default search action
Zhenyong Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Zhenyong Zhang, Bingdong Wang, Mengxiang Liu, Yan Qin, Jingpei Wang, Youliang Tian, Jianfeng Ma:
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid. IEEE Internet Things J. 11(7): 11619-11631 (2024) - [j34]Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen:
Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review. IEEE Internet Things J. 11(11): 18951-18975 (2024) - [j33]Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - [j32]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse. IEEE Trans. Inf. Forensics Secur. 19: 6393-6408 (2024) - [j31]Mengxiang Liu, Xin Zhang, Hengye Zhu, Zhenyong Zhang, Ruilong Deng:
Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack Detection in Cyber-Physical Microgrids. IEEE Trans. Inf. Forensics Secur. 19: 7824-7840 (2024) - [j30]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau:
Vulnerability of the Load Frequency Control Against the Network Parameter Attack. IEEE Trans. Smart Grid 15(1): 921-933 (2024) - [j29]Mengxiang Liu, Fei Teng, Zhenyong Zhang, Pudong Ge, Mingyang Sun, Ruilong Deng, Peng Cheng, Jiming Chen:
Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey. IEEE Trans. Smart Grid 15(5): 4998-5030 (2024) - [j28]Ke Zuo, Mingyang Sun, Zhenyong Zhang, Peng Cheng, Goran Strbac, Chongqing Kang:
Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow. IEEE Trans. Smart Grid 15(5): 5169-5181 (2024) - [c13]Chao Ren, Minrui Xu, Han Yu, Zehui Xiong, Zhenyong Zhang, Dusit Niyato:
Variational Quantum Circuit and Quantum Key Distribution-Based Quantum Federated Learning: A Case of Smart Grid Dynamic Security Assessment. ICC 2024: 1115-1120 - [i8]Mengxiang Liu, Xin Zhang, Rui Zhang, Zhuoran Zhou, Zhenyong Zhang, Ruilong Deng:
Detection-Triggered Recursive Impact Mitigation against Secondary False Data Injection Attacks in Microgrids. CoRR abs/2407.06948 (2024) - [i7]Kedi Yang, Zhenyong Zhang, Youliang Tian:
Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse. CoRR abs/2408.17121 (2024) - [i6]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma:
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse. CoRR abs/2409.10850 (2024) - 2023
- [j27]Zhenyong Zhang, Ruilong Deng:
Impact Analysis of MTD on the Frequency Stability in Smart Grid. IEEE CAA J. Autom. Sinica 10(1): 275-277 (2023) - [j26]Zhenyong Zhang, Yan Qin, Jingpei Wang, Hui Li, Ruilong Deng:
Letter Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised Data-Driven Approach. IEEE CAA J. Autom. Sinica 10(2): 550-553 (2023) - [j25]Zhenyong Zhang, David K. Y. Yau:
CoRE: Constrained Robustness Evaluation of Machine Learning-Based Stability Assessment for Power Systems. IEEE CAA J. Autom. Sinica 10(2): 557-559 (2023) - [j24]Zhenyong Zhang, Ke Zuo, Ruilong Deng, Fei Teng, Mingyang Sun:
Cybersecurity Analysis of Data-Driven Power System Stability Assessment. IEEE Internet Things J. 10(17): 15723-15735 (2023) - [j23]Ying Zhang, Shiyu Rong, Elizabeth Dunlop, Rong Jiang, Zhenyong Zhang, Jun Qing Tang:
Modeling the influence of individual differences on knowledge hiding. J. Knowl. Manag. 27(6): 1637-1659 (2023) - [j22]Mengzhi Wang, Peng Cheng, Zhenyong Zhang, Mufeng Wang, Jiming Chen:
Periodic Event-Triggered MPC for Continuous-Time Nonlinear Systems With Bounded Disturbances. IEEE Trans. Autom. Control. 68(12): 8036-8043 (2023) - [j21]Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. IEEE Trans. Inf. Forensics Secur. 18: 581-596 (2023) - [j20]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. IEEE Trans. Inf. Forensics Secur. 18: 3817-3832 (2023) - [j19]Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. IEEE/ACM Trans. Netw. 31(6): 2793-2808 (2023) - [j18]Sha Peng, Zhenyong Zhang, Ruilong Deng, Peng Cheng:
Localizing False Data Injection Attacks in Smart Grid: A Spectrum-Based Neural Network Approach. IEEE Trans. Smart Grid 14(6): 4827-4838 (2023) - [j17]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Mo-Yuen Chow:
Security Enhancement of Power System State Estimation With an Effective and Low-Cost Moving Target Defense. IEEE Trans. Syst. Man Cybern. Syst. 53(5): 3066-3081 (2023) - [c12]Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou:
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. ACSAC 2023: 310-323 - [c11]Bingdong Wang, Junjie Song, Liang Wan, Youliang Tian, Xin Wang, Zhenyong Zhang:
Impact Analysis of Moving Target Defense on the Small-Signal Stability in Power Systems. ICPS 2023: 1-6 - [i5]Mengxiang Liu, Zhenyong Zhang, Pudong Ge, Ruilong Deng, Mingyang Sun, Jiming Chen, Fei Teng:
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey. CoRR abs/2305.05338 (2023) - [i4]Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen:
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review. CoRR abs/2308.15736 (2023) - 2022
- [j16]Zhenyong Zhang, Ruilong Deng, Peng Cheng, Qiang Wei:
On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems. IEEE Internet Things J. 9(11): 8720-8736 (2022) - [j15]Zhenyong Zhang, Youliang Tian, Ruilong Deng, Jianfeng Ma:
A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid. IEEE Internet Things J. 9(18): 17912-17925 (2022) - [j14]Jingpei Wang, Mufeng Wang, Zhenyong Zhang, Hengye Zhu:
Toward a Trust Evaluation Framework Against Malicious Behaviors of Industrial IoT. IEEE Internet Things J. 9(21): 21260-21277 (2022) - [j13]Ke Liu, Mufeng Wang, Rongkuan Ma, Zhenyong Zhang, Qiang Wei:
Detection and localization of cyber attacks on water treatment systems: an entropy-based approach. Frontiers Inf. Technol. Electron. Eng. 23(4): 587-603 (2022) - [j12]Zhenyong Zhang, Ruilong Deng, Peng Cheng, Mo-Yuen Chow:
Strategic Protection Against FDI Attacks With Moving Target Defense in Power Grids. IEEE Trans. Control. Netw. Syst. 9(1): 245-256 (2022) - [j11]Jingpei Wang, Zhenyong Zhang, Mufeng Wang:
A Trust Management Method Against Abnormal Behavior of Industrial Control Networks Under Active Defense Architecture. IEEE Trans. Netw. Serv. Manag. 19(3): 2549-2572 (2022) - [j10]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng, Jiming Chen:
Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids. IEEE Trans. Smart Grid 13(5): 3984-3996 (2022) - [c10]Zhenyong Zhang, Xin Che, Xuguo Jiao, Wanke Yu, Liang Wan:
Quadratic Optimization Using Additive Homomorphic Encryption in CPS. ASCC 2022: 1995-2000 - [c9]Ze Yang, Zhenyong Zhang, Youliang Tian:
Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi. ASCC 2022: 2018-2023 - [c8]Xuguo Jiao, Xiaowen Zhou, Qinmin Yang, Zhenyong Zhang, Wenfeng Liu, Jingbo Zhao:
An Improved Optimal Torque Control Based on Estimated Wind Speed for Wind Turbines*. ASCC 2022: 2024-2029 - [i3]Kedi Yang, Zhenyong Zhang, Youliang Tian, Jianfeng Ma:
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. CoRR abs/2209.08893 (2022) - [i2]Ming Yang, Yanhan Wang, Xin Wang, Zhenyong Zhang, Xiaoming Wu, Peng Cheng:
FedSiam-DA: Dual-aggregated Federated Learning via Siamese Network under Non-IID Data. CoRR abs/2211.09421 (2022) - 2021
- [j9]Shisheng Fu, Zhenyong Zhang, Yang Jiang, Jing Chen, Xiaoxiao Peng, Weiguo Zhao:
An Automatic RF-EMF Radiated Immunity Test System for Electricity Meters in Power Monitoring Sensor Networks. Ad Hoc Sens. Wirel. Networks 50(1-4): 173-192 (2021) - [j8]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng:
Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid. IEEE Internet Things J. 8(8): 6608-6623 (2021) - [j7]Ke Liu, Jing-Yi Wang, Qiang Wei, Zhenyong Zhang, Jun Sun, Rongkuan Ma, Ruilong Deng:
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller. J. Comput. Sci. Technol. 36(6): 1307-1324 (2021) - [j6]Zhenyong Zhang, Peng Cheng, Junfeng Wu, Jiming Chen:
Secure State Estimation Using Hybrid Homomorphic Encryption Scheme. IEEE Trans. Control. Syst. Technol. 29(4): 1704-1720 (2021) - [c7]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng:
Analysis of Moving Target Defense in Unbalanced and Multiphase Distribution Systems Considering Voltage Stability. SmartGridComm 2021: 207-213 - 2020
- [j5]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid. ACM Trans. Cyber Phys. Syst. 4(3): 25:1-25:29 (2020) - [j4]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. IEEE Trans. Inf. Forensics Secur. 15: 2320-2335 (2020) - [j3]Zhenyong Zhang, Shibo He, Yuanchao Shu, Zhiguo Shi:
A Self-Evolving WiFi-based Indoor Navigation System Using Smartphones. IEEE Trans. Mob. Comput. 19(8): 1760-1774 (2020) - [c6]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Zero-Parameter-Information FDI Attacks Against Power System State Estimation. ACC 2020: 2987-2992
2010 – 2019
- 2019
- [j2]Rongkuan Ma, Peng Cheng, Zhenyong Zhang, Wenwen Liu, Qingxian Wang, Qiang Wei:
Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System. IEEE Internet Things J. 6(6): 9783-9793 (2019) - [c5]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
On Effectiveness of Detecting FDI Attacks on Power Grid using Moving Target Defense. ISGT 2019: 1-5 - [i1]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. CoRR abs/1912.11372 (2019) - 2018
- [c4]Zhenyong Zhang, Junfeng Wu, David K. Y. Yau, Peng Cheng, Jiming Chen:
Secure kalman filter state estimation by partially homomorphic encryption. ICCPS 2018: 345-346 - 2017
- [c3]Zhuoying Shi, Zhenyong Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Indoor Navigation Leveraging Gradient WiFi Signals. SenSys 2017: 48:1-48:2
2000 – 2009
- 2009
- [j1]Jian-Yi Wu, Zhenyong Zhang, Raj Subramoniam, Franco Maloberti:
A 107.4 dB SNR Multi-Bit Sigma Delta ADC With 1-PPM THD at -0.12 dB From Full Scale Input. IEEE J. Solid State Circuits 44(11): 3060-3066 (2009) - 2007
- [c2]Jian-Yi Wu, Raj Subramoniam, Zhenyong Zhang, Ali Djabbari, Peter Holloway, Franco Maloberti, Masood Yousefi, Mehmat Aslan, Hua Hong, Ahmad Bahai:
Multi-Bit Sigma Delta ADC with Reduced Feedback Levels, Extended Dynamic Range and Increased Tolerance for Analog Imperfections. CICC 2007: 77-80 - [c1]Zhenyong Zhang, Gabor C. Temes:
A Segmented Data-Weighted-Averaging Technique. ISCAS 2007: 481-484
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint