilities, their computational complexity may significantly extend the latency, making them less suitable for time-sensitive microgrid control scenario. In this paper, a novel scheme is proposed guarantee...
By maliciously manipulating the synchrophasors produced by phasor measurement units in power systems, cyber attackers can mislead control center into taking wrong actions. From viewpoint of machine learning, normal and malicious may exhibit different spatial distribution characteristics when mapped a latent space. Hence, synchrophasor detector be acquired training classification model with instances derived from historical operational data. However, occur infrequently practice. It is likely...
False data injection attacks (FDIA) on state estimators are a kind of imminent cyber-physical security issue. Fortunately, it has been proved that if set measurements is strategically selected and protected, no FDIA will remain undetectable. In this paper, the metric Return Investment (ROI) introduced to evaluate overall returns alternative measurement protection schemes (MPS). By setting maximum total ROI as optimization objective, previously ignored cost-benefit issue taken into account...
Abstract The development of cyber‐physical power systems raises concerns about the data quality issue phasor measurement units (PMUs). Low signal‐to‐noise ratios (SNRs) and losses caused by malicious electromagnetic interference, false injections, equipment malfunctioning may jeopardize integrity availability necessary for system monitoring, protection, control. To ensure grid resiliency, this paper proposes a robust fast PMU recovery (RFMR) algorithm based on improved singular spectrum...