no code implementations • 17 Feb 2021 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
False data injection attacks (FDIAs) pose a significant security threat to power system state estimation.
no code implementations • 16 Oct 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
In this work, we study the vulnerabilities of DL-based energy theft detection through adversarial attacks, including single-step attacks and iterative attacks.
1 code implementation • 2 Jun 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
Energy theft causes large economic losses to utility companies around the world.
no code implementations • 12 Mar 2020 • Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
We study the potential vulnerabilities of ML applied in CPSs by proposing Constrained Adversarial Machine Learning (ConAML), which generates adversarial examples that satisfy the intrinsic constraints of the physical systems.