-
1
Partial grid false data injection attacks against state estimation
Published 2019“…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …”
Get full text
Get full text
Get full text
Get full text
article -
2
Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems
Published 2022“…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …”
-
3
Preprocessing Techniques for End-To-End Trainable RNN-Based Conversational System
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
-
5
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
Published 2020“…This conclusion was achieved after preprocessing a number of data values from these data sets.…”
-
6
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
Published 2023“…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …”
-
7
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
-
8
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
-
9
A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets
Published 2025“…A novel data augmentation technique further enriched the quality and diversity of these datasets. …”
-
10
Site-Adaptation of Modeled Solar Radiation Data: The SiteAdapt Procedure
Published 2020“…This work presents a procedure for improving the accuracy of modeled solar irradiance series through site-adaptation with coincident ground-based measurements relying on the use of a regression preprocessing followed by an empirical quantile mapping (eQM) correction. …”
-
11
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
12
Developing Privacy Frameworks for Motion Sensor Data in Next-Generation Wearable Devices
Published 2025Get full text
doctoralThesis -
13
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…</p><h3>Methods</h3><p dir="ltr">Using historical data (2008-2020), an accurate prediction model using machine learning methods was developed and incorporated into a mobile app. …”
-
14
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
Published 2021“…Extensive experiments with standard data sets and real-time streaming IoT traffic give encouraging results.…”
-
15
Deep learning-based marine big data fusion for ocean environment monitoring: Towards shape optimization and salient objects detection
Published 2023“…Moreover, we used preprocessing techniques before the classification task for underwater image enhancement, segmentation, noise and fog removal, restoration, and color constancy.…”
-
16
Non-Linear Profile Monitoring Using Artificial Neural Network Fault Detection
Published 2018Get full text
doctoralThesis -
17
Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning
Published 2023“…After that, we introduce three novel attacks, namely Distillation, No-Adversarial-Sample-Training, and False-Labeling, which can be launched during the AT process to make the global model susceptible to evasion at inference time. …”
-
18
-
19
Sensor-based Continuous Arabic Sign Language Recognition
Published 2014Get full text
doctoralThesis -
20
Driver stress level detection using HRV analysis
Published 2017“…In our study, the ECG signal of the driver is extracted and preprocessed in order to perform the HRV analysis. This analysis is accomplished using one of the domain analysis approach such as time, frequency, time-frequency or non-linear methods including Wavelet and STFT. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject