


default search action
Kaikai Pan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Jingwei Dong, Kaikai Pan, Sérgio Pequito, Peyman Mohajerin Esfahani:
Robust multivariate detection and estimation with fault frequency content information. Autom. 173: 112049 (2025) - [j6]Kaikai Pan, Zhiyun Wang, Jingwei Dong, Peter Palensky, Wenyuan Xu:
Real-Time Estimation and Defense of PV Inverter Sensor Attacks With Hardware Implementation. IEEE Trans. Ind. Electron. 72(3): 3228-3232 (2025) - [j5]Zhiyun Wang
, Kaikai Pan
, Wenyuan Xu
:
Sensor Attacks on Grid-Tie Photovoltaic Inverters: Synthetic Analysis and Real-Time Robust Detection. IEEE Trans. Ind. Informatics 21(1): 820-829 (2025) - [i10]Jialin Wu, Kaikai Pan, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Wenyuan Xu:
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities. CoRR abs/2501.07044 (2025) - 2024
- [c8]Jialin Wu, Kaikai Pan, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Wenyuan Xu:
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities. MetaCom 2024: 105-112 - [i9]Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters. CoRR abs/2409.17873 (2024) - 2023
- [c7]Huaiyu Liu, Yuze Fu, Kaikai Pan, Wenyuan Xu, Chenggang Li, Chen Liu:
Attack Detection for Distributed Photovoltaic Generation Systems Leveraging Cyber and Power Side Channel Data. ISGT Asia 2023: 1-5 - [i8]Jingwei Dong, Kaikai Pan, Sérgio Pequito, Peyman Mohajerin Esfahani:
Robust Multivariate Detection and Estimation with Fault Frequency Content Information. CoRR abs/2310.04922 (2023) - 2022
- [j4]Pin Wu
, Kaikai Pan, Lulu Ji
, Siquan Gong, Weibing Feng, Wenyan Yuan, Christopher C. Pain
:
Navier-stokes Generative Adversarial Network: a physics-informed deep learning model for fluid flow generation. Neural Comput. Appl. 34(14): 11539-11552 (2022) - [j3]Kaikai Pan
, Peter Palensky
, Peyman Mohajerin Esfahani
:
Dynamic Anomaly Detection With High-Fidelity Simulators: A Convex Optimization Approach. IEEE Trans. Smart Grid 13(2): 1500-1515 (2022) - [c6]Jiandong Si, Huaiyu Liu, Zihuai Zheng, Xueqi Jin, Dongbo Zhang, Zhouhong Wang, Kaikai Pan:
A Cyber Security Monitoring Approach for Low-voltage Distributed Generation Control System Using Both Network Traffic Data and Side-channel Information. EEET 2022: 104-109 - 2020
- [j2]Kaikai Pan
, Elyas Rakhshani
, Peter Palensky
:
False Data Injection Attacks on Hybrid AC/HVDC Interconnected Systems With Virtual Inertia - Vulnerability, Impact and Detection. IEEE Access 8: 141932-141945 (2020) - [c5]Chenguang Wang
, Kaikai Pan
, Simon H. Tindemans
, Peter Palensky:
Training Strategies for Autoencoder-based Detection of False Data Injection Attacks. ISGT-Europe 2020: 1-5 - [i7]Kaikai Pan, Elyas Rakhshani, Peter Palensky:
False Data Injection Attacks on Hybrid AC/HVDC Interconnected System with Virtual Inertia - Vulnerability, Impact and Detection. CoRR abs/2001.07068 (2020) - [i6]Chenguang Wang, Simon H. Tindemans, Kaikai Pan, Peter Palensky:
Detection of False Data Injection Attacks Using the Autoencoder Approach. CoRR abs/2003.02229 (2020) - [i5]Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani:
Data-Assisted Model-Based Anomaly Detection for High-Fidelity Simulators of Power Systems. CoRR abs/2004.13927 (2020) - [i4]Chenguang Wang, Kaikai Pan, Simon H. Tindemans, Peter Palensky:
Training Strategies for Autoencoder-based Detection of False Data Injection Attacks. CoRR abs/2005.07158 (2020)
2010 – 2019
- 2019
- [j1]Kaikai Pan
, André Teixeira
, Milos Cvetkovic, Peter Palensky:
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation. IEEE Trans. Smart Grid 10(3): 3044-3056 (2019) - [c4]Kaikai Pan
, Digvijay Gusain, Peter Palensky:
Modelica-Supported Attack Impact Evaluation in Cyber Physical Energy System. HASE 2019: 228-233 - 2017
- [c3]Kaikai Pan
, André Teixeira
, Milos Cvetkovic, Peter Palensky:
Data attacks on power system state estimation: Limited adversarial knowledge vs. limited attack resources. IECON 2017: 4313-4318 - [c2]Kaikai Pan
, André Teixeira
, Claudio David López, Peter Palensky:
Co-simulation for cyber security analysis: Data attacks against energy management system. SmartGridComm 2017: 253-258 - [i3]Kaikai Pan, André Teixeira, Claudio David López, Peter Palensky:
Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System. CoRR abs/1708.08322 (2017) - [i2]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation. CoRR abs/1708.08349 (2017) - [i1]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources. CoRR abs/1708.08355 (2017) - 2016
- [c1]Kaikai Pan
, André M. H. Teixeira
, Milos Cvetkovic, Peter Palensky:
Combined data integrity and availability attacks on state estimation in cyber-physical power grids. SmartGridComm 2016: 271-277
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-28 23:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint