2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018
DOI: 10.1109/globalsip.2018.8646424
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attacks on Smart Energy Grids Using Generative Adverserial Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…In another research,the attacker has two goals: a) to be undetected by the system defender and b) to optimize the false data injection attack into a smart grid [174] . To achieve these objectives, the authors based this attack on generative adversarial network (GAN).…”
Section: Smart Attacks Based On Data Generationmentioning
confidence: 99%
“…In another research,the attacker has two goals: a) to be undetected by the system defender and b) to optimize the false data injection attack into a smart grid [174] . To achieve these objectives, the authors based this attack on generative adversarial network (GAN).…”
Section: Smart Attacks Based On Data Generationmentioning
confidence: 99%
“…In Bot-GAN, the generative model is used to improve the amount of data to bypass the original IDS acting as a discriminator. In [34], the authors proposed a GAN-based framework to evaluate cyber-attacks on the smart energy grid. The framework employs a GAN generator to generate abnormal traffic to evaluate the existing system defender.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, ML algorithms allowing to generate data (e.g., Generative Algorithm Network -GAN) can prove useful in this process. In [11], authors demonstrate that GAN can allow to generate similar data and intentionally deceive the system with a false injection attack. The final motivation for using ML algorithms when creating an attack is that they can be used to modify the behavior of an IoT network.…”
Section: Smart Attack In the Literaturementioning
confidence: 99%