An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05 Energy ManagementCybersecurityOperational Scenario 2021.10.05 2025.05.28 Literature Database
A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26 AlgorithmEnergy ManagementPerformance Evaluation 2021.09.23 2025.05.28 Literature Database
Sponge Examples: Energy-Latency Attacks on Neural Networks Authors: Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson | Published: 2020-06-05 | Updated: 2021-05-12 Energy ManagementPoisoningMembership Inference 2020.06.05 2025.05.28 Literature Database
SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun | Published: 2020-06-02 | Updated: 2020-08-30 AlgorithmEnergy ManagementAdversarial Attack Detection 2020.06.02 2025.05.28 Literature Database
Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles Authors: Pengyue Wang, Yan Li, Shashi Shekhar, William F. Northrop | Published: 2020-06-01 Energy ManagementAdversarial Attack DetectionDeep Reinforcement Learning 2020.06.01 2025.05.28 Literature Database
Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami | Published: 2020-05-28 Energy ManagementPrivacy AssessmentDynamic Pricing 2020.05.28 2025.05.28 Literature Database
Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06 Energy ManagementRobustness Improvement MethodAttack Detection 2020.04.29 2025.05.28 Literature Database