关注
Xingsi Zhong 钟行思
Xingsi Zhong 钟行思
Ph.D. student at Electrical Computer Engineering, Clemson University
在 g.clemson.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Asynchronous signal passing for tile self-assembly: Fuel efficient computation and efficient assembly of shapes
JE Padilla, MJ Patitz, RT Schweller, NC Seeman, SM Summers, X Zhong
International Journal of Foundations of Computer Science 25 (04), 459-488, 2014
862014
A survey of electric power synchrophasor network cyber security
C Beasley, X Zhong, J Deng, R Brooks, GK Venayagamoorthy
IEEE PES Innovative Smart Grid Technologies, Europe, 1-5, 2014
682014
Denial of service attack on tie-line bias control in a power system with pv plant
X Zhong, I Jayawardene, GK Venayagamoorthy, R Brooks
IEEE Transactions on Emerging Topics in Computational Intelligence 1 (5 …, 2017
642017
Cyber security in smart DC microgrid operations
X Zhong, L Yu, R Brooks, GK Venayagamoorthy
2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015
482015
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software …, 2015
272015
Exponential replication of patterns in the signal tile assembly model
A Keenan, R Schweller, X Zhong
DNA Computing and Molecular Programming: 19th International Conference, DNA …, 2013
232013
Side channel analysis of multiple pmu data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
212015
Side-channels in electric power synchrophasor network data traffic
X Zhong, P Arunagirinathan, A Ahmadi, R Brooks, GK Venayagamoorthy
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
202015
Fast arithmetic in algorithmic self-assembly
A Keenan, R Schweller, M Sherman, X Zhong
Natural Computing 15, 115-128, 2016
172016
Exponential replication of patterns in the signal tile assembly model
A Keenan, R Schweller, X Zhong
Natural Computing 14 (2), 265-278, 2015
122015
Protocol proxy: An fte-based covert channel
J Oakley, L Yu, X Zhong, GK Venayagamoorthy, R Brooks
Computers & Security 92, 101777, 2020
102020
Resilient and sustainable tie-line bias control for a power system in uncertain environments
I Jayawardene, GK Venayagamoorthy, X Zhong
IEEE Transactions on Emerging Topics in Computational Intelligence 6 (1 …, 2020
72020
A covert data transport protocol
Y Fu, Z Jia, L Yu, X Zhong, R Brooks
2016 11th International Conference on Malicious and Unwanted Software …, 2016
72016
Asynchronous signal passing for tile self-assembly: fuel efficient computation and efficient assembly of shapes
SM Summers, X Zhong
Proceedings of the 2013 international conference on unconventional …, 2013
72013
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
Proceedings of International Symposium on Sensor Networks, Systems and …, 2017
42017
Phasortoolbox–a python package for synchrophasor application prototyping
X Zhong, P Arunagirinathan, I Jayawardene, GK Venayagamoorthy, ...
2018 Clemson University Power Systems Conference (PSC), 1-8, 2018
32018
A virtual synchrophasor network for power system resiliency under concurrent dos attacks
X Zhong, GK Venayagamoorthy, R Brooks
2022 IEEE Symposium Series on Computational Intelligence (SSCI), 1342-1349, 2022
12022
Denial of Service Attack on Phasor Measurement unit 1
P Arunagirinathan, RR Brooks, I Jayawardene, DT Madurasinghe, ...
Distributed Denial of Service Attacks, 261-277, 2020
2020
Cyber Physical System Security—DoS Attacks on Synchrophasor Networks in the Smart Grid
X Zhong
Clemson University, 2018
2018
Life and Death Decisions by Cyber-Physical Systems
RR Brooks, X Zhong, G Cordone, GK Venayagamoorthy, C Wu
Signal Processing, Sensor/Information Fusion, and Target Recognition XXV …, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20