Invisible Manipulation: Deep Reinforcement Learning-Enhanced Stealthy Attacks on Battery Energy Management Systems
This paper introduces an innovative cyber-attack scheme, “invisible manipulation,” utilizing timed-stealthy false data injection attacks (Timed-SFDIAs). By subtly altering critical measurements ahead of a target period, the attacker covertly steers system operations toward a sp...
Saved in:
Main Authors: | Qi Xiao, Lidong Song, Jong Ha Woo, Rongxing Hu, Bei Xu, Kai Ye, Ning Lu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/11084779/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
CleanSheet: Advancing backdoor attack techniques for deep neural networks with stealthy trigger embedding
by: Ahmed Bensaoud, et al.
Published: (2025-12-01) -
A phishing attack awareness framework for a South African University of Technology
by: Japhet M. Kayomb, et al.
Published: (2025-07-01) -
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01) -
International humanitarian law in cyberspace: Ratione materiae, ratione temporis and problem of cyber-attack qualification
by: S. Y. Garkusha-Bozhko
Published: (2021-04-01) -
An approach for classifying sociotechnical attacks
by: Oleksandr Korchenko, et al.
Published: (2025-05-01)