Cyber security in the smart grid: Survey and challenges W Wang, Z Lu Computer networks 57 (5), 1344-1371, 2013 | 951 | 2013 |
Review and evaluation of security threats on the communication networks in the smart grid Z Lu, X Lu, W Wang, C Wang 2010-Milcom 2010 Military Communications Conference, 1830-1835, 2010 | 209 | 2010 |
Modeling, evaluation and detection of jamming attacks in time-critical wireless applications Z Lu, W Wang, C Wang IEEE Transactions on Mobile Computing 13 (8), 1746-1759, 2013 | 84 | 2013 |
On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP X Lu, Z Lu, W Wang, J Ma 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011 | 63 | 2011 |
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic Z Lu, W Wang, C Wang 2011 Proceedings IEEE INFOCOM, 1871-1879, 2011 | 62 | 2011 |
Adversarial deep learning for cognitive radio security: Jamming attack and defense strategies Y Shi, YE Sagduyu, T Erpek, K Davaslioglu, Z Lu, JH Li 2018 IEEE international conference on communications workshops (ICC …, 2018 | 42 | 2018 |
Secure edge computing in iot systems: Review and case studies M Alrowaily, Z Lu 2018 IEEE/ACM Symposium on Edge Computing (SEC), 440-444, 2018 | 34 | 2018 |
Camouflage traffic: Minimizing message delay for smart grid applications under jamming Z Lu, W Wang, C Wang IEEE Transactions on Dependable and Secure Computing 12 (1), 31-44, 2014 | 33 | 2014 |
Cyber deception: Overview and the road ahead C Wang, Z Lu IEEE Security & Privacy 16 (2), 80-85, 2018 | 32 | 2018 |
Deep learning-aided cyber-attack detection in power transmission systems D Wilson, Y Tang, J Yan, Z Lu 2018 IEEE Power & Energy Society General Meeting (PESGM), 1-5, 2018 | 26 | 2018 |
Optimal training sequences for MIMO channel estimation with spatial correlation J Pang, J Li, L Zhao, Z Lu 2007 IEEE 66th Vehicular Technology Conference, 651-655, 2007 | 24 | 2007 |
On the evolution and impact of mobile botnets in wireless networks Z Lu, W Wang, C Wang IEEE Transactions on Mobile Computing 15 (9), 2304-2316, 2015 | 22 | 2015 |
How can botnets cause storms? understanding the evolution and impact of mobile botnets Z Lu, W Wang, C Wang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1501-1509, 2014 | 22 | 2014 |
Defending active learning against adversarial inputs in automated document classification L Pi, Z Lu, Y Sagduyu, S Chen 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2016 | 15 | 2016 |
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming Z Lu, W Wang, C Wang 2012 Proceedings IEEE INFOCOM, 3066-3070, 2012 | 14 | 2012 |
On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks Z Lu, W Wang, C Wang 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 14 | 2010 |
From security to vulnerability: Data authentication undermines message delivery in smart grid X Lu, W Wang, Z Lu, J Ma 2011-MILCOM 2011 Military Communications Conference, 1183-1188, 2011 | 13 | 2011 |
Iterative parameter estimation in MIMO flat-fading channels with frequency offsets Z Lu, J Li, L Zhao, J Pang 20th International Conference on Advanced Information Networking and …, 2006 | 13 | 2006 |
When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing Z Luo, S Zhao, Z Lu, J Xu, Y Sagduyu IEEE Transactions on Mobile Computing, 2020 | 12 | 2020 |
Contextual combinatorial multi-armed bandits with volatile arms and submodular reward L Chen, J Xu, Z Lu Proceedings of the 32nd International Conference on Neural Information …, 2018 | 12 | 2018 |