Zhigang Chu

Orcid: 0000-0001-5603-4590

According to our database1, Zhigang Chu authored at least 25 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HDIQA: A Hyper Debiasing Framework for Full Reference Image Quality Assessment.
IEEE Trans. Broadcast., June, 2024

A Rate Control Scheme for VVC Intercoding Using a Linear Model.
Int. J. Pattern Recognit. Artif. Intell., February, 2024

2022
An Adaptive Rainfall Estimation Algorithm for Dual-Polarization Radar.
IEEE Geosci. Remote. Sens. Lett., 2022

2021
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid.
CoRR, 2021

2020
Unobservable False Data Injection Attacks on Power Systems.
PhD thesis, 2020

CDL: A Cloud Detection Algorithm Over Land for MWHS-2 Based on the Gradient Boosting Decision Tree.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

A Lever-Type Method of Strain Exposure for Disk F-Shaped Torque Sensor Design.
Sensors, 2020

N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences.
CoRR, 2020

Detecting Load Redistribution Attacks via Support Vector Models.
CoRR, 2020

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Nonlinear Regression Method for Composite Protection Modeling of Induction Motor Loads.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

2019
Evaluation of MWHS-2 Using a Co-located Ground-Based Radar Network for Improved Model Assimilation.
Remote. Sens., 2019

Continuous Monitoring of Differential Reflectivity Bias for C-Band Polarimetric Radar Using Online Solar Echoes in Volume Scans.
Remote. Sens., 2019

Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
CoRR, 2019

An Alternative Hybrid Time-Frequency Domain Approach Based on Fast Iterative Shrinkage-Thresholding Algorithm for Rotating Acoustic Source Identification.
IEEE Access, 2019

Iteratively Reweighted Spherical Equivalent Source Method for Acoustic Source Identification.
IEEE Access, 2019

Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Detailed Modeling of Residential End-Use Motor Load and Protection for Distribution System Transient Study.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

2018
A Quality Control Method of Ground-Based Weather Radar Data Based on Statistics.
IEEE Trans. Geosci. Remote. Sens., 2018

Two-Dimensional Total Variation Norm Constrained Deconvolution Beamforming Algorithm for Acoustic Source Identification.
IEEE Access, 2018

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
The Assessment of Ground-Based Weather Radar Data by Comparison With TRMM PR.
IEEE Geosci. Remote. Sens. Lett., 2017

Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
CoRR, 2017

False data injection attacks on phasor measurements that bypass low-rank decomposition.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Evaluating power system vulnerability to false data injection attacks via scalable optimization.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016


  Loading...