Login / Signup
False data injection attacks with local topology information against linear state estimation.
Ying Sun
Wen-Tai Li
Wentu Song
Chau Yuen
Published in:
ISGT Asia (2015)
Keyphrases
</>
end users
state estimation
injection attacks
database
computer vision
data mining techniques
high dimensional data
sensitive information
data mining
computer systems
visual tracking
original data
sensitive data