2021
DOI: 10.1007/s00202-021-01380-9
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…The proposed BiLSTM-LogitBoost stacking ensemble model, proposed for ETD in SGs, is evaluated and discussed in this section. Some recent benchmarks, such as SVM [19], [71], logistic regression (LR) [37], decision tree (DT) [37], LSTM [21], [71], adaptive boosting (AdaBoost) [37], BiLSTM [64], LogitBoost [65], and LSTM-AdaBoost [72] are also implemented for ETD and their results are compared with the proposed model. LogitBoost with n_estimators = 25 is employed as a benchmark technique to our proposed model.…”
Section: Discussion Of the Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed BiLSTM-LogitBoost stacking ensemble model, proposed for ETD in SGs, is evaluated and discussed in this section. Some recent benchmarks, such as SVM [19], [71], logistic regression (LR) [37], decision tree (DT) [37], LSTM [21], [71], adaptive boosting (AdaBoost) [37], BiLSTM [64], LogitBoost [65], and LSTM-AdaBoost [72] are also implemented for ETD and their results are compared with the proposed model. LogitBoost with n_estimators = 25 is employed as a benchmark technique to our proposed model.…”
Section: Discussion Of the Simulation Resultsmentioning
confidence: 99%
“…To successfully accomplish this job, different performance evaluation parameters are available, as given in study [73]. On the other hand, it is not practical to employ all of the performance metrics mentioned in the study; therefore, in this paper, we employed few metrics from them that are most relevant and widely used in the recent literature of ETD [21], [71], [74]. Hence, the proposed model's performance evaluation is done via different performance metrics.…”
Section: B Performance Measuresmentioning
confidence: 99%
“…The best‐suited algorithm is identified and integrated for forecasting and theft detection. A financial transaction is vulnerable to cyber threats in IoT platforms [18]. Hence, cyber‐resilient energy and financial transactions via digital watermarking are developed.…”
Section: System Overviewmentioning
confidence: 99%
“…The outcomes attained are assessed against other widespread DL methodologies namely traditional LSTM, RNN, and Gated Recurrent Units (GRU). Jain et al [14] present a new ML-based multi model predictive technique called intelligent energy CPS (iECPS) for smarter energy theft verification and detection. Moreover, the scheme has strength because verification from the user is taken into account as concluding validation for deciding further course of action.…”
Section: Related Workmentioning
confidence: 99%