Deepa Kundur
#104,755
Most Influential Person Now
Canadian researcher and university professor
Deepa Kundur's AcademicInfluence.com Rankings
Deepa Kundurengineering Degrees
Engineering
#4926
World Rank
#6152
Historical Rank
Applied Physics
#2513
World Rank
#2554
Historical Rank
Download Badge
Engineering
Why Is Deepa Kundur Influential?
(Suggest an Edit or Addition)According to Wikipedia, Deepa Kundur is a professor, researcher at the University of Toronto, Ontario, Canada. She was named Fellow of the Institute of Electrical and Electronics Engineers in 2015 for "contributions to signal processing techniques for multimedia and cybersecurity."
Deepa Kundur's Published Works
Published Works
- Blind image deconvolution (1996) (796)
- Digital watermarking for telltale tamper proofing and authentication (1999) (589)
- Digital watermarking using multiresolution wavelet decomposition (1998) (575)
- Practical Data Hiding in TCP/IP (2002) (305)
- A robust digital image watermarking method using wavelet-based fusion (1997) (303)
- A novel blind deconvolution scheme for image restoration using recursive filtering (1998) (294)
- Video fingerprinting and encryption principles for digital rights management (2004) (248)
- Toward robust logo watermarking using multiresolution image fusion principles (2004) (232)
- Blind image deconvolution revisited (1996) (202)
- Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid (2010) (184)
- Analysis and design of secure watermark-based authentication systems (2006) (136)
- Towards a telltale watermarking technique for tamper-proofing (1998) (129)
- Dual domain watermarking for authentication and compression of cultural heritage images (2004) (128)
- Statistical invisibility for collusion-resistant digital video watermarking (2005) (125)
- Diversity and attack characterization for improved robust watermarking (2001) (124)
- Towards modelling the impact of cyber attacks on a smart grid (2011) (116)
- Robust digital watermarking in the ridgelet domain (2004) (104)
- Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain (2006) (96)
- A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion (1997) (96)
- Practical Internet Steganography : Data Hiding in IP (2003) (94)
- A Cyber-Physical Control Framework for Transient Stability in Smart Grids (2018) (93)
- A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid (2014) (93)
- Hardware implementation perspectives of digital video watermarking algorithms (2003) (93)
- A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid (2013) (89)
- Analysis and design of watermarking algorithms for improved resistance to compression (2004) (82)
- A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems (2016) (81)
- Novel approach to collusion-resistant video watermarking (2002) (80)
- Security and Privacy for Distributed Multimedia Sensor Networks (2008) (71)
- Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed (2015) (66)
- A Flocking-Based Paradigm for Hierarchical Cyber-Physical Smart Grid Modeling and Control (2014) (64)
- Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding (2002) (64)
- Communication and information theory in watermarking: a survey (2001) (63)
- Implementing a real-time cyber-physical system test bed in RTDS and OPNET (2014) (63)
- Impact of cyber attacks on transient stability of smart grids with voltage support devices (2013) (62)
- Denial of service attacks and mitigation for stability in cyber-enabled power grid (2015) (59)
- A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis (2016) (55)
- Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation (2018) (54)
- A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks (2001) (52)
- A Cyber-Enabled Stabilizing Control Scheme for Resilient Smart Grid Systems (2016) (51)
- Improved robust watermarking through attack characterization. (1998) (46)
- A smart grid vulnerability analysis framework for coordinated variable structure switching attacks (2012) (46)
- On Effective Virtual Inertia of Storage-Based Distributed Control for Transient Stability (2019) (41)
- VLSI implementation of a real-time video watermark embedder and detector (2003) (40)
- The choice of watermark domain in the presence of compression (2001) (40)
- Switched system models for coordinated cyber-physical attack construction and simulation (2011) (39)
- A flocking-based dynamical systems paradigm for smart power system analysis (2012) (39)
- Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance (2005) (39)
- Cyber-Physical Attacks Targeting Communication-Assisted Protection Schemes (2020) (38)
- Bloom filter based intrusion detection for smart grid SCADA (2012) (37)
- Special Issue on Enabling Security Technologies for Digital Rights Management (2004) (37)
- Blind image restoration via recursive filtering using deterministic constraints (1996) (37)
- On the Use of Energy Storage Systems and Linear Feedback Optimal Control for Transient Stability (2017) (36)
- Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration (2008) (36)
- Resilient Distributed Real-Time Demand Response via Population Games (2017) (36)
- Implications for high capacity data hiding in the presence of lossy compression (2000) (34)
- Distributed Optimization of Dispatch in Sustainable Generation Systems via Dual Decomposition (2015) (34)
- Watermarking with Diversity: Insights and Implications (2001) (33)
- Financially Motivated FDI on SCED in Real-Time Electricity Markets: Attacks and Mitigation (2019) (33)
- Efficient routing protocols for a free space optical sensor network (2005) (32)
- Towards digital video steganalysis using asymptotic memoryless detection (2007) (31)
- A Novel Bio-Inspired Technique for Rapid Real-Time Generator Coherency Identification (2015) (31)
- Digital Video Watermarking: Techniques, Technology and Trends (2004) (30)
- On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control (2017) (30)
- Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era (2001) (28)
- Digital video steganalysis exploiting collusion sensitivity (2004) (27)
- Two-tier hierarchical cyber-physical security analysis framework for smart grid (2012) (27)
- Improved Digital Watermarking Through Diversity and Attack Characterization (1999) (27)
- Blind Deconvolution of Still Images using Recursive Inverse Filtering (1995) (26)
- Cyber attack detection in PMU measurements via the expectation-maximization algorithm (2014) (25)
- A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances (2015) (24)
- Noise Suppression of Corona Current Measurement From HVdc Transmission Lines (2016) (23)
- A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability (2018) (23)
- A cyber-enabled stabilizing controller for resilient smart grid systems (2015) (22)
- New paradigms for effective multicasting and fingerprinting of entertainment media (2005) (22)
- A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems (2014) (22)
- GOAliE: Goal-Seeking Obstacle and Collision Evasion for Resilient Multicast Routing in Smart Grid (2016) (22)
- Impact analysis of transient stability due to cyber attack on FACTS devices (2013) (21)
- Mismatching perceptual models for effective watermarking in the presence of compression (1999) (21)
- Robust classification of blurred imagery (2000) (20)
- On using energy storage systems in switching attacks that destabilize smart grid systems (2015) (20)
- Distributed privacy for visual sensor networks via Markov shares (2006) (20)
- Attack characterization for effective watermarking (1999) (20)
- Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments (2007) (20)
- Water-filling for watermarking? (2000) (19)
- A class of cyber-physical switching attacks for power system disruption (2011) (19)
- Practical limitations of sliding-mode switching attacks on smart grid systems (2014) (18)
- On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks (2009) (18)
- A flocking-based model for DoS-resilient communication routing in smart grid (2012) (18)
- A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays (2021) (18)
- Network-Aware QoS Routing for Smart Grids Using Software Defined Networks (2016) (17)
- Coordinated variable structure switching attack in the presence of model error and state estimation (2012) (17)
- A systematic approach to delay-adaptive control design for smart grids (2015) (17)
- Distributed actuation attacks in wireless sensor networks: implications and countermeasures (2006) (17)
- Wireless image sensor networks: event acquisition in attack-prone and uncertain environments (2009) (16)
- A Storage-Based Multiagent Regulation Framework for Smart Grid Resilience (2018) (16)
- Blind Image Deconvolution : An Algorithmic Approach to Practical Image Restoration 1 (1996) (15)
- Analysis and design of authentication watermarking (2004) (15)
- Network delay caused by cyber attacks on SVC and its impact on transient stability of smart grids (2014) (15)
- Semi-blind image restoration based on telltale watermarking (1998) (15)
- Coordinated variable structure switching in smart power systems: attacks and mitigation (2012) (15)
- A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems (2007) (15)
- Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks (2006) (15)
- Advances In Peer-To-Peer Content Search (2007) (14)
- OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks (2006) (14)
- Cooperative microgrid networks for remote and rural areas (2015) (14)
- A generalized design framework for IIR digital multiple notch filters (2015) (14)
- Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks (2007) (14)
- Tuning out of phase: Resonance attacks (2015) (14)
- A Game Theoretic Approach to Real-Time Robust Distributed Generation Dispatch (2017) (13)
- On the use of cyber-physical hierarchy for smart grid security and efficient control (2012) (12)
- A Novel Recursive Filtering Method for Blind Image Restoration (1995) (12)
- A Class of Switching Exploits Based on Inter-Area Oscillations (2018) (12)
- Lightweight security principles for distributed multimedia based sensor networks (2004) (12)
- A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication (2009) (12)
- On using distributed energy resources to reshape the dynamics of power systems during transients (2015) (11)
- Visual Sensor Networks (2007) (11)
- A stenographic framework for dual authentication and compression of high resolution imagery (2004) (11)
- Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems (2012) (11)
- Paradigms and performance of distributed cyber-enabled control schemes for the smart grid (2015) (11)
- False Data Injection Attacks Against Synchronization Systems in Microgrids (2021) (11)
- Security-aware routing and localization for a directional mission critical network (2010) (11)
- On privacy and security in distributed visual sensor networks (2008) (11)
- Biologically Inspired Hierarchical Cyber-Physical Multi-agent Distributed Control Framework for Sustainable Smart Grids (2015) (10)
- A multi-flock approach to rapid dynamic generator coherency identification (2013) (10)
- Towards improved connectivity with hybrid uni/omni-directional antennas in wireless sensor networks (2008) (10)
- Distributed Secret Sharing for Discrete Memoryless Networks (2008) (10)
- On Peer-to-Peer Multimedia Content Access and Distribution (2006) (10)
- Grid-independent cooperative microgrid networks with high renewable penetration (2015) (10)
- Novel approach to multispectral blind image fusion (1997) (9)
- A novel evolutionary game theoretic approach to real-time distributed Demand response (2015) (9)
- Real-Time Integration of Intermittent Generation With Voltage Rise Considerations (2017) (9)
- Digital Media Fingerprinting : Techniques and Trends (2004) (9)
- On using distributed control schemes to mitigate switching attacks in smart grids (2015) (8)
- On Cyber-Physical Coupling and Distributed Control in Smart Grids (2019) (8)
- HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing (2006) (8)
- Hierarchical Signal Processing for Tractable Power Flow Management in Electric Grid Networks (2019) (8)
- On the use of Lyapunov criteria to analyze the convergence of blind deconvolution algorithms (1998) (8)
- Statistical Invisibility for Collusion-Resistant (2005) (8)
- Mitigating link insecurities in smart grids via QoS multi-constraint routing (2016) (8)
- Diversity and Attack Characterization for Improved (2001) (8)
- Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems (2019) (8)
- Intelligent Signal Processing and Coordination for the Adaptive Smart Grid: An Overview of Data-Driven Grid Management (2019) (7)
- Fundamentals of Cyber-Physical Systems (2020) (7)
- On the Connectivity of Hierarchical Directional Optical Sensor Networks (2007) (7)
- An evolutionary game approach to predict demand response from real-time pricing (2015) (7)
- Security and Digital Rights Management for Mobile Content (2005) (7)
- Attack vs. failure detection in event-driven wireless visual sensor networks (2007) (7)
- Distributed Keyless Secret Sharing Over Noiseless Channels (2007) (7)
- Fault Detection, Localization, and Mitigation of a Network of Connected Autonomous Vehicles Using Transmissibility Identification (2020) (7)
- Energy allocation for high-capacity watermarking in the presence of compression (2000) (7)
- Reactance perturbation for enhancing detection of FDI attacks in power system state estimation (2017) (7)
- Distributed keyless security for correlated data with applications in visual sensor networks (2007) (6)
- Modeling and Simulation of the Aurora Attack on Microgrid Point of Common Coupling (2019) (6)
- Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007 (2007) (6)
- Performance evaluation of flocking-based distributed cyber-physical control for Smart Grid (2014) (6)
- On the Use of Matroid Theory for Distributed Cyber–Physical-Constrained Generator Scheduling in Smart Grid (2015) (6)
- Hiding-based compression for improved color image coding (2002) (5)
- Secure operating region simplification in dynamic security assessment (2015) (5)
- Projection Based Blind Deconvolution [1]-[3] (1996) (5)
- Output-Only Fault Detection and Mitigation of Networks of Autonomous Vehicles (2020) (5)
- Reliable Scalar-Visual Event-Detection in Wireless Visual Sensor Networks (2008) (5)
- Progressive switching attacks for instigating cascading failures in smart grid (2013) (5)
- On the global asymptotic stability of the NAS-RIF algorithm for blind image restoration (1996) (5)
- Performance of flocking-based control schemes in smart grid applications (2014) (5)
- Secure distributed source coding with side-information (2008) (5)
- A distortion-theoretic perspective for redundant metering security in a smart grid (2012) (5)
- Cybersecurity Enhancement of Transformer Differential Protection Using Machine Learning (2020) (4)
- IEC-61850 GOOSE traffic modeling and generation (2017) (4)
- Online Power Quality Disturbance Classification with Recurrent Neural Network (2018) (4)
- Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach (2019) (4)
- A Secure Cloud Architecture for Data Generated in the Energy Sector (2016) (4)
- A secure integrated routing and localization scheme for broadband mission critical networks (2008) (4)
- Simplified implementation and control of a flywheel energy system for microgrid applications (2017) (4)
- Transform-based hybrid data hiding for improved robustness in the presence of perceptual coding (2001) (4)
- A hypothesis testing approach for achieving semi-fragility in multimedia authentication (2006) (4)
- Distributed demand curtailment via water-filling (2015) (4)
- Towards characterizing the effectiveness of random mobility against actuation attacks (2007) (4)
- Transient Model-Based Detection Scheme for False Data Injection Attacks in Microgrids (2019) (4)
- VECTOR FIELD DESIGN OF SCREW-TYPE CHAOS (2008) (3)
- Enhancing the performance of controlled distributed energy resources in noisy communication environments (2016) (3)
- Frequency-stabilizing control scheme for islanded microgrids (2015) (3)
- Identification of Precision Motion Systems with Prandtl-Ishlinskii Hysteresis Nonlinearities (2018) (3)
- Distributed sustainable generation dispatch via evolutionary games (2015) (3)
- Impact of Cyber Attacks on Data Integrity in Transient Stability Control (2017) (3)
- G-E-M sensor networks for mission critical surveillance in hostile environments (2008) (3)
- A bio-inspired analog scheme for navigational control of lightweight autonomous agents (2008) (3)
- Enhancing Privacy Protection in Multimedia Systems (2009) (3)
- Robustness analysis of feedback linearization distributed control schemes in smart grid systems (2015) (3)
- Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms (2005) (3)
- SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION (2009) (3)
- On the effects of distributed control area design for the stabilization of cyber-enabled smart grids (2015) (3)
- A transient stability control adaptive to measurements uncertainties (2017) (2)
- Trends in Short-Term Renewable and Load Forecasting for Applications in Smart Grid (2016) (2)
- Flocking-based adaptive granular control strategy for autonomous microgrids in emergency situations (2019) (2)
- Secure semi-fragilewatermarking for image authentication (2009) (2)
- Coordination and Selfishness in Attacks on Visual Sensor Networks (2008) (2)
- Privacy-Preserving Homomorphic Masking for Smart Grid Data Analytics in the Cloud (2020) (2)
- Data analytics for cybersecurity enhancement of transformer protection (2021) (2)
- Law, engineering, and DRM lessons learned from the failure of the content scramble system. (2004) (2)
- Three-Phase Radial EMTP and Stealthy Attack Detector for Distribution Systems (2020) (2)
- Fundamental limits on communication latency for distributed control via electromechanical waves (2017) (2)
- Security and Privacy for Distributed Multimedia Sensor Networks In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved. (2008) (2)
- Toward a practical storage-based control scheme for transient stability applications (2017) (2)
- Secure Management and Processing of Metered Data in the Cloud (2016) (2)
- Joint fingerprinting and decryption for multimedia content tracing in wireless networks (2004) (2)
- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel (2009) (2)
- Event-Driven Visual Sensor Networks: Issues in Reliability (2008) (2)
- Performance Metrics for Storage-Based Transient Stability Control (2017) (2)
- Identification of Piezomicropositioning Hammerstein Systems with Generalized Prandtl-Ishlinskii Hysteresis Nonlinearities (2018) (1)
- Distributed power dispatch via bifurcation control (2014) (1)
- Robust Classi cation of Blurred Imagery (2000) (1)
- Smart Grid Communications and Networking: Cyber-attack impact analysis of smart grid (2012) (1)
- Multimedia Sensor Networks (2006) (1)
- Implicit Feedback Deep Collaborative Filtering Product Recommendation System (2020) (1)
- On node isolation in directional sensor networks (2007) (1)
- PERFORMANCE ANALYSIS OF SIGNAL-TO-NOISE RATIO (SNR) ESTIMATES FOR ADDITIVE WHITE GAUSSIAN NOISE (AWGN) AND TIME-SELECTIVE FADING CHANNELS A Thesis by HUSEYIN PEKSEN (2008) (1)
- Communication Links Vulnerability Model for Cyber Security Mitigation (2016) (1)
- Towards cyber-resilient telecontrol commands using software-defined networking (2021) (1)
- Electromagnetic Transients-Based Detection of Data Manipulation Attacks in Three Phase Radial Distribution Networks (2022) (1)
- Investigating the impact of intrusion detection system performance on communication latency and power system stability (2016) (1)
- EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION (2012) (1)
- Implementation of an Offline Co-Simulation Test-Bed for Cyber Security and Control Verification (2016) (1)
- Identification of Hammerstein Systems with Rate-Dependent Hysteresis Nonlinearities in a Class of Smart Material-Based Actuators (2019) (1)
- Deepa Kundur Intelligent Signal Processing and Coordination for the Adaptive Smart Grid (2019) (1)
- Introduction to the Issue on Signal and Information Processing for Critical Infrastructures (2018) (1)
- A novel approach to robust blind classification of remote sensing imagery (1997) (1)
- Towards Preventative Steganalysis in Wireless Visual Sensor Networks (2013) (0)
- Multimedia Fingerprinting (2006) (0)
- Delay in Chaum's Anonymizing Mix Networks (2018) (0)
- On the Use of Safety Critical Control for Cyber-Physical Security in the Smart Grid (2023) (0)
- Control verification via off-line co-simulation (2016) (0)
- Major Subject: Electrical Engineering ROBOTIC LOCALIZATION OF HOSTILE NETWORKED RADIO SOURCES USING A DIRECTIONAL ANTENNA A Thesis by (2005) (0)
- Implementation of a Real-Time Video Watermark Embedder and Detector Nebu (0)
- Wiener Kernel characterization of the electrical properties of nerve axons (1993) (0)
- Special sessions on multimedia security and watermarking applications (2001) (0)
- Cyber-physical strategies for generator coherency in the face of malicious attack (2016) (0)
- ROBUST PHASE SENSITIVE INVERSION RECOVERY IMAGING A Thesis by RAVINDRA MAHENDRAKUMAR GARACH (2005) (0)
- Partition based cascaded generator scheduling with constraints for large power networks (2013) (0)
- Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation (2009) (0)
- Enhanced availability in randomly deployed wireless sensor networks via hybrid uni/omni-directional antennas (2008) (0)
- Visual Sensor Network Processing and Preventative Steganalysis (2012) (0)
- A generalized design framework for IIR digital multiple notch filters (2015) (0)
- Secret Sharing for Discrete Memoryless Networks (2008) (0)
- Preventative steganalysis in wireless visual sensor networks: Challenges and solutions (2011) (0)
- A Probabilistic Approach to Adaptive Protection in the Smart Grid (2023) (0)
- Improving the visual performance of S/DISCUS (2011) (0)
- Directional Link Networks : Enabling Technologies for Multimedia Sensor Networks (2013) (0)
- A User-centric Approach toward Resilient Frequency-regulating Wind Generators (2020) (0)
- Anomaly Detections for CPSs based on Quantitative Dependence Metrics (2018) (0)
- On the Use of Reinforcement Learning for Attacking and Defending Load Frequency Control (2023) (0)
This paper list is powered by the following services:
Other Resources About Deepa Kundur
What Schools Are Affiliated With Deepa Kundur?
Deepa Kundur is affiliated with the following schools: