2023
DOI: 10.1016/j.ijepes.2022.108815
|View full text |Cite
|
Sign up to set email alerts
|

Attention-aware deep reinforcement learning for detecting false data injection attacks in smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Threat analysis helps identify potential vulnerabilities and assess their impact on business operations. It is a quantitative and qualitative assessment of critical organizational resources to determine the business impact on Information Technology and Information Systems IT/IS [39], [40].…”
Section: B Scadamentioning
confidence: 99%
“…Threat analysis helps identify potential vulnerabilities and assess their impact on business operations. It is a quantitative and qualitative assessment of critical organizational resources to determine the business impact on Information Technology and Information Systems IT/IS [39], [40].…”
Section: B Scadamentioning
confidence: 99%
“…Using deep learning as auxiliaries [52,66,72,74] Simply developing classifiers for detection [53,54,69,76,77,81] Locating false data injection attacks [55,56,60,63,68,75] Resorting to deep reinforcement learning for detection [64,65,79,95] Detecting attacks with specific targets [57,70,78,80] Addressing the problem of attack samples insufficiency [58,59,67,83] Considering disturbances from renewable energy integration [60,61] Handling the privacy problem in constructing detectors [62,71,73] [51] designed novel FDIA strategies by introducing adversarial samples (also called perturbation vectors) into FDIAs, thereby deceiving BDDs and DL-based detectors.…”
Section: Classification Literaturementioning
confidence: 99%
“…[65] proposed a DRL-based detection approach that combines the LSTM network to extract the system state features from previous time steps and consequently determine whether the system is currently being attacked. Similar to [64,65] added an AM to the DRL-based detection algorithm, which calculated the attention distribution of all input information, and the SE results were dynamically weighted according to the attention distribution. In this manner, it can extract more representative and distinguishable state features as observations, which can better facilitate decisionmaking in DRL for FDIA detection.…”
Section: Classification Literaturementioning
confidence: 99%
“…They pay attention to the detection and defense methods of FDIA and put forward a variety of different solutions. For example, Huang et al proposed a deep reinforcement learning FDIA detection method, which focuses on state attention to solve the problem of state feature extraction in existing reinforcement learning detection methods [9]. Mahi et al proposed a novel prediction-aided anomaly detection, using the sequence-to-sequence architecture of the automatic encoder based on CNN-LSTM to combat the FDIA [10].…”
Section: Introductionmentioning
confidence: 99%