


default search action
Xuan Liu 0003
Person information
- affiliation: Hunan University, College of Electrical and Information Engineering, Changsha, China
- affiliation (PhD 2015): Illinois Institute of Technology, Chicago, IL, USA
Other persons with the same name
- Xuan Liu — disambiguation page
- Xuan Liu 0001
— Hunan University, College of Computer Science and Electronic Engineering, Changsha, China (and 1 more)
- Xuan Liu 0002
— University of Missouri-Kansas City, Department of Computer Science Electrical Engineering, MO, USA
- Xuan Liu 0004
— East China University of Science and Technology, School of Business, Shanghai, China (and 1 more)
- Xuan Liu 0005
— The University of Sydney, School of Electrical and Information Engineering, NSW, Australia
- Xuan Liu 0006
— Yangzhou University, College of Information Engineering, Yangzhou, China (and 1 more)
- Xuan Liu 0007 — Dalhousie University, Halifax, Canada
- Xuan Liu 0008
— Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j44]Bo Zhang
, Xuan Liu
, Haofeng Zheng
, Yufei Song
:
Hidden Markov Model-Based Cyberattack Prediction in Power Systems. IEEE Trans. Smart Grid 16(2): 1694-1705 (2025) - 2024
- [j43]Runhai Jiao
, Zhuoting Han
, Xuan Liu
, Changyu Zhou, Min Du
:
A Gradient-Based Wind Power Forecasting Attack Method Considering Point and Direction Selection. IEEE Trans. Smart Grid 15(3): 3178-3192 (2024) - 2023
- [j42]Kang Yan
, Xuan Liu
, Yidan Lu
, Zongchao Yu
:
Thermostatically Controlled Loads in the Power System Under Cyberattacks. IEEE Internet Things J. 10(6, March 15): 5256-5267 (2023) - [j41]Kang Yan
, Xuan Liu, Yidan Lu, Fanglu Qin:
A Cyber-Physical Power System Risk Assessment Model Against Cyberattacks. IEEE Syst. J. 17(2): 2018-2028 (2023) - [j40]Min Du
, Xuan Liu
, Zuyi Li
, Hai Lin:
Robust Mitigation Strategy Against Dummy Data Attacks in Power Systems. IEEE Trans. Smart Grid 14(4): 3102-3113 (2023) - 2022
- [j39]Zongchao Yu
, Xuan Liu
, Zuyi Li:
A Secure Dispatch Strategy Subject to the Uncertainties of DLR and Wind Power. IEEE Trans. Ind. Informatics 18(7): 4499-4509 (2022) - [j38]Min Du, Xuan Liu
, Quan Zhou
, Zuyi Li
:
Hybrid Robust Tri-Level Defense Model Against Multiperiod Uncertain Attacks. IEEE Trans. Smart Grid 13(4): 3255-3265 (2022) - 2021
- [j37]Chao Shen
, Zhikang Shuai
, Yang Shen
, Yelun Peng
, Xuan Liu
, Zuyi Li
, Zheng John Shen
:
Transient Stability and Current Injection Design of Paralleled Current-Controlled VSCs and Virtual Synchronous Generators. IEEE Trans. Smart Grid 12(2): 1118-1134 (2021) - [j36]Quan Zhou
, Mohammad Shahidehpour
, Ahmed Alabdulwahab
, Abdullah Abusorrah
, Liang Che
, Xuan Liu
:
Cross-Layer Distributed Control Strategy for Cyber Resilient Microgrids. IEEE Trans. Smart Grid 12(5): 3705-3717 (2021) - [j35]Runhai Jiao
, Gangyi Xun, Xuan Liu
, Guangwei Yan:
A New AC False Data Injection Attack Method Without Network Information. IEEE Trans. Smart Grid 12(6): 5280-5289 (2021) - 2020
- [j34]Yang Li
, Zhikang Shuai
, Xuan Liu
, Yi Hong
, Xiangyang Wu, Zheng John Shen
:
Stability Investigation of Bidirectional AC-DC Converter Considering Operating Conditions. IEEE Access 8: 131499-131510 (2020) - [j33]Xi He
, Xuan Liu, Peng Li:
Coordinated False Data Injection Attacks in AGC System and Its Countermeasure. IEEE Access 8: 194640-194651 (2020) - [j32]Kehe Wu
, Jiawei Li, Bo Zhang
, Zongchao Yu
, Xuan Liu
:
Preventive Dispatch Strategy Against FDIA Induced Overloads in Power Systems With High Wind Penetration. IEEE Access 8: 210452-210461 (2020) - [j31]Xuan Liu
, Liang Che
, Kunlun Gao, Zuyi Li
:
Power System Intra-Interval Operational Security Under False Data Injection Attacks. IEEE Trans. Ind. Informatics 16(8): 4997-5008 (2020) - [j30]Yelun Peng
, Zhikang Shuai
, Xuan Liu
, Zuyi Li
, Josep M. Guerrero
, Zheng John Shen:
Modeling and Stability Analysis of Inverter-Based Microgrid Under Harmonic Conditions. IEEE Trans. Smart Grid 11(2): 1330-1342 (2020) - [j29]Xuan Liu
, Yufei Song, Zuyi Li
:
Dummy Data Attacks in Power Systems. IEEE Trans. Smart Grid 11(2): 1792-1795 (2020)
2010 – 2019
- 2019
- [j28]Liang Che, Xuan Liu
, Tao Ding
, Zuyi Li
:
Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures. IEEE Trans. Circuits Syst. II Express Briefs 66-II(6): 1058-1062 (2019) - [j27]Liang Che, Xuan Liu
, Zhikang Shuai:
Optimal Transmission Overloads Mitigation Following Disturbances in Power Systems. IEEE Trans. Ind. Informatics 15(5): 2592-2604 (2019) - [j26]Chunming Tu, Xi He
, Xuan Liu, Zhikang Shuai
, Li Yu:
Resilient and Fast State Estimation for Energy Internet: A Data-Based Approach. IEEE Trans. Ind. Informatics 15(5): 2969-2979 (2019) - [j25]Liang Che, Xuan Liu
, Zhikang Shuai
, Junbo Zhao
:
The Impact of Ramp-Induced Data Attacks on Power System Operational Security. IEEE Trans. Ind. Informatics 15(9): 5064-5075 (2019) - [j24]Liang Che, Xuan Liu
, Yunfeng Wen, Zuyi Li
:
Identification of Cascading Failure Initiated by Hidden Multiple-Branch Contingency. IEEE Trans. Reliab. 68(1): 149-160 (2019) - [j23]Liang Che, Xuan Liu
, Yunfeng Wen
, Zuyi Li
:
A Mixed Integer Programming Model for Evaluating the Hidden Probabilities of N-k Line Contingencies in Smart Grids. IEEE Trans. Smart Grid 10(1): 1036-1045 (2019) - [j22]Liang Che, Xuan Liu
, Zuyi Li
:
Screening Hidden N- $k$ Line Contingencies in Smart Grids Using a Multi-Stage Model. IEEE Trans. Smart Grid 10(2): 1280-1289 (2019) - [j21]Liang Che, Xuan Liu
, Zuyi Li
:
Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme. IEEE Trans. Smart Grid 10(3): 3081-3091 (2019) - [j20]Zhikang Shuai
, Yelun Peng
, Xuan Liu
, Zuyi Li
, Josep M. Guerrero
, Zheng John Shen:
Dynamic Equivalent Modeling for Multi-Microgrid Based on Structure Preservation Method. IEEE Trans. Smart Grid 10(4): 3929-3942 (2019) - [j19]Liang Che, Xuan Liu
, Zuyi Li
:
Fast Screening of High-Risk Lines Under False Data Injection Attacks. IEEE Trans. Smart Grid 10(4): 4003-4014 (2019) - [j18]Zhikang Shuai
, Chao Shen
, Xuan Liu
, Zuyi Li
, Zheng John Shen:
Transient Angle Stability of Virtual Synchronous Generators Using Lyapunov's Direct Method. IEEE Trans. Smart Grid 10(4): 4648-4661 (2019) - [j17]Zhikang Shuai
, Yelun Peng
, Xuan Liu
, Zuyi Li
, Josep M. Guerrero
, Zheng John Shen:
Parameter Stability Region Analysis of Islanded Microgrid Based on Bifurcation Theory. IEEE Trans. Smart Grid 10(6): 6580-6591 (2019) - 2018
- [j16]Chunming Tu, Xi He
, Xuan Liu, Peng Li:
Cyber-Attacks in PMU-Based Power Network and Countermeasures. IEEE Access 6: 65594-65603 (2018) - [j15]Liang Che, Xuan Liu
, Zuyi Li
:
Preventive Mitigation Strategy for the Hidden N-k Line Contingencies in Power Systems. IEEE Trans. Reliab. 67(3): 1060-1070 (2018) - [j14]Yunfeng Wen
, Xiaobin Qu, Wenyuan Li
, Xuan Liu
, Xi Ye:
Synergistic Operation of Electricity and Natural Gas Networks via ADMM. IEEE Trans. Smart Grid 9(5): 4555-4565 (2018) - 2017
- [j13]Xindong Liu, Mohammad Shahidehpour
, Zuyi Li
, Xuan Liu, Yijia Cao, Zhiyi Li:
Power System Risk Assessment in Cyber Attacks Considering the Role of Protection Systems. IEEE Trans. Smart Grid 8(2): 572-580 (2017) - [j12]Xindong Liu, Mohammad Shahidehpour
, Zuyi Li
, Xuan Liu, Yijia Cao, Zhaohong Bie
:
Microgrids for Enhancing the Power Grid Resilience in Extreme Conditions. IEEE Trans. Smart Grid 8(2): 589-597 (2017) - [j11]Xuan Liu, Zuyi Li
:
Trilevel Modeling of Cyber Attacks on Transmission Lines. IEEE Trans. Smart Grid 8(2): 720-729 (2017) - [j10]Xuan Liu
, Zuyi Li
, Zhikang Shuai
, Yunfeng Wen
:
Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution. IEEE Trans. Smart Grid 8(2): 1023-1025 (2017) - [j9]Xindong Liu, Mohammad Shahidehpour
, Yijia Cao, Lei Wu
, Wei Wei
, Xuan Liu:
Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems. IEEE Trans. Smart Grid 8(3): 1330-1339 (2017) - [j8]Xindong Liu, Mohammad Shahidehpour
, Zuyi Li
, Xuan Liu
, Yijia Cao, Wei Tian:
Protection Scheme for Loop-Based Microgrids. IEEE Trans. Smart Grid 8(3): 1340-1349 (2017) - [j7]Xuan Liu, Zhiyi Li, Zuyi Li
:
Optimal Protection Strategy Against False Data Injection Attacks in Power Systems. IEEE Trans. Smart Grid 8(4): 1802-1810 (2017) - [j6]Xuan Liu, Zuyi Li
:
False Data Attacks Against AC State Estimation With Incomplete Network Information. IEEE Trans. Smart Grid 8(5): 2239-2248 (2017) - [j5]Xuan Liu, Zuyi Li
:
Local Topology Attacks in Smart Grids. IEEE Trans. Smart Grid 8(6): 2617-2626 (2017) - 2016
- [j4]Xuan Liu, Zhiyi Li, Xingdong Liu, Zuyi Li
:
Masking Transmission Line Outages via False Data Injection Attacks. IEEE Trans. Inf. Forensics Secur. 11(7): 1592-1602 (2016) - [j3]Hongxing Ye
, Yinyin Ge, Xuan Liu, Zuyi Li
:
Transmission Line Rating Attack in Two-Settlement Electricity Markets. IEEE Trans. Smart Grid 7(3): 1346-1355 (2016) - 2015
- [j2]Xuan Liu, Zhen Bao, Dan Lu, Zuyi Li
:
Modeling of Local False Data Injection Attacks With Reduced Network Information. IEEE Trans. Smart Grid 6(4): 1686-1696 (2015) - [i1]Xuan Liu, Zhiyi Li, Zuyi Li:
Impacts of Bad Data on the PMU based Line Outage Detection. CoRR abs/1502.04236 (2015) - 2014
- [j1]Xuan Liu, Zuyi Li
:
Local Load Redistribution Attacks in Power Systems With Incomplete Network Information. IEEE Trans. Smart Grid 5(4): 1665-1676 (2014) - 2013
- [c1]Xuan Liu, Kui Ren
, Yanling Yuan, Zuyi Li
, Qian Wang
:
Optimal budget deployment strategy against power grid interdiction. INFOCOM 2013: 1160-1168
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-27 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint