Skip to main content

Research Repository

Advanced Search

Outputs (4)

Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions (2023)
Journal Article
Cao, Y., Li, S., Lv, C., Wang, D., Sun, H., Jiang, J., Meng, F., Xu, L., & Cheng, X. (2023). Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions. Renewable and Sustainable Energy Reviews, 183, Article 113401. https://doi.org/10.1016/j.rser.2023.113401

In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon tran... Read More about Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions.

Calculating the Maximum Penetration of Electric Vehicles in Distribution Networks with Renewable Energy and V2G (2023)
Presentation / Conference Contribution
Thomas, H., Sun, H., & Kazemtabrizi, B. (2023, March). Calculating the Maximum Penetration of Electric Vehicles in Distribution Networks with Renewable Energy and V2G. Presented at ISGT ME 2023, Abu Dhabi, UAE

The uptake of electric vehicles and distributed energy generation is adding significant new demand to distribution networks, however it is unknown whether this can be accommodated by existing infrastructure. This paper first presents an Optimisation... Read More about Calculating the Maximum Penetration of Electric Vehicles in Distribution Networks with Renewable Energy and V2G.

Concurrent Spoofing-Jamming Attack in Massive MIMO Systems with a Full-Duplex Multi-Antenna Eavesdropper (2023)
Journal Article
Alageli, M., Ikhlef, A., & Chambers, J. (2023). Concurrent Spoofing-Jamming Attack in Massive MIMO Systems with a Full-Duplex Multi-Antenna Eavesdropper. IEEE Transactions on Vehicular Technology, 72(8), 10534 - 10547. https://doi.org/10.1109/tvt.2023.3262002

In this paper, we evaluate the ultimate severity of a concurrent spoofing-jamming un-detected attack from a fullduplex (FD) multi-antenna eavesdropper (EV) on a legitimate user equipment (UE) in a massive multiple-input multipleoutput (MIMO) system.... Read More about Concurrent Spoofing-Jamming Attack in Massive MIMO Systems with a Full-Duplex Multi-Antenna Eavesdropper.

Regularity and Continuity properties of the sub-Riemannian exponential map (2023)
Journal Article
Borza, S., & Klingenberg, W. (2023). Regularity and Continuity properties of the sub-Riemannian exponential map. Journal of Dynamical and Control Systems, 29(4), 1385-1407. https://doi.org/10.1007/s10883-022-09624-y

We prove a version of Warner’s regularity and continuity properties for the sub-Riemannian exponential map. The regularity property is established by considering sub-Riemannian Jacobi fields while the continuity property follows from studying the Mas... Read More about Regularity and Continuity properties of the sub-Riemannian exponential map.