2018 Chinese Automation Congress (CAC) 2018
DOI: 10.1109/cac.2018.8623514
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Attacks Detection with Deep Belief Networks in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(23 citation statements)
references
References 2 publications
0
23
0
Order By: Relevance
“…For example, Tzortzis and Likas (2007) stated that spam is an unexpected message which contains inappropriate information and first applied to fit DBNs for spam detection. In another paper, Wei et al (2018) proposed a DBN-based method to identify false data injection attacks in the smart grid. They demonstrated that the DBN-based method achieves a better result than the traditional SVM-based approach.…”
Section: Generative Model For Detecting Misinformationmentioning
confidence: 99%
“…For example, Tzortzis and Likas (2007) stated that spam is an unexpected message which contains inappropriate information and first applied to fit DBNs for spam detection. In another paper, Wei et al (2018) proposed a DBN-based method to identify false data injection attacks in the smart grid. They demonstrated that the DBN-based method achieves a better result than the traditional SVM-based approach.…”
Section: Generative Model For Detecting Misinformationmentioning
confidence: 99%
“…The proposed attack model focused on the data collecting and the motion control instructions. When the attack vector satisfied a = Hc, the attack model could bypass the classical attack detection approaches [28]. The attack model is defined as:…”
Section: False Data Injection Attackmentioning
confidence: 99%
“…In this section, the performance of the OCSVM is tested. As the proposed OCSVM approach is a kind of classification algorithm, the other two machine learning based methods were selected for the comparisons, which were called the semi-supervised machine learning method [22] and the boosting based machine learning method [28].…”
Section: Performance Of the Anomaly Detection Modelmentioning
confidence: 99%
“…The proposed attack model is focusing on the data collecting and the motion control instructions. When the attack vector satisfies a = Hc, the attack model can bypass the classical attack detection approaches [28]. The attack model is defined as:…”
Section: False Data Injection Attackmentioning
confidence: 99%
“…In this section, the performance of the OCSVM is tested. As the proposed OCSVM approach is the kind of classification algorithm, the other two machine learning based methods are selected as the comparisons, which are called Semi-supervised machine learning method [22] and the Boosting based machine learning method [28].…”
Section: Performance Of the Traffic Prediction Modelmentioning
confidence: 99%