default search action
Shuva Paul
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Shuva Paul, Sanjana Vijayshankar, Richard Macwan:
Demystifying Cyberattacks: Potential for Securing Energy Systems With Explainable AI. ICNC 2024: 430-434 - 2023
- [j8]Alexander M. Wyglinski, Thanuka Wickramarathne, Danjue Chen, Nicholas J. Kirsch, Kuldeep S. Gill, Taru Jain, Varun Garg, Tienan Li, Shuva Paul, Zhang Xi:
Phantom Car Attack Detection via Passive Opportunistic RF Localization. IEEE Access 11: 27676-27692 (2023) - [i1]Shuva Paul, Abodh Poudyal, Shiva Poudel, Anamika Dubey, Zhaoyu Wang:
Resilience assessment and planning in power distribution systems: Past and future considerations. CoRR abs/2308.07552 (2023) - 2022
- [j7]Ambarish Kulkarni, Gerrit Brandes, Akhlaqur Rahman, Shuva Paul:
A Numerical Model to Evaluate the HVAC Power Demand of Electric Vehicles. IEEE Access 10: 96239-96248 (2022) - [j6]Shuva Paul, Fei Ding, Kumar Utkarsh, Weijia Liu, Mark J. O'Malley, John Barnett:
On Vulnerability and Resilience of Cyber-Physical Power Systems: A Review. IEEE Syst. J. 16(2): 2367-2378 (2022) - [c15]Shuva Paul, Yu-Cheng Chen, Santiago Grijalva, Vincent John Mooney:
A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain. ISGT 2022: 1-5 - [c14]Shuva Paul, Santiago Grijalva, Miguel Jiménez-Aparicio, Matthew J. Reno:
Knowledge-Based Fault Diagnosis for a Distribution System with High PV Penetration. ISGT 2022: 1-5 - [c13]Shuva Paul, Ripan Kumar Kundu:
A Bagging MLP-based Autoencoder for Detection of False Data Injection Attack in Smart Grid. ISGT 2022: 1-5 - 2021
- [j5]Md. Manjurul Ahsan, Md Tanvir Ahad, Farzana Akter Soma, Shuva Paul, Ananna Chowdhury, Shahana Akter Luna, Munshi Md. Shafwat Yazdan, Akhlaqur Rahman, Zahed Siddique, Pedro Huebner:
Detecting SARS-CoV-2 From Chest X-Ray Using Artificial Intelligence. IEEE Access 9: 35501-35513 (2021) - [j4]Shuva Paul, Muhtasim Riffat, Abrar Yasir, Mir Nusrat Mahim, Bushra Yasmin Sharnali, Intisar Tahmid Naheen, Akhlaqur Rahman, Ambarish Kulkarni:
Industry 4.0 Applications for Medical/Healthcare Services. J. Sens. Actuator Networks 10(3): 43 (2021) - [j3]Ripan Kumar Kundu, Akhlaqur Rahman, Shuva Paul:
A Study on Sensor System Latency in VR Motion Sickness. J. Sens. Actuator Networks 10(3): 53 (2021) - 2020
- [j2]Shuva Paul, Zhen Ni, Chaoxu Mu:
A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems. IEEE Trans. Neural Networks Learn. Syst. 31(11): 4512-4523 (2020) - [c12]Shuva Paul, Fei Ding:
Identification of Worst Impact Zones for Power Grids During Extreme Weather Events Using Q-learning. ISGT 2020: 1-5 - [c11]Shuva Paul, Zhen Ni, Fei Ding:
An Analysis of Post Attack Impacts and Effects of Learning Parameters on Vulnerability Assessment of Power Grid. ISGT 2020: 1-5
2010 – 2019
- 2019
- [j1]Zhen Ni, Shuva Paul:
A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution. IEEE Trans. Neural Networks Learn. Syst. 30(9): 2684-2695 (2019) - [c10]Shuva Paul, Zhen Ni:
Study of Learning of Power Grid Defense Strategy in Adversarial Stage Game. EIT 2019: 292-297 - [c9]Shuva Paul, Md. Rashedul Haq, Avijit Das, Zhen Ni:
A Comparative Study of Smart Grid Security Based on Unsupervised Learning and Load Ranking. EIT 2019: 310-315 - [c8]Shuva Paul, Zhen Ni:
A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security. ISGT 2019: 1-5 - 2018
- [c7]Shuva Paul, Zhen Ni:
A Study of Linear Programming and Reinforcement Learning for One-Shot Game in Smart Grid Security. IJCNN 2018: 1-8 - 2017
- [c6]Shuva Paul, Zhen Ni:
Vulnerability analysis for simultaneous attack in smart grid security. ISGT 2017: 1-5 - [c5]Zhen Ni, Shuva Paul, Xiangnan Zhong, Qinglai Wei:
A reinforcement learning approach for sequential decision-making process of attacks in smart grid. SSCI 2017: 1-8 - 2016
- [c4]Ikram Ilyas, Shuva Paul, Akhlaqur Rahman, Ripan Kumar Kundu:
Comparative evaluation of cyclostationary detection based cognitive spectrum sensing. UEMCON 2016: 1-7 - 2015
- [c3]Md. Shoriful Islam, Ahmed Al Amin, Shuva Paul, Intisar Tahmid Naheen:
Behavioral Analysis of Amplifier in Long Haul Communication System: Performance Analysis of EDFA and Raman amplifier using Soliton Pulse in Long Haul Communication System. ICCCT 2015: 437-441 - [c2]Md. Shoriful Islam, Ahmed Al Amin, Shuva Paul, Intisar Tahmid Naheen:
Reliability Checking for Digital Modulation Schemes in 4G - 5G Communication system: Comparison between QPSK and QAM Modulation Techniques for Beyond LTE. ICCCT 2015: 442-446 - [c1]Ahmed Al Amin, Md. Shoriful Islam, Shuva Paul, Intisar Tahmid Naheen:
Performance analysis of Soliton and Gaussian Pulse in Long Haul Communication. ICCCT 2015: 447-451
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint