Jieyu Lei

Jieyu Lei
Southwest Jiaotong University · Department of Electrical Engineering

About

10
Publications
710
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
57
Citations

Publications

Publications (10)
Article
Full-text available
This paper proposes a pattern graph-enabled approach to accurately and comprehensively assess the risk of outage propagation patterns among branches. First, we propose a modeling strategy that captures the risk level of a correlation accurately by considering the likelihood of its outage that is associated with another branch outage. Furthermore, w...
Article
Full-text available
False data injection (FDI) for inducing load redistribution attacks can pose significant overloading risks to power systems. In this paper, we propose a data-driven approach to investigate the underlying dependencies and correlation of injected false data and the resulting overloading events, so that the detailed overloading mechanisms and propagat...
Article
Full-text available
A topology attack, as a special class of false data injection attacks, tampers with topology information of a system to mislead the decision of the control center. This article conducts an in-depth study on topology attacks that aim to interfere with the judgment in topology information and pose potential damage by tampering with measurement data a...
Article
Full-text available
The accelerated digitalization of today’s electric power infrastructure has highlighted the gravity of cyber resilience in the electricity ecosystem. Due to the expanded attack surface inherited in the digitalized operational and information technologies, the electricity sector is facing a continually escalating cyberthreat landscape and must act t...
Article
Full-text available
This letter develops a new bilevel optimization model to construct false data injection attack based on pre- and post- dispatch. In order to enhance the attack concealment, the proposed bilevel model can minimize the variation of uploaded measurements between pre- and post-attack before dispatching, after which the attack can lead the system to an...
Article
As an innovative paradigm for power systems with a high penetration of distributed energy resources (DERs), peer-to-peer (P2P) energy trading enables direct energy exchange among end-users, which can reduce energy costs and facilitate energy balance. Εnergy equity issues among low-income citizens however hinder the wide adoption of these schemes, d...
Article
Full-text available
This paper presents a systematic approach to explicitly quantify and evaluate the overloading associations among lines under load redistribution (LR) attacks. We define overloading associations as a measure of the statistical correlation between two sets of lines in terms of their susceptibility to simultaneous overloading. We then show how overloa...
Article
In this paper a novel improved multi-objective cross-entropy optimization (MOCEO+) algorithm is proposed. We seek to provide a low-cost, fast and effective solution for complex multi-objective problems. Firstly, a population size segmentation mechanism is adopted to reduce the computational cost. This also helps to increase the exploration ability...
Article
Full-text available
Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a popular method. However, the complex network theory cannot be comprehensively applicable to the opera...

Network

Cited By