Malicious data attacks on the smart grid O Kosut, L Jia, RJ Thomas, L Tong IEEE Transactions on Smart Grid 2 (4), 645-658, 2011 | 918 | 2011 |
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures O Kosut, L Jia, RJ Thomas, L Tong 2010 first IEEE international conference on smart grid communications, 220-225, 2010 | 467 | 2010 |
Vulnerability analysis and consequences of false data injection attack on power system state estimation J Liang, L Sankar, O Kosut IEEE Transactions on Power Systems 31 (5), 3864-3872, 2015 | 287 | 2015 |
Limiting false data attacks on power system state estimation O Kosut, L Jia, RJ Thomas, L Tong 2010 44th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2010 | 249 | 2010 |
On the dispersions of three network information theory problems VYF Tan, O Kosut IEEE Transactions on Information Theory 60 (2), 881-903, 2013 | 154 | 2013 |
Tunable measures for information leakage and applications to privacy-utility tradeoffs J Liao, O Kosut, L Sankar, F du Pin Calmon IEEE Transactions on Information Theory 65 (12), 8043-8066, 2019 | 149* | 2019 |
Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems? J Zhang, Z Chu, L Sankar, O Kosut IEEE Transactions on Power Systems 33 (5), 4775-4786, 2018 | 83 | 2018 |
Cyber attacks on AC state estimation: Unobservability and physical consequences J Liang, O Kosut, L Sankar 2014 IEEE PES General Meeting| Conference & Exposition, 1-5, 2014 | 75 | 2014 |
Nonlinear network coding is necessary to combat general byzantine attacks O Kosut, L Tong, D Tse 2009 47th Annual Allerton Conference on Communication, Control, and …, 2009 | 75 | 2009 |
Locating and quantifying gas emission sources using remotely obtained concentration data B Hirst, P Jonathan, FG del Cueto, D Randell, O Kosut Atmospheric environment 74, 141-158, 2013 | 73 | 2013 |
Polytope codes against adversaries in networks O Kosut, L Tong, NC David IEEE transactions on information theory 60 (6), 3308-3344, 2014 | 49 | 2014 |
Asymptotics and non-asymptotics for universal fixed-to-variable source coding O Kosut, L Sankar IEEE Transactions on Information Theory 63 (6), 3757-3772, 2017 | 43 | 2017 |
A better bound gives a hundred rounds: Enhanced privacy guarantees via f-divergences S Asoodeh, J Liao, FP Calmon, O Kosut, L Sankar 2020 IEEE International Symposium on Information Theory (ISIT), 920-925, 2020 | 41 | 2020 |
On information-theoretic privacy with general distortion cost functions K Kalantari, L Sankar, O Kosut 2017 IEEE International Symposium on Information Theory (ISIT), 2865-2869, 2017 | 40 | 2017 |
Three variants of differential privacy: Lossless conversion and applications S Asoodeh, J Liao, FP Calmon, O Kosut, L Sankar IEEE Journal on Selected Areas in Information Theory 2 (1), 208-222, 2021 | 38 | 2021 |
Maximum distortion attacks in electricity grids I Esnaola, SM Perlaza, HV Poor, O Kosut IEEE Transactions on Smart Grid 7 (4), 2007-2015, 2016 | 36 | 2016 |
False data injection attacks on phasor measurements that bypass low-rank decomposition J Zhang, Z Chu, L Sankar, O Kosut 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 31 | 2017 |
False data injection attacks on power system state estimation with limited information J Zhang, Z Chu, L Sankar, O Kosut 2016 IEEE Power and Energy Society General Meeting (PESGM), 1-5, 2016 | 31 | 2016 |
Load redistribution attack detection using machine learning: A data-driven approach A Pinceti, L Sankar, O Kosut 2018 IEEE Power & Energy Society General Meeting (PESGM), 1-5, 2018 | 30 | 2018 |
Authentication capacity of adversarial channels O Kosut, J Kliewer 2018 IEEE Information Theory Workshop (ITW), 1-5, 2018 | 28 | 2018 |