Malicious data attacks on the smart grid O Kosut, L Jia, RJ Thomas, L Tong IEEE Transactions on Smart Grid 2 (4), 645-658, 2011 | 654 | 2011 |
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures O Kosut, L Jia, RJ Thomas, L Tong 2010 first IEEE international conference on smart grid communications, 220-225, 2010 | 386 | 2010 |
Limiting false data attacks on power system state estimation O Kosut, L Jia, RJ Thomas, L Tong 2010 44th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2010 | 207 | 2010 |
Vulnerability analysis and consequences of false data injection attack on power system state estimation J Liang, L Sankar, O Kosut IEEE Transactions on Power Systems 31 (5), 3864-3872, 2015 | 141 | 2015 |
On the dispersions of three network information theory problems VYF Tan, O Kosut IEEE Transactions on Information Theory 60 (2), 881-903, 2013 | 103 | 2013 |
Nonlinear network coding is necessary to combat general byzantine attacks O Kosut, L Tong, D Tse 2009 47th Annual Allerton Conference on Communication, Control, and …, 2009 | 71 | 2009 |
Cyber attacks on AC state estimation: Unobservability and physical consequences J Liang, O Kosut, L Sankar 2014 IEEE PES General Meeting| Conference & Exposition, 1-5, 2014 | 54 | 2014 |
Locating and quantifying gas emission sources using remotely obtained concentration data B Hirst, P Jonathan, FG del Cueto, D Randell, O Kosut Atmospheric environment 74, 141-158, 2013 | 50 | 2013 |
A tunable measure for information leakage J Liao, O Kosut, L Sankar, FP Calmon 2018 IEEE International Symposium on Information Theory (ISIT), 701-705, 2018 | 41* | 2018 |
Polytope codes against adversaries in networks O Kosut, L Tong, NC David IEEE transactions on information theory 60 (6), 3308-3344, 2014 | 38 | 2014 |
Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems? J Zhang, Z Chu, L Sankar, O Kosut IEEE Transactions on Power Systems 33 (5), 4775-4786, 2018 | 36 | 2018 |
Asymptotics and non-asymptotics for universal fixed-to-variable source coding O Kosut, L Sankar IEEE Transactions on Information Theory 63 (6), 3757-3772, 2017 | 27 | 2017 |
False data injection attacks on power system state estimation with limited information J Zhang, Z Chu, L Sankar, O Kosut 2016 IEEE Power and Energy Society General Meeting (PESGM), 1-5, 2016 | 25 | 2016 |
Universal fixed-to-variable source coding in the finite blocklength regime O Kosut, L Sankar 2013 IEEE International Symposium on Information Theory, 649-653, 2013 | 24 | 2013 |
Distributed source coding in the presence of Byzantine sensors O Kosut, L Tong IEEE transactions on information theory 54 (6), 2550-2565, 2008 | 24 | 2008 |
Maximum distortion attacks in electricity grids I Esnaola, SM Perlaza, HV Poor, O Kosut IEEE Transactions on Smart Grid 7 (4), 2007-2015, 2016 | 22 | 2016 |
Integrated mobile and static sensing for target tracking O Kosut, A Turovsky, J Sun, M Ezovski, L Tong, G Whipps MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 21 | 2007 |
On information-theoretic privacy with general distortion cost functions K Kalantari, L Sankar, O Kosut 2017 ieee international symposium on information theory (isit), 2865-2869, 2017 | 19 | 2017 |
Third-order coding rate for universal compression of Markov sources N Iri, O Kosut 2015 IEEE International Symposium on Information Theory (ISIT), 1996-2000, 2015 | 17 | 2015 |
New results on third-order coding rate for universal fixed-to-variable source coding O Kosut, L Sankar 2014 IEEE International Symposium on Information Theory, 2689-2693, 2014 | 17 | 2014 |