skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 2229109

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available January 1, 2026
  2. This paper is devoted to the detection of contingencies in modern power systems. Because the systems we consider are under the framework of cyber-physical systems, it is necessary to take into consideration of the information processing aspect and communication networks. A consequence is that noise and random disturbances are unavoidable. The detection problem then becomes one known as quickest detection. In contrast to running the detection problem in a discretetime setting leading to a sequence of detection problems, this work focuses on the problem in a continuous-time setup. We treat stochastic differential equation models. One of the distinct features is that the systems are hybrid involving both continuous states and discrete events that coexist and interact. The discrete event process is modeled by a continuous-time Markov chain representing random environments that are not resented by a continuous sample path. The quickest detection then can be written as an optimal stopping problem. This paper is devoted to finding numerical solutions to the underlying problem. We use a Markov chain approximation method to construct the numerical algorithms. Numerical examples are used to demonstrate the performance. 
    more » « less
  3. This work is to present a learning observer-based method for simultaneous detection and estimation of false data injection attacks (FDIAs) to the cyber-physical battery systems. The original battery system in a state-space formulation is transformed into two separate subsystems: one contains both disturbances and the FDIAs and the second one is free from disturbances but subject to FDIAs. A learning observer is then designed for the second subsystem such that the FDIA signals can be estimated and further detected without being affected by the disturbances. This makes the proposed learning observer-based detection and estimation method is robust to disturbances and false declaration of FDIAs can be avoided. Another advantage of the proposed method is that the computing load is low because of the design of a reduced-order learning observer. With a three-cell battery string, a simulation study is employed to verify the effectiveness of proposed detection and estimation method for the FDIAs. 
    more » « less