default search action
Deepa Kundur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j80]Mohsen Khalaf, Abdelrahman Ayad, Mosaddek Hossain Kamal Tushar, Marthe Kassouf, Deepa Kundur:
A Survey on Cyber-Physical Security of Active Distribution Networks in Smart Grids. IEEE Access 12: 29414-29444 (2024) - [j79]Kuei-Fang Hsueh, Ayleen Farnood, Isam Al-Darabsah, Mohammad Al Saaideh, Mohammad Al Janaideh, Deepa Kundur:
A Deep Time Delay Filter for Cooperative Adaptive Cruise Control. ACM Trans. Cyber Phys. Syst. 8(2): 17 (2024) - [j78]Amit Kumar Singh, Deepa Kundur, Mauro Conti:
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 151:1-151:4 (2024) - [j77]Amr S. Mohamed, Deepa Kundur:
On the Use of Reinforcement Learning for Attacking and Defending Load Frequency Control. IEEE Trans. Smart Grid 15(3): 3262-3277 (2024) - 2023
- [j76]Khaled F. Aljanaideh, Mohammad Al Janaideh, Micky Rakotondrabe, Mohammad Al Saaideh, Abdallah M. Almomani, Muath A. Bani-Hani, Deepa Kundur:
Identification of a class of precision motion systems with uncertain hysteretic nonlinearities. Int. J. Control 96(8): 1971-1988 (2023) - [j75]Mohammad Ali Alomrani, Mosaddek Hossain Kamal Tushar, Deepa Kundur:
Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 24(10): 10467-10476 (2023) - [j74]Mohsen Khalaf, Abdelrahman Ayad, Magdy M. A. Salama, Deepa Kundur, Ehab F. El-Saadany:
Mitigation of Cyber-Attacks on Wide-Area Under-Frequency Load-Shedding Schemes. IEEE Trans. Smart Grid 14(3): 2377-2389 (2023) - 2022
- [j73]Amit Kumar Singh, Deepa Kundur, Min Wu, Mauro Barni:
Integrity of Multimedia and Multimodal Data: From Capture to Use. IEEE Multim. 29(2): 8-10 (2022) - [j72]Min Zhou, Jing Wu, Chengnian Long, Chensheng Liu, Deepa Kundur:
Dynamic-Line-Rating-Based Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objectives. IEEE Internet Things J. 9(18): 17756-17766 (2022) - [j71]Abdelrahman Khalil, Mohammad Al Janaideh, Khaled F. Aljanaideh, Deepa Kundur:
Transmissibility-Based Health Monitoring of the Future Connected Autonomous Vehicles Networks. IEEE Trans. Veh. Technol. 71(4): 3633-3647 (2022) - 2021
- [j70]Yew Meng Khaw, Amir Abiri Jahromi, Mohammadreza Fakhari Moghaddam Arani, Scott Sanner, Deepa Kundur, Marthe Kassouf:
A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays. IEEE Trans. Smart Grid 12(3): 2554-2565 (2021) - [j69]Amr S. Mohamed, Mohammadreza Fakhari Moghaddam Arani, Amir Abiri Jahromi, Deepa Kundur:
False Data Injection Attacks Against Synchronization Systems in Microgrids. IEEE Trans. Smart Grid 12(5): 4471-4483 (2021) - 2020
- [j68]Mohammadreza Fakhari Moghaddam Arani, Deepa Kundur:
A User-centric Approach toward Resilient Frequency-regulating Wind Generators. ACM Trans. Cyber Phys. Syst. 4(3): 36:1-36:23 (2020) - 2019
- [j67]Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti:
Identification of Android malware using refined system calls. Concurr. Comput. Pract. Exp. 31(20) (2019) - [j66]Moein Sabounchi, Jin Wei, Dongchan Lee, Deepa Kundur:
Flocking-based adaptive granular control strategy for autonomous microgrids in emergency situations. IET Cyper-Phys. Syst.: Theory & Appl. 4(2): 108-119 (2019) - [j65]Pirathayini Srikantha, Deepa Kundur:
Intelligent Signal Processing and Coordination for the Adaptive Smart Grid: An Overview of Data-Driven Grid Management. IEEE Signal Process. Mag. 36(3): 82-102 (2019) - [j64]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
On Cyber-Physical Coupling and Distributed Control in Smart Grids. IEEE Trans. Ind. Informatics 15(8): 4418-4429 (2019) - [j63]Mohammad Al Janaideh, Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems. IEEE Trans. Ind. Informatics 15(9): 4845-4856 (2019) - [j62]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
On Effective Virtual Inertia of Storage-Based Distributed Control for Transient Stability. IEEE Trans. Smart Grid 10(1): 327-336 (2019) - [j61]Chensheng Liu, Min Zhou, Jing Wu, Chengnian Long, Deepa Kundur:
Financially Motivated FDI on SCED in Real-Time Electricity Markets: Attacks and Mitigation. IEEE Trans. Smart Grid 10(2): 1949-1959 (2019) - [j60]Pirathayini Srikantha, Deepa Kundur:
Hierarchical Signal Processing for Tractable Power Flow Management in Electric Grid Networks. IEEE Trans. Signal Inf. Process. over Networks 5(1): 86-99 (2019) - 2018
- [j59]Deepa Kundur, Javier Contreras, Dipti Srinivasan, Nikolaos Gatsis, Meng Wang, Srinivas Peeta:
Introduction to the Issue on Signal and Information Processing for Critical Infrastructures. IEEE J. Sel. Top. Signal Process. 12(4): 575-577 (2018) - [j58]Chensheng Liu, Jing Wu, Chengnian Long, Deepa Kundur:
Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation. IEEE J. Sel. Top. Signal Process. 12(4): 763-776 (2018) - [j57]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A Storage-Based Multiagent Regulation Framework for Smart Grid Resilience. IEEE Trans. Ind. Informatics 14(9): 3859-3869 (2018) - [j56]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A Cyber-Physical Control Framework for Transient Stability in Smart Grids. IEEE Trans. Smart Grid 9(2): 1205-1215 (2018) - [j55]Eman M. Hammad, Ahmed Mostafa Khalil, Abdallah K. Farraj, Deepa Kundur, Reza Iravani:
A Class of Switching Exploits Based on Inter-Area Oscillations. IEEE Trans. Smart Grid 9(5): 4659-4668 (2018) - [j54]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability. IEEE Trans. Signal Inf. Process. over Networks 4(1): 70-81 (2018) - 2017
- [j53]Pirathayini Srikantha, Deepa Kundur:
A Game Theoretic Approach to Real-Time Robust Distributed Generation Dispatch. IEEE Trans. Ind. Informatics 13(3): 1006-1016 (2017) - [j52]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
On the Use of Energy Storage Systems and Linear Feedback Optimal Control for Transient Stability. IEEE Trans. Ind. Informatics 13(4): 1575-1585 (2017) - [j51]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control. IEEE Trans. Ind. Informatics 13(6): 3322-3333 (2017) - [j50]Pirathayini Srikantha, Deepa Kundur:
Resilient Distributed Real-Time Demand Response via Population Games. IEEE Trans. Smart Grid 8(6): 2532-2543 (2017) - 2016
- [j49]Qiusheng Wang, Deepa Kundur, Haiwen Yuan, Yuanqing Liu, Jiayu Lu, Zhao Ma:
Noise Suppression of Corona Current Measurement From HVdc Transmission Lines. IEEE Trans. Instrum. Meas. 65(2): 264-275 (2016) - [j48]Jin Wei, Deepa Kundur:
GOAliE: Goal-Seeking Obstacle and Collision Evasion for Resilient Multicast Routing in Smart Grid. IEEE Trans. Smart Grid 7(2): 567-579 (2016) - [j47]Pirathayini Srikantha, Deepa Kundur:
A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis. IEEE Trans. Smart Grid 7(3): 1476-1485 (2016) - [j46]Abdallah K. Farraj, Eman M. Hammad, Ashraf Al Daoud, Deepa Kundur:
A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems. IEEE Trans. Smart Grid 7(4): 1846-1855 (2016) - [j45]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A Cyber-Enabled Stabilizing Control Scheme for Resilient Smart Grid Systems. IEEE Trans. Smart Grid 7(4): 1856-1865 (2016) - 2015
- [j44]Qiusheng Wang, Deepa Kundur:
A generalized design framework for IIR digital multiple notch filters. EURASIP J. Adv. Signal Process. 2015: 26 (2015) - [j43]Zakia Asad, Mohammad Asad Rehman Chaudhry, Deepa Kundur:
On the Use of Matroid Theory for Distributed Cyber-Physical-Constrained Generator Scheduling in Smart Grid. IEEE Trans. Ind. Electron. 62(1): 299-309 (2015) - [j42]Jin Wei, Deepa Kundur, Karen L. Butler-Purry:
A Novel Bio-Inspired Technique for Rapid Real-Time Generator Coherency Identification. IEEE Trans. Smart Grid 6(1): 178-188 (2015) - [j41]Pirathayini Srikantha, Deepa Kundur:
Distributed Optimization of Dispatch in Sustainable Generation Systems via Dual Decomposition. IEEE Trans. Smart Grid 6(5): 2501-2509 (2015) - 2014
- [j40]Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, Karen L. Butler-Purry:
A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid. IEEE Trans. Smart Grid 5(3): 1183-1195 (2014) - [j39]Jin Wei, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A Flocking-Based Paradigm for Hierarchical Cyber-Physical Smart Grid Modeling and Control. IEEE Trans. Smart Grid 5(6): 2687-2700 (2014) - 2013
- [j38]Shan Liu, Salman Mashayekh, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid. IEEE Trans. Emerg. Top. Comput. 1(2): 273-285 (2013) - 2011
- [j37]Deepa Kundur, Xianyong Feng, Salman Mashayekh, Shan Liu, Takis Zourntos, Karen L. Butler-Purry:
Towards modelling the impact of cyber attacks on a smart grid. Int. J. Secur. Networks 6(1): 2-13 (2011) - 2010
- [j36]Unoma Ndili Okorafor, Deepa Kundur:
Security-aware routing and localization for a directional mission critical network. IEEE J. Sel. Areas Commun. 28(5): 664-676 (2010) - [j35]Madjid Merabti, Zhu Liu, Heather Yu, Deepa Kundur:
Advances In Peer-To-Peer Content Search. J. Signal Process. Syst. 59(3): 309-318 (2010) - 2009
- [j34]Nebu John Mathai, Takis Zourntos, Deepa Kundur:
Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation. EURASIP J. Adv. Signal Process. 2009 (2009) - [j33]Sen-ching Samson Cheung, Deepa Kundur, Andrew W. Senior:
Enhancing Privacy Protection in Multimedia Systems. EURASIP J. Inf. Secur. 2009 (2009) - [j32]Alexandra Czarlinska, Deepa Kundur:
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments. Multidimens. Syst. Signal Process. 20(2): 135-164 (2009) - [j31]Chuhong Fei, Raymond H. Kwong, Deepa Kundur:
A hypothesis testing approach to semifragile watermark-based authentication. IEEE Trans. Inf. Forensics Secur. 4(2): 179-192 (2009) - [j30]Unoma Ndili Okorafor, Deepa Kundur:
On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks. IEEE Trans. Mob. Comput. 8(10): 1427-1440 (2009) - 2008
- [j29]William Luh, Deepa Kundur:
Secure distributed source coding with side-information. IEEE Commun. Lett. 12(4): 310-312 (2008) - [j28]Deepa Kundur, William Luh, Unoma Ndili Okorafor, Takis Zourntos:
Security and Privacy for Distributed Multimedia Sensor Networks. Proc. IEEE 96(1): 112-130 (2008) - [j27]William Luh, Deepa Kundur:
Distributed Secret Sharing for Discrete Memoryless Networks. IEEE Trans. Inf. Forensics Secur. 3(3): 1-7 (2008) - [j26]Alexandra Czarlinska, Deepa Kundur:
Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration. IEEE Trans. Multim. 10(5): 675-690 (2008) - 2007
- [j25]Alexandra Czarlinska, Deepa Kundur:
Towards characterizing the effectiveness of random mobility against actuation attacks. Comput. Commun. 30(13): 2546-2559 (2007) - [j24]Deepa Kundur, Ching-Yung Lin, Chun-Shien Lu:
Visual Sensor Networks. EURASIP J. Adv. Signal Process. 2007 (2007) - [j23]William Luh, Deepa Kundur, Takis Zourntos:
A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems. EURASIP J. Adv. Signal Process. 2007 (2007) - 2006
- [j22]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Secur. 1(1): 43-55 (2006) - [j21]Udit Budhia, Deepa Kundur, Takis Zourntos:
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Trans. Inf. Forensics Secur. 1(4): 502-516 (2006) - 2005
- [j20]William Luh, Deepa Kundur:
New paradigms for effective multicasting and fingerprinting of entertainment media. IEEE Commun. Mag. 43(6): 77-84 (2005) - [j19]Karen Su, Deepa Kundur, Dimitrios Hatzinakos:
Statistical invisibility for collusion-resistant digital video watermarking. IEEE Trans. Multim. 7(1): 43-51 (2005) - [j18]Karen Su, Deepa Kundur, Dimitrios Hatzinakos:
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Trans. Multim. 7(1): 52-66 (2005) - 2004
- [j17]Deepa Kundur, Ching-Yung Lin, Benoît Macq, Hong Heather Yu:
Special Issue on Enabling Security Technologies for Digital Rights Management. Proc. IEEE 92(6): 879-882 (2004) - [j16]Deepa Kundur, Kannan Karthik:
Video Fingerprinting and Encryption Principles for Digital Rights Management. Proc. IEEE 92(6): 918-932 (2004) - [j15]Patrizio Campisi, Deepa Kundur, Alessandro Neri:
Robust digital watermarking in the ridgelet domain. IEEE Signal Process. Lett. 11(10): 826-830 (2004) - [j14]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Analysis and design of watermarking algorithms for improved resistance to compression. IEEE Trans. Image Process. 13(2): 126-144 (2004) - [j13]Yang Zhao, Patrizio Campisi, Deepa Kundur:
Dual domain watermarking for authentication and compression of cultural heritage image. IEEE Trans. Image Process. 13(3): 430-448 (2004) - [j12]Deepa Kundur, Dimitrios Hatzinakos:
Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans. Multim. 6(1): 185-198 (2004) - 2003
- [j11]Nebu John Mathai, Deepa Kundur, Ali Sheikholeslami:
Hardware implementation perspectives of digital video watermarking algorithms. IEEE Trans. Signal Process. 51(4): 925-938 (2003) - 2002
- [j10]Patrizio Campisi, Deepa Kundur, Dimitrios Hatzinakos, Alessandro Neri:
Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding. EURASIP J. Adv. Signal Process. 2002(2): 152-163 (2002) - 2001
- [j9]Hong Heather Yu, Deepa Kundur, Ching-Yung Lin:
Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era. IEEE Multim. 8(3): 8-12 (2001) - [j8]Deepa Kundur:
Watermarking with Diversity: Insights and Implications. IEEE Multim. 8(4): 46-52 (2001) - [j7]Deepa Kundur, Dimitrios Hatzinakos:
Diversity and attack characterization for improved robust watermarking. IEEE Trans. Signal Process. 49(10): 2383-2396 (2001) - 2000
- [j6]Deepa Kundur, Dimitrios Hatzinakos, Henry Leung:
Robust classification of blurred imagery. IEEE Trans. Image Process. 9(2): 243-255 (2000) - 1999
- [j5]Deepa Kundur, Dimitrios Hatzinakos:
Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7): 1167-1180 (1999) - 1998
- [j4]Deepa Kundur, Dimitrios Hatzinakos:
A novel blind deconvolution scheme for image restoration using recursive filtering. IEEE Trans. Signal Process. 46(2): 375-390 (1998) - [j3]Deepa Kundur, Dimitrios Hatzinakos:
On the use of Lyapunov criteria to analyze the convergence of blind deconvolution algorithms. IEEE Trans. Signal Process. 46(11): 2918-2925 (1998) - 1996
- [j2]Deepa Kundur, Dimitrios Hatzinakos:
Blind image deconvolution. IEEE Signal Process. Mag. 13(3): 43-64 (1996) - [j1]Deepa Kundur, Dimitrios Hatzinakos:
Blind image deconvolution revisited. IEEE Signal Process. Mag. 13(6): 61-63 (1996)
Conference and Workshop Papers
- 2024
- [c100]Christopher Lucasius, Mai Ali, Deepa Kundur, Marco Battaglia, Peter Szatmari, John Strauss:
Prediction of Relapse in Adolescent Depression using Fusion of Video and Speech Data (short paper). ML4CMH@AAAI 2024: 112-117 - [c99]Jeffrey Qiu, Mohammad Al Janaideh, Deepa Kundur:
Analysis of Data-Driven Detection and Localization of Cyberattacks on Faulty Electric Vehicle Platoons. SM 2024: 33-39 - 2023
- [c98]Mohsen Khalaf, Abdelrahman Ayad, Deepa Kundur:
Protection of Power System State Estimation against False Data Injection Attacks. CCECE 2023: 387-392 - [c97]Anthony Kemmeugne, Mohsen Khalaf, Minh Au, Deepa Kundur:
Mitigation of Denial of Service and Time Delay Attacks on the Automatic Generation Control of Power Systems. CCECE 2023: 410-415 - [c96]Amr S. Mohamed, Sumin Lee, Deepa Kundur:
Reinforcement Learning for Supply Chain Attacks Against Frequency and Voltage Control. ICMLA 2023: 369-375 - [c95]Theodore Wu, Satvick Acharya, Abdelrahman Khalil, Khaled F. Aljanaideh, Mohammad Al Janaideh, Deepa Kundur:
Multi-Head Attention Machine Learning for Fault Classification in Mixed Autonomous and Human-Driven Vehicle Platoons. ICRA 2023: 10040-10046 - 2022
- [c94]Kuei-Fang Hsueh, Ayleen Farnood, Mohammad Al Janaideh, Deepa Kundur:
Hybrid Approach for Stabilizing Large Time Delays in Cooperative Adaptive Cruise Control with Reduced Performance Penalties. IROS 2022: 9310-9317 - 2021
- [c93]Abdelrahman Khalil, Mohammad Al Janaideh, Khaled F. Aljanaideh, Deepa Kundur:
Health Monitoring of Mixed Autonomous and Human-driven Vehicle Platoon using Transmissibility Identification. ACC 2021: 3302-3307 - [c92]Anthony Kemmeugne, Amir Abiri Jahromi, Deepa Kundur, Marthe Kassouf:
Towards cyber-resilient telecontrol commands using software-defined networking. MSCPES@CPSIoTWeek 2021: 7:1-7:6 - [c91]Isam Al-Darabsah, Kuei-Fang Hsueh, Mohammad Al Janaideh, Sue Ann Campbell, Deepa Kundur:
Vulnerability of Connected Autonomous Vehicles Networks to Periodic Time-Varying Communication Delays of Certain Frequency. IROS 2021: 3452-3457 - 2020
- [c90]Abdelrahman Khalil, Mohammad Al Janaideh, Khaled F. Aljanaideh, Deepa Kundur:
Fault Detection, Localization, and Mitigation of a Network of Connected Autonomous Vehicles Using Transmissibility Identification. ACC 2020: 386-391 - [c89]Abdelrahman Khalil, Mohammad Al Janaideh, Khaled F. Aljanaideh, Deepa Kundur:
Output-Only Fault Detection and Mitigation of Networks of Autonomous Vehicles. IROS 2020: 2257-2264 - 2019
- [c88]Khaled F. Aljanaideh, Mohammad Al Janaideh, Micky Rakotondrabe, Deepa Kundur:
Identification of Hammerstein Systems with Rate-Dependent Hysteresis Nonlinearities in a Class of Smart Material-Based Actuators. ACC 2019: 2495-2500 - [c87]Mohammadreza Fakhari Moghaddam Arani, Amir Abiri Jahromi, Deepa Kundur, Marthe Kassouf:
Modeling and Simulation of the Aurora Attack on Microgrid Point of Common Coupling. MSCPES@CPSIoTWeek 2019: 1-6 - [c86]Yew Meng Khaw, Amir Abiri Jahromi, Mohammadreza Fakhari Moghaddam Arani, Deepa Kundur, Scott Sanner, Marthe Kassouf:
Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach. SmartGridComm 2019: 1-6 - [c85]R. James Ranjith Kumar, Deepa Kundur, Biplab Sikdar:
Transient Model-Based Detection Scheme for False Data Injection Attacks in Microgrids. SmartGridComm 2019: 1-6 - 2018
- [c84]Khaled F. Aljanaideh, Micky Rakotondrabe, Mohammad Al Janaideh, Deepa Kundur:
Identification of Precision Motion Systems with Prandtl-Ishlinskii Hysteresis Nonlinearities. ACC 2018: 5225-5230 - [c83]Dauren Zhumazhanov, Deepa Kundur:
Delay in Chaum's Anonymizing Mix Networks. CCECE 2018: 1-5 - [c82]Khaled F. Aljanaideh, Mohammad Al Janaideh, Micky Rakotondrabe, Deepa Kundur:
Identification of Piezomicropositioning Hammerstein Systems with Generalized Prandtl-Ishlinskii Hysteresis Nonlinearities. CDC 2018: 6585-6590 - [c81]Dongchan Lee, Pirathayini Srikantha, Deepa Kundur:
Online Power Quality Disturbance Classification with Recurrent Neural Network. SmartGridComm 2018: 1-6 - 2017
- [c80]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
Performance Metrics for Storage-Based Transient Stability Control. SPSR-SG@CPSWeek 2017: 9-14 - [c79]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
Impact of Cyber Attacks on Data Integrity in Transient Stability Control. SPSR-SG@CPSWeek 2017: 29-34 - [c78]Chensheng Liu, Min Zhou, Jing Wu, Chengnian Long, Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
Reactance perturbation for enhancing detection of FDI attacks in power system state estimation. GlobalSIP 2017: 523-527 - [c77]Omar Hegazi, Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
IEC-61850 GOOSE traffic modeling and generation. GlobalSIP 2017: 1100-1104 - [c76]Pranav Pattabi, Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Simplified implementation and control of a flywheel energy system for microgrid applications. GlobalSIP 2017: 1105-1109 - [c75]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A transient stability control adaptive to measurements uncertainties. ICC 2017: 1-6 - [c74]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Fundamental limits on communication latency for distributed control via electromechanical waves. ICC 2017: 1-6 - 2016
- [c73]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Communication Links Vulnerability Model for Cyber Security Mitigation. ADHOCNETS 2016: 285-296 - [c72]Mellitus Ezeme, Eman M. Hammad, Deepa Kundur:
Control verification via off-line co-simulation. CCECE 2016: 1-4 - [c71]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
Enhancing the performance of controlled distributed energy resources in noisy communication environments. CCECE 2016: 1-4 - [c70]Eman M. Hammad, Mellitus Ezeme, Deepa Kundur:
Implementation of an Offline Co-Simulation Test-Bed for Cyber Security and Control Verification. GLOBECOM Workshops 2016: 1-6 - [c69]Eman M. Hammad, Jinjing Zhao, Abdallah K. Farraj, Deepa Kundur:
Mitigating link insecurities in smart grids via QoS multi-constraint routing. ICC Workshops 2016: 380-386 - 2015
- [c68]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Cooperative microgrid networks for remote and rural areas. CCECE 2015: 1572-1477 - [c67]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
On using distributed control schemes to mitigate switching attacks in smart grids. CCECE 2015: 1578-1582 - [c66]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A cyber-enabled stabilizing controller for resilient smart grid systems. ISGT 2015: 1-5 - [c65]Abdallah K. Farraj, Deepa Kundur:
On using energy storage systems in switching attacks that destabilize smart grid systems. ISGT 2015: 1-5 - [c64]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances. ISGT 2015: 1-5 - [c63]Eman M. Hammad, Abdallah K. Farraj, Deepa Kundur:
Grid-independent cooperative microgrid networks with high renewable penetration. ISGT 2015: 1-5 - [c62]Pirathayini Srikantha, Deepa Kundur:
Distributed sustainable generation dispatch via evolutionary games. ISGT 2015: 1-5 - [c61]Pirathayini Srikantha, Deepa Kundur:
Denial of service attacks and mitigation for stability in cyber-enabled power grid. ISGT 2015: 1-5 - [c60]Dongchan Lee, Pirathayini Srikantha, Deepa Kundur:
Secure operating region simplification in dynamic security assessment. SmartGridComm 2015: 79-84 - [c59]Pirathayini Srikantha, Deepa Kundur:
Distributed demand curtailment via water-filling. SmartGridComm 2015: 350-355 - [c58]Eman M. Hammad, Ahmed Mostafa Khalil, Abdallah K. Farraj, Deepa Kundur, Reza Iravani:
Tuning out of phase: Resonance attacks. SmartGridComm 2015: 491-496 - [c57]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
On using distributed energy resources to reshape the dynamics of power systems during transients. SmartGridComm 2015: 756-761 - [c56]Abdallah K. Farraj, Eman M. Hammad, Deepa Kundur:
A systematic approach to delay-adaptive control design for smart grids. SmartGridComm 2015: 768-773 - 2014
- [c55]Dongchan Lee, Deepa Kundur:
Cyber attack detection in PMU measurements via the expectation-maximization algorithm. GlobalSIP 2014: 223-227 - [c54]Pirathayini Srikantha, Deepa Kundur:
Distributed power dispatch via bifurcation control. GlobalSIP 2014: 228-232 - [c53]Abdallah K. Farraj, Eman M. Hammad, Jin Wei, Deepa Kundur, Karen L. Butler-Purry:
Performance of flocking-based control schemes in smart grid applications. GlobalSIP 2014: 233-237 - [c52]Abdallah K. Farraj, Eman M. Hammad, Ashraf Al Daoud, Deepa Kundur:
A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems. SmartGridComm 2014: 958-963 - [c51]Abdallah K. Farraj, Eman M. Hammad, Jin Wei, Deepa Kundur, Karen L. Butler-Purry:
Performance evaluation of flocking-based distributed cyber-physical control for Smart Grid. SmartGridComm 2014: 964-969 - 2013
- [c50]Zakia Asad, Mohammad Asad Rehman Chaudhry, Deepa Kundur:
Partition based cascaded generator scheduling with constraints for large power networks. GlobalSIP 2013: 539-542 - 2012
- [c49]Mustafa El-Halabi, Abdallah K. Farraj, Hung D. Ly, Deepa Kundur:
A distortion-theoretic perspective for redundant metering security in a smart grid. CCECE 2012: 1-5 - [c48]Saranya Parthasarathy, Deepa Kundur:
Bloom filter based intrusion detection for smart grid SCADA. CCECE 2012: 1-6 - [c47]Jin Wei, Deepa Kundur, Takis Zourntos:
On the use of cyber-physical hierarchy for smart grid security and efficient control. CCECE 2012: 1-6 - [c46]Jin Wei, Deepa Kundur:
A flocking-based model for DoS-resilient communication routing in smart grid. GLOBECOM 2012: 3519-3524 - [c45]Shan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Coordinated variable structure switching in smart power systems: attacks and mitigation. HiCoNS 2012: 21-30 - [c44]Shan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Coordinated variable structure switching attack in the presence of model error and state estimation. SmartGridComm 2012: 318-323 - [c43]Jin Wei, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems. SmartGridComm 2012: 372-377 - 2011
- [c42]Shan Liu, Xianyong Feng, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A class of cyber-physical switching attacks for power system disruption. CSIIRW 2011: 16 - [c41]Gabriel Domínguez-Conde, Deepa Kundur:
Improving the visual performance of S/DISCUS. ICME 2011: 1-6 - [c40]Julien S. Jainsky, Deepa Kundur:
Preventative steganalysis in wireless visual sensor networks: Challenges and solutions. ICME 2011: 1-6 - 2009
- [c39]Chuhong Fei, Raymond H. Kwong, Deepa Kundur:
Secure semi-fragilewatermarking for image authentication. WIFS 2009: 141-145 - 2008
- [c38]Alexandra Czarlinska, Deepa Kundur:
Reliable Scalar-Visual Event-Detection in Wireless Visual Sensor Networks. CCNC 2008: 660-664 - [c37]Alexandra Czarlinska, William Luh, Deepa Kundur:
On privacy and security in distributed visual sensor networks. ICIP 2008: 1692-1695 - [c36]Takis Zourntos, Nebu John Mathai, Sebastian Magierowski, Deepa Kundur:
A bio-inspired analog scheme for navigational control of lightweight autonomous agents. ICRA 2008: 1132-1137 - [c35]Alexandra Czarlinska, Deepa Kundur:
Event-Driven Visual Sensor Networks: Issues in Reliability. WACV 2008: 1-6 - [c34]Alexandra Czarlinska, Deepa Kundur:
Coordination and Selfishness in Attacks on Visual Sensor Networks. WCNC 2008: 2391-2396 - 2007
- [c33]William Luh, Deepa Kundur:
Distributed Keyless Secret Sharing Over Noiseless Channels. GLOBECOM 2007: 44-48 - [c32]Alexandra Czarlinska, William Luh, Deepa Kundur:
Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments. GLOBECOM 2007: 1001-1005 - [c31]William Luh, Deepa Kundur:
Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks. GLOBECOM 2007: 1637-1641 - [c30]Deepa Kundur, Zhu Liu, Madjid Merabti, Heather Yu:
Advances in Peer-to-Peer Content Search. ICME 2007: 404-407 - [c29]William Luh, Deepa Kundur:
Distributed keyless security for correlated data with applications in visual sensor networks. MM&Sec 2007: 75-86 - [c28]Julien S. Jainsky, Deepa Kundur, Don R. Halverson:
Towards digital video steganalysis using asymptotic memoryless detection. MM&Sec 2007: 161-168 - [c27]Alexandra Czarlinska, Deepa Kundur:
Attack vs. failure detection in event-driven wireless visual sensor networks. MM&Sec 2007: 215-220 - [c26]Unoma Ndili Okorafor, Deepa Kundur:
On node isolation in directional sensor networks. SenSys 2007: 433-434 - [c25]Unoma Ndili Okorafor, Deepa Kundur:
On the Connectivity of Hierarchical Directional Optical Sensor Networks. WCNC 2007: 3524-3528 - 2006
- [c24]Unoma Ndili Okorafor, Deepa Kundur:
OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks. BROADNETS 2006 - [c23]Zhu Liu, Heather Yu, Deepa Kundur, Madjid Merabti:
On Peer-to-Peer Multimedia Content Access and Distribution. ICME 2006: 557-560 - [c22]Deepa Kundur, Unoma Ndili Okorafor, William Luh:
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. IIH-MSP 2006: 267-270 - [c21]Unoma Ndili Okorafor, Kyle Marshall, Deepa Kundur:
Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks. MASS 2006: 888-893 - [c20]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
A hypothesis testing approach for achieving semi-fragility in multimedia authentication. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607220 - 2005
- [c19]Unoma Ndili Okorafor, Deepa Kundur:
Efficient routing protocols for a free space optical sensor network. MASS 2005 - [c18]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. Security, Steganography, and Watermarking of Multimedia Contents 2005: 697-708 - 2004
- [c17]Deepa Kundur, Yang Zhao, Patrizio Campisi:
A stenographic framework for dual authentication and compression of high resolution imagery. ISCAS (2) 2004: 1-4 - [c16]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
Analysis and design of authentication watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 760-771 - 2003
- [c15]Nebu John Muthui, Ali Sheikholeslami, Deepa Kundur:
VLSI implementation of a real-time video watermark embedder and detector. ISCAS (2) 2003: 772-775 - 2002
- [c14]Patrizio Campisi, Deepa Kundur, Dimitrios Hatzinakos, Alessandro Neri:
Hiding-based compression for improved color image coding. Security and Watermarking of Multimedia Contents 2002: 230-239 - [c13]Karen Su, Deepa Kundur, Dimitrios Hatzinakos:
Novel approach to collusion-resistant video watermarking. Security and Watermarking of Multimedia Contents 2002: 491-502 - 2001
- [c12]Karen Su, Deepa Kundur, Dimitrios Hatzinakos:
A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks. ICIP (1) 2001: 818-821 - [c11]Chuhong Fei, Deepa Kundur, Raymond H. Kwong:
The Choice of Watermark Domain in the Presence of Compression. ITCC 2001: 79-84 - 2000
- [c10]Deepa Kundur:
Energy Allocation for High-Capacity Watermarking in the Presence of Compression. ICIP 2000: 423-426 - [c9]Deepa Kundur:
Water-Filling for Watermarking? IEEE International Conference on Multimedia and Expo (III) 2000: 1287-1290 - [c8]Deepa Kundur:
Implications for High Capacity Data Hiding in Presence of Lossy Compression. ITCC 2000: 16-21 - 1999
- [c7]Deepa Kundur, Dimitrios Hatzinakos:
Attack Characterization for Effective Watermarking. ICIP (2) 1999: 240-244 - 1998
- [c6]Deepa Kundur, Dimitrios Hatzinakos:
Digital watermarking using multiresolution wavelet decomposition. ICASSP 1998: 2969-2972 - [c5]Deepa Kundur, Dimitrios Hatzinakos:
Towards a Telltale Watermarking Technique for Tamper-Proofing. ICIP (2) 1998: 409-413 - 1997
- [c4]Deepa Kundur, Dimitrios Hatzinakos, Henry Leung:
A novel approach to robust blind classification of remote sensing imagery. ICIP (3) 1997: 130-133 - [c3]Deepa Kundur, Dimitrios Hatzinakos:
A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion. ICIP (1) 1997: 544-547 - 1996
- [c2]Deepa Kundur, Dimitrios Hatzinakos:
Blind image restoration via recursive filtering using deterministic constraints. ICASSP 1996: 2283-2286 - [c1]Deepa Kundur, Dimitrios Hatzinakos:
On the global asymptotic stability of the NAS-RIF algorithm for blind image restoration. ICIP (3) 1996: 73-76
Editorship
- 2007
- [e1]Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007. ACM 2007, ISBN 978-1-59593-857-2 [contents]
Reference Works
- 2008
- [r4]William Luh, Deepa Kundur:
Multimedia Fingerprinting. Encyclopedia of Multimedia 2008: 548-549 - [r3]Deepa Kundur, William Luh:
Multimedia Sensor Networks. Encyclopedia of Multimedia 2008: 600-604 - 2006
- [r2]Deepa Kundur, William Luh:
Multimedia Sensor Networks. Encyclopedia of Multimedia 2006 - [r1]William Luh, Deepa Kundur:
Multimedia Fingerprinting. Encyclopedia of Multimedia 2006
Informal and Other Publications
- 2024
- [i8]Ahmad Mohammad Saber, Amr M. Youssef, Davor Svetinovic, Hatem H. Zeineldin, Deepa Kundur, Ehab F. El-Saadany:
Enhancing Power Quality Event Classification with AI Transformer Models. CoRR abs/2402.14949 (2024) - [i7]Ahmad Mohammad Saber, Alaa Selim, Mohamed M. Hammad, Amr M. Youssef, Deepa Kundur, Ehab F. El-Saadany:
A Novel Approach to Classify Power Quality Signals Using Vision Transformers. CoRR abs/2409.00025 (2024) - 2023
- [i6]Amr S. Mohamed, Deepa Kundur, Mohsen Khalaf:
A Probabilistic Approach to Adaptive Protection in the Smart Grid. CoRR abs/2302.14126 (2023) - [i5]Amr S. Mohamed, Mohsen Khalaf, Deepa Kundur:
On the Use of Safety Critical Control for Cyber-Physical Security in the Smart Grid. CoRR abs/2303.02197 (2023) - [i4]Amr S. Mohamed, Deepa Kundur:
On the Use of Reinforcement Learning for Attacking and Defending Load Frequency Control. CoRR abs/2303.15736 (2023) - [i3]Amr S. Mohamed, Sumin Lee, Deepa Kundur:
Reinforcement Learning for Supply Chain Attacks Against Frequency and Voltage Control. CoRR abs/2309.05814 (2023) - 2020
- [i2]Karthik Raja Kalaiselvi Bhaskar, Deepa Kundur, Yuri A. Lawryshyn:
Implicit Feedback Deep Collaborative Filtering Product Recommendation System. CoRR abs/2009.08950 (2020) - 2018
- [i1]Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti:
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware. CoRR abs/1809.09035 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint