Conference paper

file

Visible to the public Safety Analysis of AMI Networks through Smart Fraud Detection

Advanced metering infrastructure (AMI) is a critical part of a modern smart grid that performs the bidirectional data flow of sensitive power information such as smart metering data and control commands. The real-time monitoring and control of the grid are ensured through AMI. While smart meter data helps to improve the overall performance of the grid in terms of efficient energy management, it has also made the AMI an attractive target of cyberattackers with a goal of stealing energy.

file

Visible to the public Cyber Threat Analysis Framework for the Wind Energy Based Power System

Wind energy is one of the major sources of renewable energy. Countries around the world are increasingly deploying large wind farms that can generate a significant amount of clean energy. A wind farm consists of many turbines, often spread across a large geographical area. Modern wind turbines are equipped with meteorological sensors. The wind farm control center monitors the turbine sensors and adjusts the power generation parameters for optimal power production.

file

Visible to the public Nonsmooth Barrier Functions with Applications to Multi-Robot Systems

As multi-agent systems become ubiquitous, the ability to satisfy multiple system-level constraints in these systems grows increasingly important. In applications ranging from automated cruise control to safety in robot swarms, barrier functions have emerged as a tool to provably meet such constraints by guaranteeing forward invariance of a set. However, satisfying multiple constraints typically implies formulating multiple barrier functions, bringing up the need to address the degree to which multiple barrier functions may be composed through Boolean logic.

file

Visible to the public Event-Triggered Interactive Gradient Descent for Real-Time Multi-Objective Optimization

This paper proposes an event-triggered interactive gradient descent method for solving multi-objective optimization problems. We consider scenarios where a human decision maker works with a robot in a supervisory manner in order to find the best Pareto solution to an optimization problem. The human has a time-invariant function that represents the value she gives to the different outcomes. However, this function is implicit, meaning that the human does not know it in closed form, but can respond to queries about it.

event

Visible to the public  The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Dec 06, 2017 8:00 am - Dec 07, 2017 8:00 pm WET

The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Funchal, Portugal - December 6-7, 2017
https://sustainit2017.m-iti.org

CALL FOR PAPERS

forum

Visible to the public Call for Papers: SustainIT 2017

The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Funchal, Portugal - December 6-7, 2017
https://sustainit2017.m-iti.org

CALL FOR PAPERS

event

Visible to the public  The Fourth International Conference On Digital Enterprise and Information Systems
Jul 19, 2017 9:00 am - Jul 20, 2017 5:00 pm UTC

You are invited to participate in The Fourth International Conference On Digital Enterprise and Information Systems (DEIS2017) that will be held in Jakarta, Indonesia, on July 19 - 20, 2017. The event will be held over two days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

file

Visible to the public Characterizing Smartphone Usage Patterns from Millions of Android Users

The prevalence of smart devices has promoted the popularity of mobile applications (a.k.a. apps) in recent years. A number of interesting and important questions remain unanswered, such as why a user likes/dislikes an app, how an app becomes popular or eventually perishes, how a user selects apps to install and interacts with them, how frequently an app is used and how much trac it generates, etc. This paper presents an empirical analysis of app usage behaviors collected from millions of users of Wandoujia, a leading Android app marketplace in China.

file

Visible to the public Game Theory with Learning for Cyber Security Monitoring

Abstract--Recent attacks show that threats to cyber infrastructure are not only increasing in volume, but are getting more sophisticated. The attacks may comprise multiple actions that are hard to differentiate from benign activity, and therefore common detection techniques have to deal with high false positive rates. Because of the imperfect performance of automated detection techniques, responses to such attacks are highly dependent on human-driven decision-making processes.