“…Using deep learning as auxiliaries [52,66,72,74] Simply developing classifiers for detection [53,54,69,76,77,81] Locating false data injection attacks [55,56,60,63,68,75] Resorting to deep reinforcement learning for detection [64,65,79,95] Detecting attacks with specific targets [57,70,78,80] Addressing the problem of attack samples insufficiency [58,59,67,83] Considering disturbances from renewable energy integration [60,61] Handling the privacy problem in constructing detectors [62,71,73] [51] designed novel FDIA strategies by introducing adversarial samples (also called perturbation vectors) into FDIAs, thereby deceiving BDDs and DL-based detectors.…”