2018
DOI: 10.1109/access.2018.2856520
|View full text |Cite
|
Sign up to set email alerts
|

Power System Security Under False Data Injection Attacks With Exploitation and Exploration Based on Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…2) Select the appropriate value h k , compute∆ 22,k+1 , Λ 22,k+1 by (19), if∆ 22,k+1 < 0 and Λ 22,k+1 > 0,then the controller parametersK k can be solved by (20), and go to the next step, else jump to Step 7); 3) If the condition (21) is satisfied, go to the next step, else return to Step 2); 4) Solve the backward RDEs (17) to get P k and S k ; 5) If k = 0, set k = k − 1, and go back to Step 2), else turn to the next step; 6) If the condition P 0 < γ 2 W is satisfied, this algorithm is feasible, and output the results, else go to…”
Section: Resultsmentioning
confidence: 99%
“…2) Select the appropriate value h k , compute∆ 22,k+1 , Λ 22,k+1 by (19), if∆ 22,k+1 < 0 and Λ 22,k+1 > 0,then the controller parametersK k can be solved by (20), and go to the next step, else jump to Step 7); 3) If the condition (21) is satisfied, go to the next step, else return to Step 2); 4) Solve the backward RDEs (17) to get P k and S k ; 5) If k = 0, set k = k − 1, and go back to Step 2), else turn to the next step; 6) If the condition P 0 < γ 2 W is satisfied, this algorithm is feasible, and output the results, else go to…”
Section: Resultsmentioning
confidence: 99%
“…For discrete power control strategies, we propose the JID algorithm to achieve the general NE of the joint channel access and power optimization game. Besides, inspired by the process of exploration and exploitation in reinforcement learning algorithms [44], [45], the JIDEE algorithm is designed to achieve the optimal NE. Simultaneously, these two algorithms are extended to the case where the power control strategies are continuous.…”
Section: Distributed Algorithmsmentioning
confidence: 99%
“…Moreover, finding the optimal NE in a two-dimensional strategy space is even more difficult. Inspired by the thought of exploration and exploitation in reinforcement learning algorithms [44], [45], a joint-strategy iteration algorithm for discrete power control strategies based on exploration and exploitation (JIDEE) is proposed, which will eventually converge to the optimal NE after a sufficient number of iterations . The detail of JIDEE is listed in algorithm 3.…”
Section: Joint-strategy Iteration Algorithm For Discrete Power Conmentioning
confidence: 99%
“…An important aspect is cyber-security since cyber attacks can make best designed controls to malfunction or degrade their performances. Several works dealt with this problem [80][81][82][83][84][85][86][87][88]. Reference [80] considered cyber-physical systems security from systems and control perspective in general, and shortly discussed possibilities to use RL and DRL to this purpose.…”
Section: Power System Control-related Considerationsmentioning
confidence: 99%
“…Q-learning was proposed in [81] to analyze the transmission grid vulnerability under sequential topology attacks and identify critical attack sequences with consideration of physical system behaviors. A modified Q-learning (termed nearest sequence memory Q-learning) was adopted in [83] to evaluate threat imposed by false data injection attack on voltage control of a power system. Test results revealed if even a few substations are attacked a voltage collapse with its consequences can happen in the system.…”
Section: Power System Control-related Considerationsmentioning
confidence: 99%