​
Login / Signup
Jiwei Tian
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 33
Top Topics
Power System
Secure Communication
Air Traffic
Injection Attacks
Top Venues
Comput. Secur.
IEEE Internet Things J.
CoRR
IEEE Trans. Veh. Technol.
</>
Publications
</>
Peng Luo
,
Buhong Wang
,
Jiwei Tian
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data.
Comput. Secur.
141 (2024)
Peng Luo
,
Buhong Wang
,
Jiwei Tian
,
Chao Liu
,
Yong Yang
Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.
Sensors
24 (11) (2024)
Jiwei Tian
,
Chao Shen
,
Buhong Wang
,
Xiaofang Xia
,
Meng Zhang
,
Chenhao Lin
,
Qian Li
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
CoRR
(2024)
Peican Zhu
,
Zechen Pan
,
Yang Liu
,
Jiwei Tian
,
Keke Tang
,
Zhen Wang
A General Black-box Adversarial Attack on Graph-based Fake News Detectors.
CoRR
(2024)
Runze Dong
,
Buhong Wang
,
Kunrui Cao
,
Jiwei Tian
,
Tianhao Cheng
Secure Transmission Design of RIS Enabled UAV Communication Networks Exploiting Deep Reinforcement Learning.
IEEE Trans. Veh. Technol.
73 (6) (2024)
Runze Dong
,
Buhong Wang
,
Kunrui Cao
,
Jiwei Tian
,
Tianhao Cheng
Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers.
CyberC
(2023)
Runze Dong
,
Buhong Wang
,
Kunrui Cao
,
Jiwei Tian
Hybrid Beamforming for Secure Transmission of Massive MIMO UAV Communication Networks.
IEEE Syst. J.
17 (3) (2023)
Yihan Zhang
,
Yuhao Liu
,
Shoude Guan
,
Qian Wang
,
Wei Zhao
,
Jiwei Tian
Sudden Track Turning of Typhoon Prapiroon (2012) Enhanced the Upper Ocean Response.
Remote. Sens.
15 (2) (2023)
Runze Dong
,
Buhong Wang
,
Jiwei Tian
,
Tianhao Cheng
,
Danyu Diao
Deep Reinforcement Learning Based UAV for Securing mmWave Communications.
IEEE Trans. Veh. Technol.
72 (4) (2023)
Kunrui Cao
,
Haiyang Ding
,
Buhong Wang
,
Lu Lv
,
Jiwei Tian
,
Qingmei Wei
,
Fengkui Gong
Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission.
IEEE Internet Things J.
9 (24) (2022)
Jiwei Tian
,
Buhong Wang
,
Jing Li
,
Zhen Wang
Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid.
IEEE Trans. Netw. Sci. Eng.
9 (2) (2022)
Jiwei Tian
,
Buhong Wang
,
Jing Li
,
Zhen Wang
,
Mete Ozay
Adversarial Attacks and Defense Methods for Power Quality Recognition.
CoRR
(2022)
Jiwei Tian
,
Buhong Wang
,
Jing Li
,
Zhen Wang
,
Bowen Ma
,
Mete Ozay
Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning.
IEEE Internet Things J.
9 (15) (2022)
Jiwei Tian
,
Buhong Wang
,
Jing Li
,
Charalambos Konstantinou
Datadriven false data injection attacks against cyber-physical power systems.
Comput. Secur.
121 (2022)
Jiwei Tian
,
Buhong Wang
,
Rongxiao Guo
,
Zhen Wang
,
Kunrui Cao
,
Xiaodong Wang
Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles.
IEEE Internet Things J.
9 (22) (2022)
Jiwei Tian
,
Buhong Wang
,
Zhen Wang
,
Kunrui Cao
,
Jing Li
,
Mete Ozay
Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
IEEE Trans. Cybern.
52 (12) (2022)
Jiwei Tian
,
Buhong Wang
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Rongxiao Guo
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems.
IEEE Internet Things J.
8 (2) (2021)
Peng Luo
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
ADS-B anomaly data detection model based on VAE-SVDD.
Comput. Secur.
104 (2021)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Lu Lv
,
Jiwei Tian
,
Hang Hu
,
Fengkui Gong
Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems.
IEEE Trans. Veh. Technol.
70 (2) (2021)
Leya Zeng
,
Buhong Wang
,
Jiwei Tian
,
Zhen Wang
Threat impact analysis to air traffic control systems through flight delay modeling.
Comput. Ind. Eng.
162 (2021)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Fengkui Gong
,
Hang Hu
,
Jiwei Tian
,
Tianhao Cheng
Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems.
WCSP
(2020)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Tengyao Li
,
Jiwei Tian
,
Fengkui Gong
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping.
IEEE Trans. Inf. Forensics Secur.
15 (2020)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Lu Lv
,
Jiwei Tian
,
Fengkui Gong
On the Security Enhancement of Uplink NOMA Systems With Jammer Selection.
IEEE Trans. Commun.
68 (9) (2020)
Fute Shang
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
,
Kunrui Cao
CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems.
IEEE Access
8 (2020)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Dynamic temporal ADS-B data attack detection based on sHDP-HMM.
Comput. Secur.
93 (2020)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Threat model and construction strategy on ADS-B attack data.
IET Inf. Secur.
14 (5) (2020)
Fute Shang
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
,
Kunrui Cao
,
Rongxiao Guo
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection.
IEEE Wirel. Commun. Lett.
9 (10) (2020)
Jiwei Tian
,
Buhong Wang
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Jing Li
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
CSS (1)
(2019)
Jiwei Tian
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Jing Li
,
Mete Ozay
Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems.
SmartGridComm
(2019)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
ADS-B Data Attack Detection Based on Generative Adversarial Networks.
CSS (1)
(2019)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Online sequential attack detection for ADS-B data based on hierarchical temporal memory.
Comput. Secur.
87 (2019)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Jiwei Tian
Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks.
IEEE Wirel. Commun. Lett.
8 (5) (2019)
Jiwei Tian
,
Buhong Wang
,
Xia Li
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid.
Secur. Commun. Networks
2018 (2018)