Personal information

No personal information available

Activities

Works (50 of 66)

Items per page:
Page 1 of 2

Submodularity-Based False Data Injection Attack Strategy in DC Microgrids

IEEE Transactions on Information Forensics and Security
2025 | Journal article
Contributors: Qi Liu; Chengcheng Zhao; Mengxiang Liu; Ruilong Deng; Peng Cheng
Source: check_circle
Crossref

ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation Models

2025-04-22 | Conference paper
Contributors: Linkang Du; Zheng Zhu; Min Chen; Zhou Su; Shouling Ji; Peng Cheng; Jiming Chen; Zhikun Zhang
Source: check_circle
Crossref

Unveiling Physical Semantics of PLC Variables Using Control Invariants

IEEE Transactions on Dependable and Secure Computing
2025-03 | Journal article
Contributors: Zeyu Yang; Liang He; Yucheng Ruan; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Mismatched Control and Monitoring Frequencies: Vulnerability, Attack, and Mitigation

IEEE Transactions on Dependable and Secure Computing
2025-01 | Journal article
Contributors: Zeyu Yang; Liang He; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Hengye Zhu; Mengxiang Liu; Binbin Chen; Xin Che; Peng Cheng; Ruilong Deng
Source: check_circle
Crossref

LFVeri: Network Configuration Verification for Virtual Private Cloud Networks

IEEE/ACM Transactions on Networking
2024-12 | Journal article
Contributors: Kun Wang; Chengcheng Zhao; Jinpei Chu; Yiping Shi; Jianyuan Lu; Biao Lyu; Shunmin Zhu; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Anomaly Observer-Based Cyber-Resilient Torque Control Against Hybrid Attacks in Wind Turbines

IEEE Transactions on Smart Grid
2024-11 | Journal article
Contributors: Shiyi Zhao; Jinhui Xia; Ruilong Deng; Peng Cheng; Qinmin Yang
Source: check_circle
Crossref

VeriFi: Towards Verifiable Federated Unlearning

IEEE Transactions on Dependable and Secure Computing
2024-11 | Journal article
Contributors: Xiangshan Gao; Xingjun Ma; Jingyi Wang; Youcheng Sun; Bo Li; Shouling Ji; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection

2024-10-27 | Conference paper
Contributors: Jialuo Chen; Jingyi Wang; Xiyue Zhang; Youcheng Sun; Marta Kwiatkowska; Jiming Chen; Peng Cheng
Source: check_circle
Crossref

Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey

IEEE Transactions on Smart Grid
2024-09 | Journal article
Contributors: Mengxiang Liu; Fei Teng; Zhenyong Zhang; Pudong Ge; Mingyang Sun; Ruilong Deng; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow

IEEE Transactions on Smart Grid
2024-09 | Journal article
Contributors: Ke Zuo; Mingyang Sun; Zhenyong Zhang; Peng Cheng; Goran Strbac; Chongqing Kang
Source: check_circle
Crossref

Deception-Resistant Stochastic Manufacturing for Automated Production Lines

2024-09-30 | Conference paper
Contributors: Zeyu Yang; Hongyi Pu; Liang He; Chengtao Yao; Jianying Zhou; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Isolation-Based Debugging for Neural Networks

2024-09-11 | Conference paper
Contributors: Jialuo Chen; Jingyi Wang; Youcheng Sun; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development

2024-09-11 | Conference paper
Contributors: Xiangshan Gao; Jialuo Chen; Jingyi Wang; Jie Shi; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems

2024-07 | Conference paper
Contributors: Linkang Du; Quan Yuan; Min Chen; Mingyang Sun; Peng Cheng; Jiming Chen; Zhikun Zhang
Source: check_circle
Crossref

K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language

2024-07-02 | Conference paper
Contributors: Zichen Wang; Jingyi Wang; Fu Song; Kun Wang; Hongyi Pu; Peng Cheng
Source: check_circle
Crossref

Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review

IEEE Internet of Things Journal
2024-06-01 | Journal article
Contributors: Zhenyong Zhang; Mengxiang Liu; Mingyang Sun; Ruilong Deng; Peng Cheng; Dusit Niyato; Mo-Yuen Chow; Jiming Chen
Source: check_circle
Crossref

Efficient Vertical Federated Unlearning via Fast Retraining

ACM Transactions on Internet Technology
2024-05-31 | Journal article
Contributors: Zichen Wang; Xiangshan Gao; Cong Wang; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Plug-and-Play Distributed Estimation of Driving States in an Open Vehicle Platoon

IEEE Transactions on Industrial Informatics
2024-04 | Journal article
Contributors: Shuaiting Huang; Chengcheng Zhao; Lingying Huang; Peng Cheng; Junfeng Wu; Lin Cai
Source: check_circle
Crossref

CORMAND2: A Deception Attack Against Industrial Robots

Engineering
2024-01 | Journal article
Contributors: Hongyi Pu; Liang He; Peng Cheng; Jiming Chen; Youxian Sun
Source: check_circle
Crossref

Detection-Performance Tradeoff for Watermarking in Industrial Control Systems

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Hengye Zhu; Mengxiang Liu; Chongrong Fang; Ruilong Deng; Peng Cheng
Source: check_circle
Crossref

SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Zhenyong Zhang; Ruilong Deng; Youliang Tian; Peng Cheng; Jianfeng Ma
Source: check_circle
Crossref

Periodic Event-Triggered MPC for Continuous-Time Nonlinear Systems With Bounded Disturbances

IEEE Transactions on Automatic Control
2023-12 | Journal article
Contributors: Mengzhi Wang; Peng Cheng; Zhenyong Zhang; Mufeng Wang; Jiming Chen
Source: check_circle
Crossref

SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic

2023-12-04 | Conference paper
Contributors: Jie Meng; Zeyu Yang; Zhenyong Zhang; Yangyang Geng; Ruilong Deng; Peng Cheng; Jiming Chen; Jianying Zhou
Source: check_circle
Crossref

Localizing False Data Injection Attacks in Smart Grid: A Spectrum-Based Neural Network Approach

IEEE Transactions on Smart Grid
2023-11 | Journal article
Contributors: Sha Peng; Zhenyong Zhang; Ruilong Deng; Peng Cheng
Source: check_circle
Crossref

QuoTe : Quality-oriented Testing for Deep Learning Systems

ACM Transactions on Software Engineering and Methodology
2023-09-30 | Journal article
Contributors: Jialuo Chen; Jingyi Wang; Xingjun Ma; Youcheng Sun; Jun Sun; Peixin Zhang; Peng Cheng
Source: check_circle
Crossref

Adaptive Observer-Based Resilient Control Strategy for Wind Turbines Against Time-Delay Attacks on Rotor Speed Sensor Measurement

IEEE Transactions on Sustainable Energy
2023-07 | Journal article
Contributors: Shiyi Zhao; Jinhui Xia; Ruilong Deng; Peng Cheng; Qinmin Yang
Source: check_circle
Crossref

Dual-Triggered Adaptive Torque Control Strategy for Variable-Speed Wind Turbine Against Denial-of-Service Attacks

IEEE Transactions on Smart Grid
2023-07 | Journal article
Contributors: Shiyi Zhao; Jinhui Xia; Ruilong Deng; Peng Cheng; Qinmin Yang; Xuguo Jiao
Source: check_circle
Crossref

FlowPinpoint: Localizing Anomalies in Cloud-Client Services for Cloud Providers

IEEE Transactions on Cloud Computing
2023-07-01 | Journal article
Contributors: Ruopeng Geng; Chongrong Fang; Shiyang Guo; Daxiang Kang; Biao Lyu; Shunmin Zhu; Peng Cheng
Source: check_circle
Crossref

SmartDS: Middle-Tier-centric SmartNIC Enabling Application-aware Message Split for Disaggregated Block Storage

2023-06-17 | Conference paper
Contributors: Jie Zhang; Hongjing Huang; Lingjun Zhu; Shu Ma; Dazhong Rong; Yijun Hou; Mo Sun; Chaojie Gu; Peng Cheng; Chao Shi et al.
Source: check_circle
Crossref

PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids

IEEE Transactions on Smart Grid
2023-01 | Journal article
Contributors: Mengxiang Liu; Chengcheng Zhao; Jinhui Xia; Ruilong Deng; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

False Data Injection Attacks and the Distributed Countermeasure in DC Microgrids

IEEE Transactions on Control of Network Systems
2022-12 | Journal article
Contributors: Mengxiang Liu; Chengcheng Zhao; Ruilong Deng; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Fingerprinting Movements of Industrial Robots for Replay Attack Detection

IEEE Transactions on Mobile Computing
2022-10-01 | Journal article
Contributors: Hongyi Pu; Liang He; Chengcheng Zhao; David K. Y. Yau; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids

IEEE Transactions on Smart Grid
2022-09 | Journal article
Contributors: Mengxiang Liu; Chengcheng Zhao; Zhenyong Zhang; Ruilong Deng; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network

IEEE/ACM Transactions on Networking
2022-06 | Journal article
Contributors: Chongrong Fang; Haoyu Liu; Mao Miao; Jie Ye; Lei Wang; Wansheng Zhang; Daxiang Kang; Biao Lyu; Shunmin Zhu; Peng Cheng et al.
Source: check_circle
Crossref

Detecting PLC Intrusions Using Control Invariants

IEEE Internet of Things Journal
2022-06-15 | Journal article
Contributors: Zeyu Yang; Liang He; Hua Yu; Chengcheng Zhao; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber–Physical Systems

IEEE Internet of Things Journal
2022-06-01 | Journal article
Contributors: Zhenyong Zhang; Ruilong Deng; Peng Cheng; Qiang Wei
Source: check_circle
Crossref

Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems

IEEE Transactions on Dependable and Secure Computing
2022-05-01 | Journal article
Contributors: Jiming Chen; Xiangshan Gao; Ruilong Deng; Yang He; Chongrong Fang; Peng Cheng
Source: check_circle
Crossref

Adaptive Resilient Control for Variable-Speed Wind Turbines Against False Data Injection Attacks

IEEE Transactions on Sustainable Energy
2022-04 | Journal article
Contributors: Shiyi Zhao; Qinmin Yang; Peng Cheng; Ruilong Deng; Jinhui Xia
Source: check_circle
Crossref

Strategic Protection Against FDI Attacks With Moving Target Defense in Power Grids

IEEE Transactions on Control of Network Systems
2022-03 | Journal article
Contributors: Zhenyong Zhang; Ruilong Deng; Peng Cheng; Mo-Yuen Chow
Source: check_circle
Crossref

Dynamic Privacy-Aware Collaborative Schemes for Average Computation: A Multi-Time Reporting Case

IEEE Transactions on Information Forensics and Security
2021 | Journal article
Contributors: Xin Wang; Hideaki Ishii; Jianping He; Peng Cheng
Source: check_circle
Crossref

A survey of cloud network fault diagnostic systems and tools

Frontiers of Information Technology & Electronic Engineering
2021-08 | Journal article
Contributors: Yining Qi; Chongrong Fang; Haoyu Liu; Daxiang Kang; Biao Lyu; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Secure State Estimation Using Hybrid Homomorphic Encryption Scheme

IEEE Transactions on Control Systems Technology
2021-07 | Journal article
Contributors: Zhenyong Zhang; Peng Cheng; Junfeng Wu; Jiming Chen
Source: check_circle
Crossref

Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design

IEEE Transactions on Network Science and Engineering
2021-07-01 | Journal article
Contributors: Mingjing Sun; Chengcheng Zhao; Jianping He; Peng Cheng; Daniel E. Quevedo
Source: check_circle
Crossref

Vehicle Platooning With Non-Ideal Communication Networks

IEEE Transactions on Vehicular Technology
2021-01 | Journal article
Contributors: Chengcheng Zhao; Xiaoming Duan; Lin Cai; Peng Cheng
Source: check_circle
Crossref

Stability Analysis of Vehicle Platooning With Limited Communication Range and Random Packet Losses

IEEE Internet of Things Journal
2021-01-01 | Journal article
Contributors: Chengcheng Zhao; Lin Cai; Peng Cheng
Source: check_circle
Crossref

Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

IEEE Transactions on Information Forensics and Security
2020 | Journal article
Contributors: Zhenyong Zhang; Ruilong Deng; David K. Y. Yau; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

Privacy-Preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation

IEEE Transactions on Signal Processing
2020 | Journal article
Contributors: Xin Wang; Hideaki Ishii; Linkang Du; Peng Cheng; Jiming Chen
Source: check_circle
Crossref

An Event-Based Stealthy Attack on Remote State Estimation

IEEE Transactions on Automatic Control
2020-10 | Journal article
Contributors: Peng Cheng; Zeyu Yang; Jiming Chen; Yifei Qi; Ling Shi
Source: check_circle
Crossref

Lightweight and Unobtrusive Data Obfuscation at IoT Edge for Remote Inference

IEEE Internet of Things Journal
2020-10 | Journal article
Contributors: Dixing Xu; Mengyao Zheng; Linshan Jiang; Chaojie Gu; Rui Tan; Peng Cheng
Source: check_circle
Crossref
Items per page:
Page 1 of 2