Login / Signup

False data injection attacks with local topology information against linear state estimation.

Ying SunWen-Tai LiWentu SongChau Yuen
Published in: ISGT Asia (2015)
Keyphrases
  • end users
  • state estimation
  • injection attacks
  • database
  • computer vision
  • data mining techniques
  • high dimensional data
  • sensitive information
  • data mining
  • computer systems
  • visual tracking
  • original data
  • sensitive data