Publications

Journals and Magazines

 

[15] H. Lee, J. Hong, and D. Coats, "Machine Learning Integrated Anomaly Detection System for Electric Vehicle Charging Station," IEEE Transactions on Power Delivery, preparation.

[14] J. Hong, H. Lee, and R. Nuqui, "Cybersecurity of Inter-Station Communications for Line-Commutated Converters (LCC) HVDC Station," IEEE Access 2020, preparation. 

[13] J. Hong, T.-J. Song, and H. Lee, "Automated Cybersecurity Tester for IEC 61850 Based Digital Substations," IEEE Access 2020, under review.

[12] J. Hong, R. Karnati, C.-W. Ten, S. Lee, and S. Choi, "Implementation of Secure Sampled Value (SeSV) Messages in Substation Automation System," IEEE Transactions on Power Delivery 2020, under review.

[11] R. Zhu, C.-C. Liu, J. Hong, and J. Wang, "Substation-Based Intrusion Detection against Cyber Attacks on Measurements," IEEE Transactions on Power Delivery 2020, under review.

[10] I.-S. Choi, T.-H. Han, J. Hong, H.-S. Kim, and S.-J. Lee, "Study on Application of Conservation Voltage Reduction to BESS for Emergency Generation," IEEE Access 2020, preparation.

[9] J. Hong, D. Ishchenko, and A. Kondabathini, "Resilient Self-Healing Microgrids with IEC 61850 Based Communications," IEEE Trans. Industrial Informatics, 2020, under review.

[8] I.-S. Choi, J. Hong, and T.-W. Kim, "Multi-agent based Cyber Attack Detection and Mitigation for Distribution Automation System," IEEE Access 2020. (Link)

[7] J. Wang, G. Constante, C. Moya, and J. Hong, “A Semantic Analysis Framework for Protecting the Power Grid Against Monitoring-Control Attacks,” IET Cyber-Physical Systems: Theory & Applications, Nov. 2019 (Link).

[6] J. Hong, R. Nuqui, A. Kondabathini, D. Ishchenko, and A. Martin, “Cyber Attack Resilient Protection and Control for Digital Substations,” IEEE Trans. Industrial Informatics, vol. 15, no. 7, pp. 4332-4341, July 2019. (Link)

[5] J. Hong and C.-C. Liu, “Intelligent Electronic Devices (IEDs) with Collaborative Intrusion Detection Systems,” IEEE Trans. Smart Grid, vol. 10, no. 1, pp. 271-281, Jan. 2019. (Link)
[4] Y. Chen, J. Hong, and C.-C. Liu, “Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations,” IEEE Trans. Smart Grid, vol. 9, no. 4, pp. 2541-2552, Aug. 2018. (Link)
[3] J. Hong, C.-C. Liu, and M. Govindarasu, “Integrated Anomaly Detection for Cyber Security of the Substations,” IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1643-1653, April 2014. (Link)
[2] C.-C. Liu, A. Stefanov, J. Hong, and P. Panciatici, “Intruders in the Grid,” IEEE Power and Energy Magazine, vol. 10, no. 1, pp. 58-66, Jan.-Feb. 2012. (Link)
[1] C.-W. Ten, J. Hong, and C.-C. Liu, “Anomaly Detection for Cybersecurity of the Substations,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011. (Link)

Conference Proceedings

 

[16] H. Lee, R. Nuqui, and J. Hong, "A Statistical Hypothesis-Based Correlation Coefficient Technique for Intrusion Detection and Sensor Failure Diagnosis in AC Filter Banks," IEEE PES GM 2021.

[15] R. Zhu, J. Hong, C.-C. Liu, and J. Wang, "Cyber System Recovery for IEC 61850 Substations," IEEE PES ISGT 2020.

[14] J. Hong, C.-C. Liu, and S. Choi, “Cyber Attack Resilient Intelligent Electronic Devices (IEDs) in Digital Substations,” CIGRE D2 Colloquium 2019. (Link)
[13] R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, “A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems,” ResWeek 2018 Symposium, Aug. 2018. (Link)
[12] R. Nuqui, J. Hong, D. Coats, A. Kondabathini, and D. Ishchenko, “A Domain-Based Cyber Security for Protective Relay Settings in Electric Power Systems,” PAC World Americas, Aug. 2018. (Link)
[11] D. Ishchenko, A. Kondabathini, J. Hong, A. Brissette and M. Cintuglu, “Nested Microgrids for Increased Grid Resiliency,” PAC World Americas, Aug. 2018. (Link)
[10] J. Hong, A. Kondabathini, and D. Ishchenko, “Integration of Distributed Energy Resources (DERs) in Microgrids with IEC 61850 Interface,” 7th International Conference on Advanced Power System Automation and Protection (APAP2017), Oct. 2017. (Link)
[9] A.-K. Martin, R. Nuqui, J. Hong, A. Kondabathini, W. Reese, and D. Ishchenko, “A Collaborative Defense System of Protection Devices against Cyber Attacks,” 43rd Western Protective Relay Conference, Oct. 2016. (Link)
[8] C. Sun, J. Hong, and C.-C. Liu, “A Coordinated Cyber Attack Detection System (CCADS) for Multiple Substations,” 19th Power Systems Computation Conference (PSCC 2016), June 2016. (Link)
[7] C. Sun, J. Hong, and C.-C. Liu, “A Co-Simulation Environment for Integrated Cyber and Power Systems,” IEEE Smartgridcomm conference, Nov. 2015. (Link)
[6] J. Hong, R. Nuqui, D. Ishchenko, Z. Wang, T. Cui, A. Kondabathini, D. Coats, and S. Kunsman, “Cyber-Physical Security Test Bed: A Platform for Enabling Collaborative Cyber Defense Methods,” PAC World Americas, Sep. 2015. (Link)
[5] J. Hong, and C.-C. Liu, “Cyber Intrusion Detection for IEC 61850 Based Multicast Messages in a Substation,” Power and Energy Automation Conference (PEAC) Conference, March 2014. (Link)
[4] J. Hong, C.-C. Liu, and M. Govindarasu, “Detection of Cyber Intrusions Using Network-based Multicast Messages for Substation Automation,” IEEE Innovative Smart Grid Technologies (ISGT) Conference, Feb. 2014. (Link)

[3] J. Hong and C.-C. Liu, “Cyber-Physical Security of a Power Grid Based on Events at Substations,” The 12th International Workshop on Electric Power Control Centers (EPCC), June 2013. (Link)
[2] J. Hong, A. Stefanov, C.-C. Liu, and M. Govindarasu, “Cyber-Physical Security in a Substation,” IEEE Power & Energy Society General Meeting, July 2012. (Link)
[1] J. Hong, S.-S. Wu, A. Stefanov, A. Fshosha, C.-C. Liu, P. Gladyshev, and M. Govindarasu, “An Intrusion and Defense Testbed in a Cyber-Power System Environment,” IEEE Power & Energy Society General Meeting, July 2011. (Link)

Book Chapters


[2] C.-C. Liu, A. Stefanov, and J. Hong, “Artificial Intelligence and Computational Intelligence: A Challenge for Power System Engineers,” in Advanced Solutions in Power Systems: HVDC, FACTS, and Artificial Intelligence Techniques, M. Eremia (Editor), IEEE, 2016. (Link)
[1] J. Hong, Y. Chen, C.-C. Liu, and M. Govindarasu, “Cyber-Physical Security of Substations in a Power Grid,” in Cyber Physical Systems Approach to Smart Electric Power Grid, S.-K. Khaitan (Editor), Springer-Verlag Inc, 2015. (Link)

Patents


[12] J. Hong, and Z. Wang, “Distributed Energy Resource Registration,” international application number (16/427,739), first filed on 5/31/2019.
[11] J. Hong, H. Lee and R. Nuqui, “Real-time Intrusion Detection System for EtherCAT in Energy Delivery System,” international application number (62/779,692), first filed on 12/14/2018.
[10] J. Hong, Z. Wang and H. Lee, “Technologies for Detecting Abnormal Activities in an Electric Vehicle Charging Station,” international application number (16/197,399), first filed on 11/21/2018, application on 5/21/2020 (US20200162487A1). (Link)
[9] J. Hong, D. Ishchenko and R. Nuqui, “Decentralized False Data Mitigation for Nested Microgrids,” international application number (16/147,979), first filed on 10/1/2018, application on 4/2/2020 (US20200106301A1) (Link).
[8] R. Nuqui, J. Hong and D. Coats, “Technologies for Detecting Cyber-Attacks against Electrical Distribution Devices,” international application number (15/963,850), first filed on 4/26/2018, application on 10/31/2019 (US20190334932A1). (Link)
[7] J. Hong and A. Knodabathini and D. Ishchenko, “Reconfigurable Extended Communication Interface Devices for Monitoring and Control of Power System Devices,” international application number (15/783,864), first filed on 10/16/2017, application on 4/14/2019 (US 20190116245A1), patent on 9/10/2019 (10,412,200). (Link)
[6] D. Ishchenko, J. Hong, A. Knodabathini, A. Mondal, “Power Restoration in Nested Microgrids,” international application number (15/665,657), first filed on 8/1/2017, application on 11/1/2018 (US 20180316188A1). (Link)
[5] A. Knodabathini, J. Hong and and D. Ishchenko, “Fault Detection and Location in Nested Microgrid,” international application number (15/655,378), first filed on 7/21/2017, application on 11/1/2018 (US 20180316184A1). (Link)
[4] J. Hong and A. Knodabathini and D. Ishchenko, “Nested Microgrid Control System,” international application number (62/492,680), first filed on 5/1/2017, application on 11/8/2018 (WO2018204160A1). (Link)
[3] J. Hong and K. Shin, “Method and System for Hardware Tamper Detection and Mitigation for Solid State Circuit Breaker and its Controller,” international application number (15/605,039), first filed on 5/25/2017, application on 11/29/2018 (US20180342360A1). (Link)

[2] J. Hong and R. Nuqui, “System and Method for Detecting False Data Injection in Electrical Substations,” international application number (15/386,339), first filed on 12/20/2016, application on 06/11/2018 (US20180176249A1), patent on 5/28/2019 (10,305,932). (Link)
[1] J. Hong and R. Nuqui, “Securing Against Malicious Control of Circuit Breakers in Electrical Substations,” international application number (14/958,570), first filed on 12/03/2015, application on 06/08/2017 (US20170163029A1), patent on 9/18/2018 (10,079,486). (Link)