2020
DOI: 10.1109/tetci.2019.2902845
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Dynamic Attacks in Smart Grids Using Reservoir Computing: A Spiking Delayed Feedback Reservoir Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…In [16], the authors proposed detecting dynamic attacks in smart grids using a spiking delay feedback reservoir-based computing. The proposed attack detection approach implemented a spike in neural network for dynamic detection of attacks but it has major limitation of learning the data, which affects the accuracy of the approach.…”
Section: Related Workmentioning
confidence: 99%
“…In [16], the authors proposed detecting dynamic attacks in smart grids using a spiking delay feedback reservoir-based computing. The proposed attack detection approach implemented a spike in neural network for dynamic detection of attacks but it has major limitation of learning the data, which affects the accuracy of the approach.…”
Section: Related Workmentioning
confidence: 99%
“…Different data-based techniques, e.g., deep learning methods, can then be employed to recognize the behavior features of attacks and thus achieve attack detection. However, these methods usually face a heavy computational burden to train a fully connected network [38], [39].…”
Section: Related Workmentioning
confidence: 99%
“…5) Model free detection scheme: Model free-based detection approached have also been introduced for monitoring attacks in CPSs [31]- [33], [70]- [76]. These solutions generally rely on machine learning or statistical mechanisms to infer a model for the system under inspection directly from data.…”
Section: B Attack Detection Designmentioning
confidence: 99%
“…In order to reduce the difficulties of training neural networks, the reservoir computing method is widely adopted in the literature. For example, in [75] and [76], a reservoir computing-based method was proposed by Hamedani to detect single attacks and stealth attacks, respectively.…”
Section: B Attack Detection Designmentioning
confidence: 99%