2018
DOI: 10.1109/access.2018.2835527
|View full text |Cite
|
Sign up to set email alerts
|

Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
40
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 79 publications
(41 citation statements)
references
References 38 publications
1
40
0
Order By: Relevance
“…This kind of method doesn't need to solve complex time-domain equations of the power system, and clear performance indicators can be used to evaluate the performance, it is one of the current main FDIA detection methods. This type of method mainly includes support vector machine (SVM) [18], extreme learning machine [19], fuzzy C-means clustering [20], deep learning [21], ensemble learning, etc., [22]. The detection performance of traditional supervised learning algorithms such as SVM depends on the quality of the data heavily, such as the poor characterization ability of the feature set will cause a low detection rate.…”
Section: The Detection Methods Based On Machine Learningmentioning
confidence: 99%
“…This kind of method doesn't need to solve complex time-domain equations of the power system, and clear performance indicators can be used to evaluate the performance, it is one of the current main FDIA detection methods. This type of method mainly includes support vector machine (SVM) [18], extreme learning machine [19], fuzzy C-means clustering [20], deep learning [21], ensemble learning, etc., [22]. The detection performance of traditional supervised learning algorithms such as SVM depends on the quality of the data heavily, such as the poor characterization ability of the feature set will cause a low detection rate.…”
Section: The Detection Methods Based On Machine Learningmentioning
confidence: 99%
“…However, it is only suitable for a single attack scenario, whose pattern period is about 50 AGC cycles. There are other literature works looking into the application of machine learning or artificial intelligence technology in this territory [22]- [24]. Deb Roy et al investigated the unique feature of low inertial AGC systems, such as the system with lots of renewable generations.…”
Section: Related Workmentioning
confidence: 99%
“…Covert cyber assault is a type of FDI attack held on SGs, which was detected by SE [27]. For attack detection, a supervised machine learning algorithm based bad data detector was designed.…”
Section: Related Work On Fdi Attack Detectionmentioning
confidence: 99%