-
Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet
Authors:
Kelsey Nelson,
Javad Mohammadi,
Yu Chen,
Erik Blasch,
Alex Aved,
David Ferris,
Erika Ardiles Cruz,
Philip Morrone
Abstract:
Electric vehicles (EVs) are becoming more popular within the United States, making up an increasingly large portion of the US's electricity consumption. Hence, there is much attention has been directed on how to manage EVs within the power sector. A well-investigated strategy for managing the increase in electricity demand from EV charging is aggregation, which allows for an intermediary to manage…
▽ More
Electric vehicles (EVs) are becoming more popular within the United States, making up an increasingly large portion of the US's electricity consumption. Hence, there is much attention has been directed on how to manage EVs within the power sector. A well-investigated strategy for managing the increase in electricity demand from EV charging is aggregation, which allows for an intermediary to manage electricity flow between EV owners and their utilities. When implemented effectively, EV aggregation provides key benefits to power grids by relieving electrical loads.. These benefits are aggregation's ability to shift EV loads to peak shave, which often leads to lower emissions, electricity generation prices, and consumer costs depending on the penetration levels of non-dispatchable electricity sources. This review seeks to appropriately highlight the broad vulnerabilities of EV aggregation alongside its benefits, namely those regarding battery degradation, rebound peaks, and cybersecurity. The holistic overview of EV aggregation provides comparisons that balance expectations with realistic performance.
△ Less
Submitted 27 October, 2023; v1 submitted 25 October, 2023;
originally announced October 2023.
-
DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication
Authors:
Deeraj Nagothu,
Ronghua Xu,
Yu Chen,
Erik Blasch,
Alexander Aved
Abstract:
Advancements in generative models, like Deepfake allows users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust. This article presents DeFakePro, a decentralized consensus mechanism-based Deepfake detection technique in online video conferencing tools. Leveraging Electrical N…
▽ More
Advancements in generative models, like Deepfake allows users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust. This article presents DeFakePro, a decentralized consensus mechanism-based Deepfake detection technique in online video conferencing tools. Leveraging Electrical Network Frequency (ENF), an environmental fingerprint embedded in digital media recording, affords a consensus mechanism design called Proof-of-ENF (PoENF) algorithm. The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools. By utilizing the video conferencing setup with malicious participants to broadcast deep fake video recordings to other participants, the DeFakePro system verifies the authenticity of the incoming media in both audio and video channels.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries
Authors:
Seyed Yahya Nikouei,
Yu Chen,
Alexander Aved,
Erik Blasch
Abstract:
Situation AWareness (SAW) is essential for many mission critical applications. However, SAW is very challenging when trying to immediately identify objects of interest or zoom in on suspicious activities from thousands of video frames. This work aims at develo** a queryable system to instantly select interesting content. While face recognition technology is mature, in many scenarios like public…
▽ More
Situation AWareness (SAW) is essential for many mission critical applications. However, SAW is very challenging when trying to immediately identify objects of interest or zoom in on suspicious activities from thousands of video frames. This work aims at develo** a queryable system to instantly select interesting content. While face recognition technology is mature, in many scenarios like public safety monitoring, the features of objects of interest may be much more complicated than face features. In addition, human operators may not be always able to provide a descriptive, simple, and accurate query. Actually, it is more often that there are only rough, general descriptions of certain suspicious objects or accidents. This paper proposes an Interactive Video Surveillance as an Edge service (I-ViSE) based on unsupervised feature queries. Adopting unsupervised methods that do not reveal any private information, the I-ViSE scheme utilizes general features of a human body and color of clothes. An I-ViSE prototype is built following the edge-fog computing paradigm and the experimental results verified the I-ViSE scheme meets the design goal of scene recognition in less than two seconds.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.