top of page

Publications

Journals and Magazines

[25] J. Ha, J. P. Ram, Y.-J. Kim, and J. Hong, "Data-Driven Two-Stage Fault Detection and Diagnosis Method for Photovoltaic Power Generation," IEEE Transactions on Instrumentation & Measurement, 2024.

[24] A. Zaboli, J. Kwon, J. Moore, and J. Hong"A Survey on Cyber-Physical Security of Autonomous Vehicles Using a Context Awareness Method," accepted IEEE ACCESS, 2023. (Link)

[23] S. Lee, J. Hong, L. Liu, and W. Choi, "TS-Fastformer: Fast Transformer for Time-Series Forecasting," ACM Transactions on Intelligent Systems and Technology, 2023. (Link)

[22] A.-A. Amin, J. Hong, V.-H. Bui, and W. Su, "Emerging 6G/B6G Wireless Communication for the Power Infrastructure in Smart Cities: Innovations, Challenges, and Future Perspectives," Algorithms 2023, 16(10). (Link)

[21] A. Zaboli, V. Doan, Y.-H. Kim, J. Hong, and W. Su, "An LSTM-SAE-based Behind-the-Meter Load Forecasting Method," IEEE ACCESS, vol. 11, 2023.  (Link)

[20] D.-H. Ryu, S.-Y. Jeon, J. Hong, and M.-K. Lee, "Efficient Lp Distance Computation using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection," Sensors 2023, 23(8), 4169. (Link)

[19] M. Girdhar, J. Hong, and J. Moore, "Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models," IEEE Open Journal of Vehicular Technology, Vol. 4, pp. 417-437, 2023. (Link)

[18] S. GhoshA. Zaboli, J. Hong, and J. Kwon "An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System," IEEE Access, vol. 11, 2023. (Link)

[17] J. Hong, R. Karnati, C.-W. Ten, S. Lee, and S. Choi, "Implementation of Secure Sampled Value (SeSV) Messages in Substation Automation System," IEEE Transactions on Power Delivery, vol. 37, no. 1, 2022. (Link)

[16] M. Girdhar, J. Hong, H. Lee, and T.-J. Song, "Hidden Markov Models based Anomaly Correlations for the Cyber-Physical Security of EV Charging Stations," IEEE Trans. Smart Grid, vo. 13, no. 5, 2022. (Link)

[15] M. Girdhar, Y. Yoo, T.-J. Song, S. Ghosh, and J. Hong, "Post-Accident Cyberattack Event Analysis for Connected and Automated Vehicles," IEEE Access, vol. 10, 2022. (Link)

[14] J. Hong, T.-J. Song, H. Lee, and A. Zaboli, "Automated Cybersecurity Tester for IEC61850 Based Digital Substations," Energies 2022, 15(21), 7833.  (Link)

[13] J. Hong, Y.-H. Kim,  N.-N. H., J. Kwon, and H. Lee, "Deep-Learning Based Post-Event Analysis in Power Systems," Energies 2022, 15(15), 5539. (Link)

[12] T.-J. Song, Y. Yoo, M.-J. Cho, and J. Hong, "Designing a Comprehensive Cyber Security System under Connected and Automated E-Mobility Network Environment," Journal of Korean Society of Transportation (JKST), vol. 39, no. 4, pp. 493-515, 2021. (Link).

[11] H.-S. Kim, J. Hong, and I.-S. Choi, "Implementation of Distributed Autonomous Control Based Battery Energy Storage System (BESS) for Frequency Regulation," Energies 2021, 14(9), 2672. (Link)

[10] J. Hong, D. Ishchenko, and A. Kondabathini, "Resilient Self-Healing Microgrids with IEC 61850 Based Communications," Energies 2021, 14(3), 547. (Link)

[9] R. Zhu, C.-C. Liu, J. Hong, and J. Wang, "Intrusion Detection against MMS-based Measurement Attacks at Digital Substations," IEEE Access, vol. 9, 2020. (Link)

[8] I.-S. Choi, J. Hong, and T.-W. Kim, "Multi-agent based Cyber Attack Detection and Mitigation for Distribution Automation System," IEEE Access 2020. (Link)

[7] J. Wang, G. Constante, C. Moya, and J. Hong, “A Semantic Analysis Framework for Protecting the Power Grid Against Monitoring-Control Attacks,” IET Cyber-Physical Systems: Theory & Applications, Nov. 2019 (Link).

[6] J. Hong, R. Nuqui, A. Kondabathini, D. Ishchenko, and A. Martin, “Cyber Attack Resilient Protection and Control for Digital Substations,” IEEE Trans. Industrial Informatics, vol. 15, no. 7, pp. 4332-4341, July 2019. (Link)

[5] J. Hong and C.-C. Liu, “Intelligent Electronic Devices (IEDs) with Collaborative Intrusion Detection Systems,” IEEE Trans. Smart Grid, vol. 10, no. 1, pp. 271-281, Jan. 2019. (Link)
[4] Y. Chen, J. Hong, and C.-C. Liu, “Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations,” IEEE Trans. Smart Grid, vol. 9, no. 4, pp. 2541-2552, Aug. 2018. (Link)
[3] J. Hong, C.-C. Liu, and M. Govindarasu, “Integrated Anomaly Detection for Cyber Security of the Substations,” IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1643-1653, April 2014. (Link)
[2] C.-C. Liu, A. Stefanov, J. Hong, and P. Panciatici, “Intruders in the Grid,” IEEE Power and Energy Magazine, vol. 10, no. 1, pp. 58-66, Jan.-Feb. 2012. (Link)
[1] C.-W. Ten, J. Hong, and C.-C. Liu, “Anomaly Detection for Cybersecurity of the Substations,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011. (Link)

Conference Proceedings

[29] S. GhoshA. Zaboli, J. Hong, and J. Kwon "Object-focused Risk Evaluation of AI-driven Perception Systems in Autonomous Vehicles," 2024 IEEE Transportation Electrification Conference & Expo.

[28] A. Zaboli, S.-L. Choi, T.-J. Song, and J. Hong, "ChatGPT and other Large Language Models for Cybersecurity of Smart Grid Applications," IEEE Power & Energy Society General Meeting 2024. (Link)

[27] V.-H. Bui, A. Hussain, A. Li, S. Zarrabian, J. Hong, and W. Su, "Optimizing Islanded Microgrid Reliability with
Demand Response-Driven Uncertainty Compensation," IEEE Power & Energy Society General Meeting 2024.

[26] K. Park, J. Hong, W. Su, and H. Lee, "Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System," IEEE Power & Energy Society General Meeting 2024. (Link)

[25] M. Girdhar, J. Hong, W. Su, A. Herath, and C.-C. Liu, "SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in Smart Grid," IEEE Power & Energy Society General Meeting 2024. (Link)

[24] H.-J. Lee, R. Nuqui, and J. Hong, "Cyber Intrusion Detection and Sensor Failure Diagnosis using Statistical Hypothesis-Based Correlation: Application to FACTS AC Filter Banks," 2024 IEEE/PES Transmission and Distribution Conference and Exposition (T&D).

[23] N. Kim, M. Won, T.-J. Song, and J. Hong, "Spatial Heterogeneity of Horizontal and Vertical Demand Supply Equity on Public Transit," Transportation Research Board  Annual Meeting 2024.

[22] K, Kim, S, Kwon, T.-J. Song, and J. Hong, "Implementation of E-Scooter Driving Simulator Environment Based on Driver’s Acceptability," Transportation Research Board  Annual Meeting 2024.

[21] M. Girdhar, Yongsik You, Tai-Jin Song, and J. Hong, "Anomaly Detection for Connected and Automated Vehicles: Accident Analysis," 2023 IEEE Transportation Electrification Conference & Expo. (Link)

[20] S. Bhattacharya, M. Govindarasu, M. Girdhar, and J. Hong, "A Quantitative Methodology for Attack-Defense Analysis of EV Charging Infrastructure," IEEE Power & Energy Society General Meeting 2023. (Link)

[19] A. Zaboli, J. Hong, V.-T. Doan, and Y. Kim, "A Machine Learning-based Short-term Load Forecasting Method for Behind-the-meter DERs," IEEE Power & Energy Society General Meeting 2023. (Link)

[18] M. Girdhar, J. Hong, Y. Yoo, T.-J. Song, and M. Govindarasu, "Cyber-Attack Event Analysis for EV Charging Stations," IEEE Power & Energy Society General Meeting 2023. (Link)

[17] M. Girdhar, J. Hong, H. Lee, and T.-j. Song, "Supervised Machine Learning for the Cybersecurity of EV Charging Stations," IEEE Power & Energy Society General Meeting 2022. (Link)

[16] M. Girdhar, R. Karnati, J. Hong, S. Lee, and S. Choi, "Cybersecurity of Process Bus network in Digital Substations," International Conference on Electronics, Information, and Communication (ICEIC) 2021. (Link)

[15] R. Zhu, J. Hong, C.-C. Liu, and J. Wang, "Cyber System Recovery for IEC 61850 Substations," IEEE PES ISGT 2021. (Link)

[14] J. Hong, C.-C. Liu, and S. Choi, “Cyber Attack Resilient Intelligent Electronic Devices (IEDs) in Digital Substations,” CIGRE D2 Colloquium 2019. (Link)
[13] R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, “A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems,” ResWeek 2018 Symposium, Aug. 2018. (Link)
[12] R. Nuqui, J. Hong, D. Coats, A. Kondabathini, and D. Ishchenko, “A Domain-Based Cyber Security for Protective Relay Settings in Electric Power Systems,” PAC World Americas, Aug. 2018. (Link)
[11] D. Ishchenko, A. Kondabathini, J. Hong, A. Brissette and M. Cintuglu, “Nested Microgrids for Increased Grid Resiliency,” PAC World Americas, Aug. 2018. (Link)
[10] J. Hong, A. Kondabathini, and D. Ishchenko, “Integration of Distributed Energy Resources (DERs) in Microgrids with IEC 61850 Interface,” 7th International Conference on Advanced Power System Automation and Protection (APAP2017), Oct. 2017. (Link)
[9] A.-K. Martin, R. Nuqui, J. Hong, A. Kondabathini, W. Reese, and D. Ishchenko, “A Collaborative Defense System of Protection Devices against Cyber Attacks,” 43rd Western Protective Relay Conference, Oct. 2016. (Link)
[8] C. Sun, J. Hong, and C.-C. Liu, “A Coordinated Cyber Attack Detection System (CCADS) for Multiple Substations,” 19th Power Systems Computation Conference (PSCC 2016), June 2016. (Link)
[7] C. Sun, J. Hong, and C.-C. Liu, “A Co-Simulation Environment for Integrated Cyber and Power Systems,” IEEE Smartgridcomm conference, Nov. 2015. (Link)
[6] J. Hong, R. Nuqui, D. Ishchenko, Z. Wang, T. Cui, A. Kondabathini, D. Coats, and S. Kunsman, “Cyber-Physical Security Test Bed: A Platform for Enabling Collaborative Cyber Defense Methods,” PAC World Americas, Sep. 2015. (Link)
[5] J. Hong, and C.-C. Liu, “Cyber Intrusion Detection for IEC 61850 Based Multicast Messages in a Substation,” Power and Energy Automation Conference (PEAC) Conference, March 2014. (Link)
[4] J. Hong, C.-C. Liu, and M. Govindarasu, “Detection of Cyber Intrusions Using Network-based Multicast Messages for Substation Automation,” IEEE Innovative Smart Grid Technologies (ISGT) Conference, Feb. 2014. (Link)

[3] J. Hong and C.-C. Liu, “Cyber-Physical Security of a Power Grid Based on Events at Substations,” The 12th International Workshop on Electric Power Control Centers (EPCC), June 2013. (Link)
[2] J. Hong, A. Stefanov, C.-C. Liu, and M. Govindarasu, “Cyber-Physical Security in a Substation,” IEEE Power & Energy Society General Meeting, July 2012. (Link)
[1] J. Hong, S.-S. Wu, A. Stefanov, A. Fshosha, C.-C. Liu, P. Gladyshev, and M. Govindarasu, “An Intrusion and Defense Testbed in a Cyber-Power System Environment,” IEEE Power & Energy Society General Meeting, July 2011. (Link)

Book Chapters

[4] H.S. Kim, J. Hong, and S.J. Lee, "Robust Cyber Infrastructure for Cyber Attack Enabling Resilient Distribution System," in Resiliency of Power Distribution Systems, 2024.

[3] J. Hong and Y.H. Kim, "Machine learning techniques for power system application: fault analysis," in Power System Protection in Future Smart Grids, 2023. 

[2] C.-C. Liu, A. Stefanov, and J. Hong, “Artificial Intelligence and Computational Intelligence: A Challenge for Power System Engineers,” in Advanced Solutions in Power Systems: HVDC, FACTS, and Artificial Intelligence Techniques, M. Eremia (Editor), IEEE, 2016. (Link)
[1] J. Hong, Y. Chen, C.-C. Liu, and M. Govindarasu, “Cyber-Physical Security of Substations in a Power Grid,” in Cyber Physical Systems Approach to Smart Electric Power Grid, S.-K. Khaitan (Editor), Springer-Verlag Inc, 2015. (Link)

Technical Publications

[2] “Electric Power Utilities’ Cybersecurity for Contingency Operations," CIGRE WG D2.50, June 2021. (Link)

[1] “Decision Support Tools for System Resiliency and Restoration: System Restoration Navigator (SRN) and Optimal Blackstart Capability (OBC) Tools for System Restoration Planning and Operations," EPRI, Dec. 2015. (Link)

Patents

[14] T.-J. Song, J. Hong, Y.-S. Yoo, and M. Girdhar, "Method and Apparatus for Obtaining Data on Accidents of

Connected and Automated Vehicles Using Probability-based Anomaly Detection," first filed on 11/17/2023.

[13] J. Hong, J. Kwon, A. Zaboli, S. Ghosh, and J. Moore, "A Robust Machine Learning Framework and Data Classification System," first filed on 4/8/2022.

[12] J. Hong, and Z. Wang, “Distributed Energy Resource Registration,” international application number (16/427,739), first filed on 5/31/2019, application on 12/3/2020 (US20200381940A1). (Link)
[11] J. Hong, H. Lee and R. Nuqui, “Real-time Intrusion Detection System for EtherCAT in Energy Delivery System,” international application number (62/779,692), first filed on 12/14/2018.
[10] J. Hong, Z. Wang and H. Lee, “Technologies for Detecting Abnormal Activities in an Electric Vehicle Charging Station,” international application number (16/197,399), first filed on 11/21/2018, application on 5/21/2020 (US20200162487A1). (Link)
[9] J. Hong, D. Ishchenko and R. Nuqui, “Decentralized False Data Mitigation for Nested Microgrids,” international application number (16/147,979), first filed on 10/1/2018, application on 4/2/2020 (US20200106301A1) (Link).
[8] R. Nuqui, J. Hong and D. Coats, “Technologies for Detecting Cyber-Attacks against Electrical Distribution Devices,” international application number (15/963,850), first filed on 4/26/2018, application on 10/31/2019 (US20190334932A1). (Link)
[7] J. Hong and A. Knodabathini and D. Ishchenko, “Reconfigurable Extended Communication Interface Devices for Monitoring and Control of Power System Devices,” international application number (15/783,864), first filed on 10/16/2017, application on 4/14/2019 (US 20190116245A1), patent on 9/10/2019 (10,412,200). (Link)
[6] D. Ishchenko, J. Hong, A. Knodabathini, A. Mondal, “Power Restoration in Nested Microgrids,” international application number (15/665,657), first filed on 8/1/2017, application on 11/1/2018 (US 20180316188A1). (Link)
[5] A. Knodabathini, J. Hong and and D. Ishchenko, “Fault Detection and Location in Nested Microgrid,” international application number (15/655,378), first filed on 7/21/2017, application on 11/1/2018 (US 20180316184A1). (Link)
[4] J. Hong and A. Knodabathini and D. Ishchenko, “Nested Microgrid Control System,” international application number (62/492,680), first filed on 5/1/2017, application on 11/8/2018 (WO2018204160A1). (Link)
[3] J. Hong and K. Shin, “Method and System for Hardware Tamper Detection and Mitigation for Solid State Circuit Breaker and its Controller,” international application number (15/605,039), first filed on 5/25/2017, application on 11/29/2018 (US20180342360A1), patent on 9/15/2020 (10,777,376). (Link)

[2] J. Hong and R. Nuqui, “System and Method for Detecting False Data Injection in Electrical Substations,” international application number (15/386,339), first filed on 12/20/2016, application on 06/11/2018 (US20180176249A1), patent on 5/28/2019 (10,305,932). (Link)
[1] J. Hong and R. Nuqui, “Securing Against Malicious Control of Circuit Breakers in Electrical Substations,” international application number (14/958,570), first filed on 12/03/2015, application on 06/08/2017 (US20170163029A1), patent on 9/18/2018 (10,079,486). (Link)

bottom of page