Deepa Kundur

According to our database1, Deepa Kundur authored at least 150 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to signal processing techniques for multimedia and cyber security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Hierarchical Signal Processing for Tractable Power Flow Management in Electric Grid Networks.
IEEE Trans. Signal and Information Processing over Networks, 2019

Financially Motivated FDI on SCED in Real-Time Electricity Markets: Attacks and Mitigation.
IEEE Trans. Smart Grid, 2019

On Effective Virtual Inertia of Storage-Based Distributed Control for Transient Stability.
IEEE Trans. Smart Grid, 2019

Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems.
IEEE Trans. Industrial Informatics, 2019

On Cyber-Physical Coupling and Distributed Control in Smart Grids.
IEEE Trans. Industrial Informatics, 2019

Intelligent Signal Processing and Coordination for the Adaptive Smart Grid: An Overview of Data-Driven Grid Management.
IEEE Signal Process. Mag., 2019

Flocking-based adaptive granular control strategy for autonomous microgrids in emergency situations.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Modeling and Simulation of the Aurora Attack on Microgrid Point of Common Coupling.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Identification of Hammerstein Systems with Rate-Dependent Hysteresis Nonlinearities in a Class of Smart Material-Based Actuators.
Proceedings of the 2019 American Control Conference, 2019

2018
A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability.
IEEE Trans. Signal and Information Processing over Networks, 2018

A Class of Switching Exploits Based on Inter-Area Oscillations.
IEEE Trans. Smart Grid, 2018

A Cyber-Physical Control Framework for Transient Stability in Smart Grids.
IEEE Trans. Smart Grid, 2018

A Storage-Based Multiagent Regulation Framework for Smart Grid Resilience.
IEEE Trans. Industrial Informatics, 2018

Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation.
J. Sel. Topics Signal Processing, 2018

Introduction to the Issue on Signal and Information Processing for Critical Infrastructures.
J. Sel. Topics Signal Processing, 2018

Online Power Quality Disturbance Classification with Recurrent Neural Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Identification of Piezomicropositioning Hammerstein Systems with Generalized Prandtl-Ishlinskii Hysteresis Nonlinearities.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Delay in Chaum's Anonymizing Mix Networks.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

Identification of Precision Motion Systems with Prandtl-Ishlinskii Hysteresis Nonlinearities.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Resilient Distributed Real-Time Demand Response via Population Games.
IEEE Trans. Smart Grid, 2017

A Game Theoretic Approach to Real-Time Robust Distributed Generation Dispatch.
IEEE Trans. Industrial Informatics, 2017

On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control.
IEEE Trans. Industrial Informatics, 2017

On the Use of Energy Storage Systems and Linear Feedback Optimal Control for Transient Stability.
IEEE Trans. Industrial Informatics, 2017

Fundamental limits on communication latency for distributed control via electromechanical waves.
Proceedings of the IEEE International Conference on Communications, 2017

A transient stability control adaptive to measurements uncertainties.
Proceedings of the IEEE International Conference on Communications, 2017

Simplified implementation and control of a flywheel energy system for microgrid applications.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Reactance perturbation for enhancing detection of FDI attacks in power system state estimation.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

IEC-61850 GOOSE traffic modeling and generation.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Impact of Cyber Attacks on Data Integrity in Transient Stability Control.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Performance Metrics for Storage-Based Transient Stability Control.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

2016
GOAliE: Goal-Seeking Obstacle and Collision Evasion for Resilient Multicast Routing in Smart Grid.
IEEE Trans. Smart Grid, 2016

A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis.
IEEE Trans. Smart Grid, 2016

A Cyber-Enabled Stabilizing Control Scheme for Resilient Smart Grid Systems.
IEEE Trans. Smart Grid, 2016

A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems.
IEEE Trans. Smart Grid, 2016

Noise Suppression of Corona Current Measurement From HVdc Transmission Lines.
IEEE Trans. Instrumentation and Measurement, 2016

Mitigating link insecurities in smart grids via QoS multi-constraint routing.
Proceedings of the IEEE International Conference on Communication, 2016

Implementation of an Offline Co-Simulation Test-Bed for Cyber Security and Control Verification.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Enhancing the performance of controlled distributed energy resources in noisy communication environments.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Control verification via off-line co-simulation.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Communication Links Vulnerability Model for Cyber Security Mitigation.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
A Novel Bio-Inspired Technique for Rapid Real-Time Generator Coherency Identification.
IEEE Trans. Smart Grid, 2015

Distributed Optimization of Dispatch in Sustainable Generation Systems via Dual Decomposition.
IEEE Trans. Smart Grid, 2015

On the Use of Matroid Theory for Distributed Cyber-Physical-Constrained Generator Scheduling in Smart Grid.
IEEE Trans. Industrial Electronics, 2015

A generalized design framework for IIR digital multiple notch filters.
EURASIP J. Adv. Sig. Proc., 2015

Distributed demand curtailment via water-filling.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Secure operating region simplification in dynamic security assessment.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Tuning out of phase: Resonance attacks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

A systematic approach to delay-adaptive control design for smart grids.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On using distributed energy resources to reshape the dynamics of power systems during transients.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Denial of service attacks and mitigation for stability in cyber-enabled power grid.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Distributed sustainable generation dispatch via evolutionary games.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Grid-independent cooperative microgrid networks with high renewable penetration.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

On using energy storage systems in switching attacks that destabilize smart grid systems.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

A cyber-enabled stabilizing controller for resilient smart grid systems.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Cooperative microgrid networks for remote and rural areas.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

On using distributed control schemes to mitigate switching attacks in smart grids.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A Flocking-Based Paradigm for Hierarchical Cyber-Physical Smart Grid Modeling and Control.
IEEE Trans. Smart Grid, 2014

A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid.
IEEE Trans. Smart Grid, 2014

Performance evaluation of flocking-based distributed cyber-physical control for Smart Grid.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Distributed power dispatch via bifurcation control.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Cyber attack detection in PMU measurements via the expectation-maximization algorithm.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Performance of flocking-based control schemes in smart grid applications.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid.
IEEE Trans. Emerging Topics Comput., 2013

Partition based cascaded generator scheduling with constraints for large power networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Coordinated variable structure switching attack in the presence of model error and state estimation.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Coordinated variable structure switching in smart power systems: attacks and mitigation.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

A flocking-based model for DoS-resilient communication routing in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

On the use of cyber-physical hierarchy for smart grid security and efficient control.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

Bloom filter based intrusion detection for smart grid SCADA.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

A distortion-theoretic perspective for redundant metering security in a smart grid.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Towards modelling the impact of cyber attacks on a smart grid.
IJSN, 2011

Preventative steganalysis in wireless visual sensor networks: Challenges and solutions.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Improving the visual performance of S/DISCUS.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

A class of cyber-physical switching attacks for power system disruption.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Advances In Peer-To-Peer Content Search.
Signal Processing Systems, 2010

Security-aware routing and localization for a directional mission critical network.
IEEE Journal on Selected Areas in Communications, 2010

2009
On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks.
IEEE Trans. Mob. Comput., 2009

A hypothesis testing approach to semifragile watermark-based authentication.
IEEE Trans. Information Forensics and Security, 2009

Wireless image sensor networks: event acquisition in attack-prone and uncertain environments.
Multidim. Syst. Sign. Process., 2009

Enhancing Privacy Protection in Multimedia Systems.
EURASIP J. Information Security, 2009

Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation.
EURASIP J. Adv. Sig. Proc., 2009

Secure semi-fragilewatermarking for image authentication.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2008
Multimedia Sensor Networks.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration.
IEEE Trans. Multimedia, 2008

Distributed Secret Sharing for Discrete Memoryless Networks.
IEEE Trans. Information Forensics and Security, 2008

Security and Privacy for Distributed Multimedia Sensor Networks.
Proceedings of the IEEE, 2008

Secure distributed source coding with side-information.
IEEE Communications Letters, 2008

Coordination and Selfishness in Attacks on Visual Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Event-Driven Visual Sensor Networks: Issues in Reliability.
Proceedings of the 9th IEEE Workshop on Applications of Computer Vision (WACV 2008), 2008

A bio-inspired analog scheme for navigational control of lightweight autonomous agents.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

On privacy and security in distributed visual sensor networks.
Proceedings of the International Conference on Image Processing, 2008

2007
A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems.
EURASIP J. Adv. Sig. Proc., 2007

Visual Sensor Networks.
EURASIP J. Adv. Sig. Proc., 2007

Towards characterizing the effectiveness of random mobility against actuation attacks.
Computer Communications, 2007

On the Connectivity of Hierarchical Directional Optical Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

On node isolation in directional sensor networks.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Distributed keyless security for correlated data with applications in visual sensor networks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Towards digital video steganalysis using asymptotic memoryless detection.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Attack vs. failure detection in event-driven wireless visual sensor networks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Advances in Peer-to-Peer Content Search.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks.
Proceedings of the Global Communications Conference, 2007

Distributed Keyless Secret Sharing Over Noiseless Channels.
Proceedings of the Global Communications Conference, 2007

Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments.
Proceedings of the Global Communications Conference, 2007

2006
Multimedia Fingerprinting.
Proceedings of the Encyclopedia of Multimedia, 2006

Analysis and design of secure watermark-based authentication systems.
IEEE Trans. Information Forensics and Security, 2006

Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain.
IEEE Trans. Information Forensics and Security, 2006

A hypothesis testing approach for achieving semi-fragility in multimedia authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

On Peer-to-Peer Multimedia Content Access and Distribution.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance.
IEEE Trans. Multimedia, 2005

Statistical invisibility for collusion-resistant digital video watermarking.
IEEE Trans. Multimedia, 2005

New paradigms for effective multicasting and fingerprinting of entertainment media.
IEEE Communications Magazine, 2005

Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Efficient routing protocols for a free space optical sensor network.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

2004
Toward robust logo watermarking using multiresolution image fusion principles.
IEEE Trans. Multimedia, 2004

Dual domain watermarking for authentication and compression of cultural heritage image.
IEEE Trans. Image Processing, 2004

Analysis and design of watermarking algorithms for improved resistance to compression.
IEEE Trans. Image Processing, 2004

Robust digital watermarking in the ridgelet domain.
IEEE Signal Process. Lett., 2004

Special Issue on Enabling Security Technologies for Digital Rights Management.
Proceedings of the IEEE, 2004

Video Fingerprinting and Encryption Principles for Digital Rights Management.
Proceedings of the IEEE, 2004

Analysis and design of authentication watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

A stenographic framework for dual authentication and compression of high resolution imagery.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
Hardware implementation perspectives of digital video watermarking algorithms.
IEEE Trans. Signal Processing, 2003

VLSI implementation of a real-time video watermark embedder and detector.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding.
EURASIP J. Adv. Sig. Proc., 2002

Novel approach to collusion-resistant video watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Hiding-based compression for improved color image coding.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
Diversity and attack characterization for improved robust watermarking.
IEEE Trans. Signal Processing, 2001

Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era.
IEEE MultiMedia, 2001

Watermarking with Diversity: Insights and Implications.
IEEE MultiMedia, 2001

The Choice of Watermark Domain in the Presence of Compression.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Robust classification of blurred imagery.
IEEE Trans. Image Processing, 2000

Implications for High Capacity Data Hiding in Presence of Lossy Compression.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Water-Filling for Watermarking?
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Energy Allocation for High-Capacity Watermarking in the Presence of Compression.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Attack Characterization for Effective Watermarking.
Proceedings of the 1999 International Conference on Image Processing, 1999

1998
On the use of Lyapunov criteria to analyze the convergence of blind deconvolution algorithms.
IEEE Trans. Signal Processing, 1998

A novel blind deconvolution scheme for image restoration using recursive filtering.
IEEE Trans. Signal Processing, 1998

Towards a Telltale Watermarking Technique for Tamper-Proofing.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Digital watermarking using multiresolution wavelet decomposition.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

1997
A novel approach to robust blind classification of remote sensing imagery.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
On the global asymptotic stability of the NAS-RIF algorithm for blind image restoration.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Blind image restoration via recursive filtering using deterministic constraints.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996


  Loading...