Distributed quickest detection of cyber-attacks in smart grid

MN Kurt, Y Yılmaz, X Wang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
In this paper, online detection of false data injection attacks and denial of service attacks in
the smart grid is studied. The system is modeled as a discrete-time linear dynamic system …

Real-time detection of hybrid and stealthy cyber-attacks in smart grid

MN Kurt, Y Yılmaz, X Wang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
For a safe and reliable operation of the smart grid, timely detection of cyber-attacks is of
critical importance. Moreover, considering smarter and more capable attackers, robust …

Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems

KD Lu, ZG Wu - IEEE Transactions on Instrumentation and …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the common malicious attacks in cyber-physical power systems
(CPPSs) to intervene measurements and systems. Timely detection of jamming attacks is …

Jamming-resistant receivers for the massive MIMO uplink

TT Do, E Björnson, EG Larsson… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We design a jamming-resistant receiver scheme to enhance the robustness of a massive
MIMO uplink system against jamming. We assume that a jammer attacks the system both in …

Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer

J Moon, H Lee, C Song, I Lee - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a wireless powered communication network with an energy
harvesting (EH) jammer where eavesdroppers try to wiretap the communication between …

Denial-of-service attacks on communication systems: Detectability and jammer knowledge

H Boche, RF Schaefer, HV Poor - IEEE Transactions on Signal …, 2020 - ieeexplore.ieee.org
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …

Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer

TG Nguyen, C So-In, DB Ha - IEEE Access, 2017 - ieeexplore.ieee.org
The broadcast nature of energy harvesting wireless sensor networks (EH-WSNs) allows
sensor nodes (SNs) within the coverage range of a transmitter to capture its signals …

Smart jamming using reconfigurable intelligent surface: Asymptotic analysis and optimization

KW Huang, HM Wang, L Yang - IEEE Transactions on Wireless …, 2023 - ieeexplore.ieee.org
We take the viewpoint of wireless attackers, and investigate the use of the reconfigurable
intelligent surface (RIS) in degrading the communications performance of a time-division …

R-SFLLM: Jamming Resilient Framework for Split Federated Learning with Large Language Models

A Djuhera, VC Andrei, X Li, UJ Mönich, H Boche… - arXiv preprint arXiv …, 2024 - arxiv.org
Split federated learning (SFL) is a compute-efficient paradigm in distributed machine
learning (ML), where components of large ML models are outsourced to remote servers. A …

Suppression of multiple spatially correlated jammers

LM Hoang, JA Zhang, DN Nguyen… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Effective suppression of inadvertent or deliberate jamming signals is crucial to ensure
reliable wireless communication. However, as demonstrated in this paper, when the …