Jiwei Tian

Orcid: 0000-0002-1485-7465

According to our database1, Jiwei Tian authored at least 29 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
CoRR, 2024

2023
Hybrid Beamforming for Secure Transmission of Massive MIMO UAV Communication Networks.
IEEE Syst. J., September, 2023

Deep Reinforcement Learning Based UAV for Securing mmWave Communications.
IEEE Trans. Veh. Technol., April, 2023

Sudden Track Turning of Typhoon Prapiroon (2012) Enhanced the Upper Ocean Response.
Remote. Sens., January, 2023

Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

2022
Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2022

Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
IEEE Trans. Cybern., 2022

Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning.
IEEE Internet Things J., 2022

Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles.
IEEE Internet Things J., 2022

Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission.
IEEE Internet Things J., 2022

Adversarial Attacks and Defense Methods for Power Quality Recognition.
CoRR, 2022

Datadriven false data injection attacks against cyber-physical power systems.
Comput. Secur., 2022

2021
Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems.
IEEE Trans. Veh. Technol., 2021

TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems.
IEEE Internet Things J., 2021

ADS-B anomaly data detection model based on VAE-SVDD.
Comput. Secur., 2021

Threat impact analysis to air traffic control systems through flight delay modeling.
Comput. Ind. Eng., 2021

2020
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection.
IEEE Wirel. Commun. Lett., 2020

Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020

On the Security Enhancement of Uplink NOMA Systems With Jammer Selection.
IEEE Trans. Commun., 2020

Threat model and construction strategy on ADS-B attack data.
IET Inf. Secur., 2020

Dynamic temporal ADS-B data attack detection based on sHDP-HMM.
Comput. Secur., 2020

CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems.
IEEE Access, 2020

Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

2019
Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks.
IEEE Wirel. Commun. Lett., 2019

Online sequential attack detection for ADS-B data based on hierarchical temporal memory.
Comput. Secur., 2019

Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

ADS-B Data Attack Detection Based on Generative Adversarial Networks.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid.
Secur. Commun. Networks, 2018


  Loading...