supported by the National Natural Science Foundation of China(Grant Nos.62173251,62203113)。
Advanced persistent threat(APT)is a powerful attack pattern in which attackers lurk in the system,waiting for opportune moments and launching attacks.Remote state estimation(RSE)is an essential scenario in the cyber-p...
supported by the Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.,China (J2022160,Research on Key Technologies of Distributed Power Dispatching Control for Resilience Improvement of Distribution Networks).
To improve the resilience of a distribution system against extreme weather,a fuel-based distributed generator(DG)allocation model is proposed in this study.In this model,the DGs are placed at the planning stage.When a...
This paper proposes a co-optimal strategy using line hardening,mobile devices(mobile ice-melting device,mobile emergency generator,mobile energy storage system),and repair crew dispatching to improve distribution syst...
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the...
supported by National Natural Science Foundation of China(Grant Nos.6207-1234,61771244,61901121)。
Dear editor,Directional modulation(DM),as an advanced physical-layer security(PLS)transmission technique,is suitable for the line-of-sight(LoS)propagation channel.In[1],the authors presented a DM technique that uses t...
The paper is supported by theNationalNatural Science Foundation of China[grant nos 61572095,61877007].
This paper investigates infinite horizon repeated security games with one defender and multiple attacker types.The incomplete information brings uncertainty of attackers’behaviour for the defender.Under the uncertain...
supported by National Natural Science Foundation of China(Grant Nos.61603210,61673240)。
Dear editor,The defending guidance problem for the target-attackerdefender(TAD)scenario is a challenge.The attacker(A)refers to the attacking missile,whose objective is to intercept the target aircraft(T),while the ta...
supported by the National Natural Science Foundation of China under Grant Nos.71871217 and 71371185;the Natural Science Foundation of Hunan Province under Grant No.2019JJ20019
To investigate the attack and defense strategies in complex net works,the authors propose a two-player zero-sum static game model with complete information which considers attack and defense strategies simultaneously....
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu...
The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and ho...