Showing 1 - 20 results of 70 for search '(( false data processing ) OR ( use data preprocessing ))', query time: 0.10s Refine Results
  1. 1

    Partial grid false data injection attacks against state estimation by Margossian, Harag

    Published 2019
    “…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 2

    Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2022
    “…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …”
  3. 3
  4. 4
  5. 5

    Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques by Abdul Karim (417009)

    Published 2020
    “…This conclusion was achieved after preprocessing a number of data values from these data sets.…”
  6. 6

    A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems by Mariam Elnour (14147790)

    Published 2023
    “…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …”
  7. 7

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
  8. 8

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
  9. 9

    A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets by Insaf Kraidia (19198012)

    Published 2025
    “…A novel data augmentation technique further enriched the quality and diversity of these datasets. …”
  10. 10

    Site-Adaptation of Modeled Solar Radiation Data: The SiteAdapt Procedure by Carlos M. Fernández-Peruchena (18558904)

    Published 2020
    “…This work presents a procedure for improving the accuracy of modeled solar irradiance series through site-adaptation with coincident ground-based measurements relying on the use of a regression preprocessing followed by an empirical quantile mapping (eQM) correction. …”
  11. 11

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
  12. 12
  13. 13

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study by Ayman Hassan (14426412)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">Using historical data (2008-2020), an accurate prediction model using machine learning methods was developed and incorporated into a mobile app. …”
  14. 14

    Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems by Aliya Tabassum (16896486)

    Published 2021
    “…Extensive experiments with standard data sets and real-time streaming IoT traffic give encouraging results.…”
  15. 15

    Deep learning-based marine big data fusion for ocean environment monitoring: Towards shape optimization and salient objects detection by Sulaiman Khan (12585349)

    Published 2023
    “…Moreover, we used preprocessing techniques before the classification task for underwater image enhancement, segmentation, noise and fog removal, restoration, and color constancy.…”
  16. 16
  17. 17

    Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning by Atef H. Bondok (19482352)

    Published 2023
    “…After that, we introduce three novel attacks, namely Distillation, No-Adversarial-Sample-Training, and False-Labeling, which can be launched during the AT process to make the global model susceptible to evasion at inference time. …”
  18. 18
  19. 19
  20. 20

    Driver stress level detection using HRV analysis by Munla, Nermine

    Published 2017
    “…In our study, the ECG signal of the driver is extracted and preprocessed in order to perform the HRV analysis. This analysis is accomplished using one of the domain analysis approach such as time, frequency, time-frequency or non-linear methods including Wavelet and STFT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject