2022
DOI: 10.1016/j.ijcip.2022.100508
|View full text |Cite
|
Sign up to set email alerts
|

FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Problems with fault detection and event monitoring are regarded as classification models. SVM [12] and rule-based learning [13] techniques are used to resolve this. The approach proposed by work [14] employs RSSI to forecast the link quality.…”
Section: Related Workmentioning
confidence: 99%
“…Problems with fault detection and event monitoring are regarded as classification models. SVM [12] and rule-based learning [13] techniques are used to resolve this. The approach proposed by work [14] employs RSSI to forecast the link quality.…”
Section: Related Workmentioning
confidence: 99%
“…Using deep learning as auxiliaries [52,66,72,74] Simply developing classifiers for detection [53,54,69,76,77,81] Locating false data injection attacks [55,56,60,63,68,75] Resorting to deep reinforcement learning for detection [64,65,79,95] Detecting attacks with specific targets [57,70,78,80] Addressing the problem of attack samples insufficiency [58,59,67,83] Considering disturbances from renewable energy integration [60,61] Handling the privacy problem in constructing detectors [62,71,73] [51] designed novel FDIA strategies by introducing adversarial samples (also called perturbation vectors) into FDIAs, thereby deceiving BDDs and DL-based detectors.…”
Section: Classification Literaturementioning
confidence: 99%
“…[69] proposed a GCN framework to analyze the graphical aspect of FDIAs by exploiting the graphical structures of the power network. A stacked AE was designed in [76] along with an extremely randomised tree classifier to address FDIA issues. Ref.…”
Section: Review Of Deep Learning Applications For Cybersecurity In Sm...mentioning
confidence: 99%
“…Considering that the gain 𝐾 𝑑𝑒𝑓 = 𝐾 H−2 = 𝑊𝑋 −1 , ( 7) and ( 9) now become ( 13) and ( 14), and the optimization problem to reduce the disturbance impact can be written as ( 11)- (14).…”
Section: H-2 and H-∞ Controller Designmentioning
confidence: 99%
“…if there exists a scalar 𝛼 > 0. After substituting the value of 𝛽 derived in (35) back into (31), we apply Schur's complement lemma [47], to rearrange the inequality containing 𝛼 −1 into the equivalent inequality in (36) which would replace constraint (14) in the original H-2 formulation making it a robust H-2 controller capable of handling uncertainty in the feedback loop.…”
Section: Robust Controller Under Uncertain Ev Feedback Loadmentioning
confidence: 99%