2023
DOI: 10.1109/tsg.2022.3216625
|View full text |Cite
|
Sign up to set email alerts
|

Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 60 publications
0
4
0
Order By: Relevance
“…Advantageously, this method requires only a few labelled data to train a well‐performing detector. To eliminate label limitations, [67] proposed a self‐supervised clustering model with a stacked AE network. It can achieve clean clustering of data into benign and compromised samples without labelled supervision.…”
Section: Review Of Deep Learning Applications For Cybersecurity In Sm...mentioning
confidence: 99%
See 1 more Smart Citation
“…Advantageously, this method requires only a few labelled data to train a well‐performing detector. To eliminate label limitations, [67] proposed a self‐supervised clustering model with a stacked AE network. It can achieve clean clustering of data into benign and compromised samples without labelled supervision.…”
Section: Review Of Deep Learning Applications For Cybersecurity In Sm...mentioning
confidence: 99%
“…Using deep learning as auxiliaries [52,66,72,74] Simply developing classifiers for detection [53,54,69,76,77,81] Locating false data injection attacks [55,56,60,63,68,75] Resorting to deep reinforcement learning for detection [64,65,79,95] Detecting attacks with specific targets [57,70,78,80] Addressing the problem of attack samples insufficiency [58,59,67,83] Considering disturbances from renewable energy integration [60,61] Handling the privacy problem in constructing detectors [62,71,73] [51] designed novel FDIA strategies by introducing adversarial samples (also called perturbation vectors) into FDIAs, thereby deceiving BDDs and DL-based detectors.…”
Section: Classification Literaturementioning
confidence: 99%
“…ΨALG ∈ R m×m and ΘALG ∈ R m×m are positive definite diagonal matrices. Differentiating VALB in (31) with respect to time and using (29), one obtains ( )…”
Section: Alg-based Cooperative Strategymentioning
confidence: 99%
“…To avoid this, much effort should be devoted to conquering the detrimental consequence caused by FDI attacks. Recently, various control methods of electric systems under the FDI attacks have been developed [30][31][32][33], while the resilient formation control approaches of multiagent systems subject to FDI attacks on the control channels are relative rare. To alleviate the adversarial effect arises from FDI attacks, several robust controllers have been presented, one of these controllers is to employ sliding mode control technology to address the FDI attacks on the control channels (or actuators), which can rapidly enhance the convergence rate and achieve control objectives, and then maintain the desired performance of the actuators despite emergence of transient chattering.…”
mentioning
confidence: 99%