2022
DOI: 10.1109/tsg.2021.3117977
|View full text |Cite
|
Sign up to set email alerts
|

Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(15 citation statements)
references
References 39 publications
0
15
0
Order By: Relevance
“…We note that PSSF has so far been pursued via single-hidden-layers NNs [26,27], and further investigated by the Recurrent neural networks in [28] and Graph Recurrent neural networks [29]. The state-of-art neural network algorithms for FDI attack detection have been pursued by the Chebyshev GCN [30], CNN [31] and RNN [32].…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We note that PSSF has so far been pursued via single-hidden-layers NNs [26,27], and further investigated by the Recurrent neural networks in [28] and Graph Recurrent neural networks [29]. The state-of-art neural network algorithms for FDI attack detection have been pursued by the Chebyshev GCN [30], CNN [31] and RNN [32].…”
Section: A Related Workmentioning
confidence: 99%
“…voltage magnitudes, active and reactive power injections) and GRNN [29] that combines a GNN1st layer and a LSTM layer together to capture the spatio-temporal correlations. Likewise, the stateof-art algorithms for false data detection and localization include ChebyGCN [30] that uses the absolute values of the admittance matrix and consider active and reactive powers as inputs, CNN [31] that takes both line and bus measurements 3 , and LSTM [32] that considers voltage phasors as inputs, and GSP algorithm [4].…”
Section: Numerical Experimentsmentioning
confidence: 99%
“…In [22], the authors present a spatiotemporal feature extraction mechanism using cubature Kalman Filters and Gaussian process regression, following which a Deep Convolutional Neural Network is used to map a function between these features and the indicating labels detecting the presence of FDIA in the power system. In [23] the authors propose an Auto-Regressive Moving Average Graph Neural Network or ARMA -GNN based classification algorithm for joint detection and localization of FDIA attacks. These model free methods proposed in literature can be further classified into two different categories -supervised algorithms and unsupervised algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…One of the main challenges is in the cascading failures caused by cyber-attacks or in the failure of a component in the power grid [3]. These attacks may occur when nodes or transmission lines in a smart grid fail [4]. When a power grid asset fails, this failure can propagate across the system due to the interdependencies between the power assets and the communication components.…”
Section: Introductionmentioning
confidence: 99%
“…Many studies investigated how to mitigate the cascading failure impacts caused by cyber-attacks. For example, [3], [4], [8]- [10] proposed algorithms to identify the mostvulnerable power lines and components in terms of their susceptibility to cascading attacks to strengthen power systems by protecting these vulnerable assets. These efforts show the importance of addressing the problem of cascading failure attacks on smart grids and the consequences of failing to do so.…”
Section: Introductionmentioning
confidence: 99%