scispace - formally typeset
Y

Yilin Mo

Researcher at Tsinghua University

Publications -  149
Citations -  8529

Yilin Mo is an academic researcher from Tsinghua University. The author has contributed to research in topics: Estimator & Computer science. The author has an hindex of 32, co-authored 123 publications receiving 7039 citations. Previous affiliations of Yilin Mo include Nanyang Technological University & University of Pittsburgh.

Papers
More filters
Journal ArticleDOI

Cyber–Physical Security of a Smart Grid Infrastructure

TL;DR: It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security.
Proceedings ArticleDOI

Secure control against replay attacks

TL;DR: This paper analyzes the effect of replay attacks on a control system and proposes a countermeasure that guarantees a desired probability of detection by trading off either detection delay or LQG performance, either by decreasing control accuracy or increasing control effort.

Cyber-Physical Security of a Smart Grid Infrastructure The authors of this paper discuss the limitations of advances, measures to make the smart grid secure, and also to assure continuous power flows and dynamic power pricing.

TL;DR: In this paper, the authors argue that existing security approaches are either inapplicable, not viable, insufficiently scalable, incom- patible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid.
Journal ArticleDOI

Detecting Integrity Attacks on SCADA Systems

TL;DR: The main contributions of this paper lies in enumerating the conditions of the feasibility of the replay attack, and suggesting countermeasures that optimize the probability of detection by conceding control performance.
Journal ArticleDOI

Integrity Data Attacks in Power Market Operations

TL;DR: This paper shows how an attack could systematically construct a profitable attacking strategy, in the meantime being undetected by the system operator, and formalizes the economic impact of malicious data attacks on real-time market operations.