Professional Documents
Culture Documents
Abstract—This paper considers a cooperative and adversar- better robustness (by removing the single point-of-failure) and
ial AC microgrid system consisting of cooperative leaders and solution scalability. These control techniques map inverters to
inverters, as well as adversarial attackers. The attackers aim to nodes on a sparse communication digraph, and assure that
destabilize the synchronization dynamics of the AC microgrid
by first intercepting the communication channels, penetrating all nodes reach an agreement on quantities of interests issued
the local state feedback, and pretending to be a cooperative by leader nodes (synchronization). In particular, consensus
neighbor, and then initiating malicious attacks by launching (synchronization with one leader) and containment (synchro-
unbounded injections. A fully distributed resilient control frame- nization with two leaders) control protocols are used to achieve
work is offered for the secondary frequency regulation and frequency regulation and voltage containment, respectively,
voltage containment to ensure system stability and preserve
bounded synchronization. In particular, a virtual resilient layer by using the local relative information exchanged among
with hidden networks is developed to integrate with the original neighboring inverters. However, their distributed nature could
cyber-physical layer. The proposed resilient control framework potentially make microgrids vulnerable to malicious attacks
is fully distributed without requiring any global information. A and infiltration, since each inverter only has access to its local
modified IEEE 34-bus test feeder benchmark system is emu- data and neighbors partial data, missing a global perspective.
lated in a controller/hardware-in-the-loop environment, where
the control objectives are met under different attack scenarios. There are generally two main approaches to address cyber
attacks in power grids. The first group of techniques [12]–[19],
Index Terms—AC microgrids, containment, inverters, synchro- first detect and identify the compromised agents, and then cor-
nization, resilient control, unbounded attacks.
rect or simply isolate them. Attack-correction methods usually
have strict restrictions on the number of misbehaving agents.
I. I NTRODUCTION For example, it is shown in [20], [21] that it is impractical
to restore the system state if more than half of the sensors
ICROGRIDS are evolving into cyber-physical systems
M with the large-volume adaptation of power electronic
devices, sophisticated software-intensive controllers, and com-
have been affected. On the other hand, simply isolating the
corrupted agents may potentially compromise the connectiv-
ity and performance of the sparse communication network.
munication networks. Analogous to the case of the legacy
Sufficient and necessary conditions for undetectable or uniden-
grid where embedded intelligence made it vulnerable to cyber
tifiable attacks are well discussed in the literature. It is shown
attacks, the presence of software-based controllers or com-
in [3], [22]–[24] that the attackers can take advantage of the
munication networks in microgrids makes them susceptible to
configuration of the power systems to launch malicious attacks
cyber compromises [1]–[7]. The impacts are more pronounced
to bypass the existing attack detection methods. The conditions
in inverter-based microgrids due to their lack of generational
for the existence of undetectable attacks and fundamental lim-
inertia, presence of a weak distribution grid, and often volatile
itations of various attack detection and identification monitors
and dynamic source and load profiles. Distributed coopera-
are analyzed in [25]. Distributed filters are proposed to detect
tive control of AC microgrids [8]–[11] have emerged as an
and identify attacks. However, these filters are computationally
alternative to centralized control paradigms since they offer
expensive and are difficult to implement. Moreover, one could
Manuscript received April 1, 2019; revised September 7, 2019 and January manipulate the good data to be inadvertently removed [26].
13, 2020; accepted March 17, 2020. Date of publication March 31, 2020; date Since one could not list and remove every potential threat, the
of current version August 21, 2020. This work was supported by the Office of
Naval Research under Grant N00014-17-1-2239. The work of Omar Ali Beg concept of attack-resilience is proposed. Hence, the second
was supported by the University of Texas at Arlington. Paper no. TSG-00486- solution category develops distributed attack-resilient con-
2019. (Corresponding author: Ali Davoudi.) trol protocols to enhance the resilience of the microgrids
Shan Zuo, Frank L. Lewis, and Ali Davoudi are with the
Electrical Engineering Department, University of Texas at Arlington, against potential noises/faults, without the need to detect, iden-
Arlington, TX 76019 USA (e-mail: shan.zuo@uta.edu; lewis@uta.edu; tify and correct/remove misbehaving agents [27], [28]. These
davoudi@uta.edu). unintentional noises/faults have been assumed to be bounded
Omar Ali Beg was with the University of Texas at Arlington, Arlington,
TX 76019 USA. He is now with the Electrical Engineering Department, signals, and have been collectively addressed in the context of
University of Texas Permian Basin, Odessa, TX 79762 USA (e-mail: conventional fault-tolerant control [29]. Direct adaptation to
beg_o@utpb.edu). adversarial attacks is not practical as such attacks are inten-
Color versions of one or more of the figures in this article are available
online at http://ieeexplore.ieee.org. tionally designed to maximize their damage and, hence, cannot
Digital Object Identifier 10.1109/TSG.2020.2984266 be assumed bounded [21]. Some approaches assume a certain
1949-3053
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3786 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3787
there exists a connection between the kth attacker and the ith information of the leader nodes, are
inverter; otherwise, one has hik = 0. ⎛
N
ufi = cfi ⎝ aij ωj − ωi + gui (ωref − ωi )
III. S TANDARD C OOPERATIVE S ECONDARY j=1 ⎞
C ONTROL OF AC M ICROGRIDS N
+ gli (ωref − ωi ) + aij mPj Pj − mPi Pi ⎠, (8)
One can adopt the nonlinear large-signal model of an
inverter [35] that ignores the switching artifacts and focuses on ⎛ j=1
N
its average-value model. Assuming inductive distribution lines,
uvi = cvi ⎝ aij vodj − vodi + gui vuref − vodi
the active and reactive powers delivered by the ith inverter at
the ith bus of the distribution network are
j=1 ⎞
⎧ N
⎨ Pi = vmag,i vbus,i sin(θi −βi ) , + gli vlref − vodi + aij nQj Qj − nQi Qi ⎠, (9)
Zi
2 (1) j=1
⎩ Qi = vmag,i vbus,i cos(θi −βi ) − vbus,i ,
Zi Zi
where cfi , cvi ∈ R > 0 are the coupling gains, ωref is the
where Zi shows the effective collective impedance of the frequency reference, and vuref and vlref are the bounds on voltage
inverter’s output filter and the connector between the inverter terms, respectively.
and the distribution network. Pi and Qi are the active and reac- It is worth noting that to regulate frequency, its reference
tive output powers of the ith inverter, respectively. vmag,i ∠θi is values for both the upper and lower leaders are set as ωref . On
the output voltage of the ith inverter and vbus,i ∠βi is the ith the other hand, to bound the voltage magnitudes to a prescribed
bus voltage. Relation (1) can be simplified to obtain droop range, the voltage references for the upper and lower lead-
mechanisms for (Pi , ωi ) and (Qi , vi ) and tune the inverter’s ers are set as vuref and vlref , respectively. That is, we try to
frequency and voltage achieve consensus-based and containment-based regulations
for frequency and voltage terms, respectively.
ωi = ωni − mPi Pi , (2) The droop set points, ωni and Vni , are then computed from
vmag,i = Vni − nQi Qi , (3) ufi and uvi as
where ωi is the angular frequency of the ith inverter. Tuning ωni = ufi d t, (10)
vmag,i is effectively the same as tuning the direct term of the
Vni = uvi d t. (11)
output voltage, vodi , after a proper reference frame transforma-
tion. ωni and Vni are the set points for the droop mechanism,
Based on (2) and (3), we reformulate (8) and (9) as
and are chosen at the secondary level. mPi and nQi are ⎛
droop coefficients chosen according to the power rating of N
the corresponding inverter. ufi = cfi ⎝ aij ωj + mPj Pj − ωi + mPi Pi
To coordinate inverters’ terminal frequency and voltage to j=1
their respective references, the secondary control provides ωni + gui ωref + mPi Pi − ωi + mPi Pi ⎞
and Vni locally by data exchange with its neighbors on a
communication digraph. Differentiating (2) and (3) yields + gli ωref + mPi Pi − ωi + mPi Pi ⎠
⎛
ω̇ni = ω̇i + mPi Ṗi = ufi , (4) N
V̇ni = v̇odi + nQi Q̇i = uvi , (5) = cfi ⎝ aij ωnj − ωni + gui ωn,ref − ωni
j=1 ⎞
where ufi and uvi are auxiliary control inputs.
The frequency and voltage control of N inverters can then + gli ωn,ref − ωni ⎠, (12)
be represented by synchronization problems for the following ⎛
linear and first-order multi-agent systems (MAS) N
⎧ uvi = cvi ⎝ aij vodj + nQj Qj − vodi + nQi Qi
⎨ ω̇1 + mP1 Ṗ1 = uf1 ,
⎪ j=1
.. (6) + gui vuref + nQi Qi − vodi + nQi Qi ⎞
⎪ .
⎩
ω̇N + mPN ṖN = ufN ,
⎧ + gli vlref + nQi Qi − vodi + nQi Qi ⎠
⎨ v̇od1 + nQ1 Q̇1 = uv1 ,
⎪
⎛
.. (7)
⎪ . N
⎩ = cvi ⎝ aij Vnj − Vni + gui Vn,ref
u
− Vni
v̇odN + nQN Q̇N = uvN .
j=1 ⎞
Motivated by [36], with a slight modification of [37],
the cooperative frequency and voltage control laws at + gli Vn,ref
l
− Vni ⎠, (13)
each inverter, based on the neighbors’ information and the
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3788 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020
N
Denote the attack vector as δi = j=1 aij σij − Define the following global voltage synchronization error
(d + gu + gl + h )σ + (gu σ u + gl σ l ) + ⎛ ⎞−1
i i i l∈A ik ii i i ref i i ref
h (V − V ). Then, (20) becomes γ
k∈A ik k i
ηv = V − ⎝ γ ⎠ γ 1N ⊗ Vref , (27)
⎛
γ =u,l γ =u,l
V̇i = cvi ⎝ gui Vrefu
+ gli Vref
l
where ηv = [ηv1 T , . . . , ηT ]T . The following lemmas are
vN
⎛ ⎞ ⎞ required.
N Lemma 1 [40]: Given Assumption 1, γ =u,l γ is non-
− ⎝ di + gui + gli Vi − aij Vj ⎠ + δi ⎠. (21) singular and positive-definite.
j=1 Lemma 2 [40]: Given Assumption 1, the objective in (24)
is obtained if limt→∞ ηv (t) = 0.
Since Vk , σij , σiuref , and σilref can be unbounded, δi can be Next, we define the resilient voltage synchronization
unbounded. Therefore, the standard cooperative control (18) problem in the presence of unbounded attacks.
not only could not regulate the voltage terms, but also could Definition 3 (Resilient Voltage Synchronization Problem):
not guarantee the overall system stability. Under the unbounded attacks described in (18) and (19), the
Denote V = [V1T , . . . , VNT ]T , cv = diag(cvi ), and δ = resilient voltage synchronization problem designs a fully dis-
[δ1 , . . . , δNT ]T . Then, (21) has the following global form
T
tributed control protocols uvi in (5) for each inverter using only
the local measurement such that, for all initial conditions, ηv
V̇ = cv Gu 1N ⊗ Vref u
+ Gl 1N ⊗ Vref
l
in (27) is UUB. That is, the voltage of each inverter converges
− (L + Gu + Gl )V + δ). (22) to a small neighborhood around the convex hull spanned by
the voltage references of the two leaders.
Next, we give some preliminaries on the synchronization of Note that the resilient frequency synchronization problem
MAS with multiple leaders. The distance from x ∈ Rn to the can be defined similarly, with a different control objective
set C ∈ Rn , in terms of the Euclidean norm, is defined by to make the each inverter’s frequency to converge to a small
neighborhood around the frequency reference.
dist (x, C) = inf x − y2 . (23)
y∈C
V. F ULLY D ISTRIBUTED R ESILIENT D ESIGN
Definition 2: The set C ⊆ Rn is convex when (1 − ε)x +
εy ∈ C, for any x, y ∈ C and any ε ∈ [0, 1] [39]. We present a fully distributed voltage containment frame-
Let VL = {Vref l , V u } be the bounds on the voltage ref- work resilient to unbounded attacks, by interconnecting the
ref
erence values. The convex hull of VL is defined as the original cyber-physical layer with a hidden resilient layer with
minimal convex set containing VL points, i.e., Co(VL ) = secure communication networks. The security of this hidden
l + εV u |ε ∈ [0, 1]}. Since V l and V u are both
{(1 − ε)Vref virtual layer is guaranteed by using the advanced Internet
ref ref ref
constant, Co(VL ) = {[Vref l , V u ]}. technology, e.g., software-defined networking [41], [42]. This
ref makes it difficult and expensive for attackers to compromise.
The secondary voltage control aims to converge the voltage
of each inverter into the convex hull spanned by the voltage Moreover, compared to the physical states of the local invert-
references issued by the two leaders, that is ers, the virtual states of the hidden resilient layer have no
physical meaning and, hence, are less observable.
lim dist(Vi (t), Co(VL (t))) = 0, ∀i ∈ F . (24) The states of the hidden resilient control later will be
t→∞ designed to stabilize the cooperative and adversarial AC
In the absence of an attack, V̄i,i = Vi , microgrids under unknown unbounded attacks. Let’s consider
V̄i,j = Vj , and hik = 0. Hence, V̇i = cvi the following overall system
⎛
( N j=1 aij (Vj − Vi ) + gi (Vref − Vi ) + gi (Vref − Vi )). Then, the
u u l l
N
synchronization with multiple leaders is guaranteed, i.e., (24) V̇i = cvi ⎝ aij V̄i,j − V̄i,i + gui V̄i,ref
u
− V̄i,i
holds for each inverter. Define j=1
⎞
1
γ = L + Gγ , γ = u, l. (25)
2 + gli V̄i,ref
l
− V̄i,i + hik Vk − V̄i,i − δ̂i ⎠, (28)
γ γ k∈A
Note that L(1N ⊗ Vref ) = (D − A)(1N ⊗ Vref ) = 0, ∀γ = ⎛
u, l. Then, (22) can be rewritten as
N
V̂˙ i = cvi ⎝ aij V̂j − V̂i + gui Vref
u
− V̂i
1 1 j=1
V̇ = cv L + Gu 1N ⊗ Vref u
+ L + Gl ⎞
2 2
1
1 + gli Vref
l
− V̂i + Ṽi ⎠, (29)
× 1N ⊗ Vrefl
− L + Gu + L + Gl V + δ
2 2
⎛ ⎞ ⎛ ⎞
N
δ̂˙i = −cvi ⎝
γ
= cv ⎝ γ 1N ⊗ Vref − γ V + δ ⎠. (26) aij Ṽj − Ṽi − gui + gli Ṽi ⎠, (30)
γ =u,l γ =u,l j=1
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3790 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020
V̂˙ = cv ⎝−
γ
γ V̂ + γ 1N ⊗ Vref + Ṽ ⎠, (33)
γ =u,l γ =u,l
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3791
η̂˙ v = V̂˙
⎛ ⎞
γ
= cv ⎝− γ V̂ + γ 1N ⊗ Vref + Ṽ ⎠
γ =u,l γ =u,l
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3792 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020
TABLE I
VALUES OF THE ATTACKS TO THE VOLTAGE AND F REQUENCY L OOPS
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3793
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3794 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020
[26] J. Kim, L. Tong, and R. J. Thomas, “Data framing attack on state esti- Omar Ali Beg (Member, IEEE) received the Ph.D.
mation with unknown network parameters,” in Proc. Asilomar Conf. degree in electrical engineering from the University
Signals Syst. Comput., 2013, pp. 1388–1392. of Texas at Arlington, TX, USA, in 2017. He was a
[27] S. Abhinav, I. D. Schizas, F. L. Lewis, and A. Davoudi, “Distributed recipient of the U.S. Air Force Research Laboratory
noise-resilient networked synchrony of active distribution systems,” Summer Research Fellowship in 2015. He is also
IEEE Trans. Smart Grid, vol. 9, no. 2, pp. 836–846, Mar. 2018. the recipient of the Rising Science and Technology
[28] N. M. Dehkordi, H. R. Baghaee, N. Sadati, and J. M. Guerrero, Acquisition and Retentions grant by the UT System.
“Distributed noise-resilient secondary voltage and frequency control He is currently an Assistant Professor with the
for islanded microgrids,” IEEE Trans. Smart Grid, vol. 10, no. 4, Department of Electrical Engineering, College of
pp. 3780–3790, Jul. 2019. Engineering, University of Texas Permian Basin,
[29] M. Blanke, M. Kinnaert, J. Lunze, and M. Staroswiecki, Diagnosis and Odessa, TX, USA. His research interests include for-
Fault-Tolerant Control. New York, NY, USA: Springer-Verlag, 2006. mal verification and cyber-attack detection in cyber-physical power systems
[30] S. Liu, Z. Hu, X. Wang, and L. Wu, “Stochastic stability analysis and using formal methods.
control of secondary frequency regulation for islanded microgrids under
random denial of service attacks,” IEEE Trans. Ind. Informat., vol. 15,
no. 7, pp. 4066–4075, Jul. 2019.
[31] S. Qobad, J. M. Guerrero, and J. C. Vasquez, “Distributed secondary
control for islanded microgrids—A novel approach,” IEEE Trans. Power
Electron., vol. 29, no. 2, pp. 1018–1031, Feb. 2014.
[32] J. W. Simpson-Porco, Q. Shafiee, F. Dörfler, J. C. Vasquez,
J. M. Guerrero, and F. Bullo, “Secondary frequency and voltage con-
trol of islanded microgrids via distributed averaging,” IEEE Trans. Ind.
Electron., vol. 62, no. 11, pp. 7025–7038, Nov. 2015.
[33] L. Meng et al., “Distributed voltage unbalance compensation in islanded
microgrids by using a dynamic consensus algorithm,” IEEE Trans.
Frank L. Lewis (Life Fellow, IEEE) received the
Power Electron., vol. 31, no. 1, pp. 827–838, Jan. 2016.
bachelor’s degree in physics/EE and the M.S.E.E.
[34] V. Nasirian, Q. Shafiee, J. M. Guerrero, F. L. Lewis, and A. Davoudi,
degree from Rice University, the M.S. degree in
“Droop-free distributed control for AC microgrid,” IEEE Trans. Power
aeronautical engineering from the University of West
Electron., vol. 31, no. 2, pp. 1600–1617, Feb. 2016.
Florida, and the Ph.D. degree from the Georgia
[35] N. Pogaku, M. Prodanović, and T. C. Green, “Modeling, analysis and
Institute of Technology. He is a PE Texas, a
testing of autonomous operation of an inverter-based microgrid,” IEEE
U.K. Chartered Engineer, a UTA Distinguished
Trans. Power Electron., vol. 22, no. 2, pp. 613–625, Mar. 2007.
Scholar Professor, a UTA Distinguished Teaching
[36] R. Han, L. Meng, G. Ferrari-Trecate, E. A. A. Coelho, J. C. Vasquez,
Professor, and the Moncrief-O’Donnell Chair with
and J. M. Guerrero, “Containment and consensus-based distributed coor-
the University of Texas at Arlington Research
dination control to achieve bounded voltage and precise reactive power
Institute. He works in feedback control, intelli-
sharing in islanded AC microgrids,” IEEE Trans. Ind. Appl., vol. 53,
gent systems, cooperative control systems, and nonlinear systems. He has
no. 6, pp. 5187–5199, Nov./Dec. 2017.
authored 7 U.S. patents, numerous journal special issues, 420 journal papers,
[37] A. Bidram, F. L. Lewis, and A. Davoudi, “Distributed control systems
20 books, including the textbooks Optimal Control, Aircraft Control, Optimal
for small-scale power networks: Using multiagent cooperative control
Estimation, and Robot Manipulator Control. He received the Fulbright
theory,” IEEE Control Syst. Mag., vol. 34, no. 6, pp. 56–77, Dec. 2014.
Research Award, the NSF Research Initiation Grant, the ASEE Terman Award,
[38] H. K. Khalil, Nonlinear Systems, 3rd ed. Upper Saddle River, NJ, USA:
the International Neural Network Society Gabor Award, the U.K. Institute
Prentice Hall, 2002.
of Measurement & Control Honeywell Field Engineering Medal, the IEEE
[39] R. T. Rockafellar, Convex Analysis. Princeton, NJ, USA: Princeton Univ.
Computational Intelligence Society Neural Networks Pioneer Award, the
Press, 2015.
AIAA Intelligent Systems Award, and the AACC Ragazzini Award. He is
[40] S. Zuo, Y. Song, F. L. Lewis, and A. Davoudi, “Output contain-
a member of the National Academy of Inventors. He is a fellow of IFAC,
ment control of linear heterogeneous multi-agent systems using internal
AAAS, and the U.K. Institute of Measurement & Control.
model principle,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 2099–2109,
Aug. 2017.
[41] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E. Rothenberg,
S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
prehensive survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
[42] D. Jin et al., “Toward a cyber resilient and secure microgrid using
software-defined networking,” IEEE Trans. Smart Grid, vol. 8, no. 5,
pp. 2494–2504, Sep. 2017.
[43] B. Gharesifard and T. Basar, “Resilience in consensus dynamics via
competitive interconnections,” in Proc. 3rd IFAC Workshop Estimation
Control Netw. Syst., Santa Barbara, CA, USA, 2012, pp. 234–239.
[44] A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design
of cooperative systems against attacks,” IEEE Trans. Autom. Control, Ali Davoudi (Senior Member, IEEE) received
vol. 63, no. 9, pp. 3159–3166, Sep. 2018. the Ph.D. degree in electrical and computer engi-
[45] N. Mwakabuta and A. Sekar, “Comparative study of the IEEE 34 node neering from the University of Illinois, Urbana–
test feeder under practical simplifications,” in Proc. 39th North Amer. Champaign, IL, USA, in 2010. He is currently an
Power Symp., 2007, pp. 484–491. Associate Professor with the Electrical Engineering
Department, University of Texas at Arlington,
Arlington, TX, USA. He has received the Best Paper
Award from 2015 IEEE International Symposium on
Resilient Control Systems, the 2014 and 2015 Best
Shan Zuo received the B.S. and Ph.D. degrees Paper Award from the IEEE Transactions on Energy
in physical electronics and automation engineer- Conversion, the 2016 Prize Paper Award from the
ing from the University of Electronic Science and IEEE Power and Energy Society, the 2017 IEEE Richard M. Bass Outstanding
Technology of China, Chengdu, China, in 2012 Young Power Electronics Engineer Award, the 2017 and 2018 Best Paper
and 2018, respectively. She is currently pursuing Award from the IEEE T RANSACTIONS ON E NERGY C ONVERSION, and
the Ph.D. degree with the University of Texas at the 2019 and 2020 Faculty Fellow of Janet and Mike Greene Endowed
Arlington, TX, USA. Her research interests include Professorship. He is an Associate Editor for the IEEE T RANSACTIONS ON
distributed control theory, reinforcement learning, P OWER E LECTRONICS, the IEEE T RANSACTIONS ON T RANSPORTATION
AC/DC microgrids, autonomous systems, and cyber- E LECTRIFICATION, the IEEE T RANSACTIONS ON E NERGY C ONVERSION,
physical systems. and the IEEE P OWER L ETTERS.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.