- document
-
Shi, S. (author), Cheng, Xiaodong (author), Van den Hof, Paul M.J. (author)Identifiability of a single module in a network of transfer functions is determined by whether a particular transfer function in the network can be uniquely distinguished within a network model set, on the basis of data. Whereas previous research has focused on the situations that all network signals are either excited or measured, we develop...journal article 2023
- document
-
Wei, Xiaoguang (author), Liu, Y. (author), Shi, Jian (author), Gao, Shibin (author), Li, Xingpeng (author), Han, Zhu (author)This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of...journal article 2023
- document
-
Pan, K. (author), Palensky, P. (author), Mohajerin Esfahani, P. (author)The main objective of this article is to develop scalable dynamic anomaly detectors with high-fidelity simulators of power systems. On the one hand, models in high-fidelity simulators are typically 'intractable' if one opts to describe them in a mathematical formulation in order to apply existing model-based approaches from the anomaly...journal article 2022