IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society 2019
DOI: 10.1109/iecon.2019.8927453
|View full text |Cite
|
Sign up to set email alerts
|

Detection of False Data Injection Attacks in Smart Grids: A Real-Time Principle Component Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…A, B, and C feed compositions (stream 4) Random variation IDV (9) D feed temperature (stream 2) Random variation IDV (10) C feed temperature (stream 4) Random variation IDV (11) Reactor cooling water inlet temperature Random variation IDV (12) Condenser cooling water inlet temperature Random variation IDV (13) Reaction kinetics Slow shift IDV (14) Reactor cooling water valve Sticking IDV (15) Condenser cooling water valve Sticking IDV (16) Unknown Unknown IDV (17) Unknown Unknown IDV (18) Unknown Unknown IDV (19) Unknown Unknown IDV (20) Unknown Unknown IDV (21) Valve position constant (stream 4) Constant position…”
Section: Process Variable Typementioning
confidence: 99%
See 1 more Smart Citation
“…A, B, and C feed compositions (stream 4) Random variation IDV (9) D feed temperature (stream 2) Random variation IDV (10) C feed temperature (stream 4) Random variation IDV (11) Reactor cooling water inlet temperature Random variation IDV (12) Condenser cooling water inlet temperature Random variation IDV (13) Reaction kinetics Slow shift IDV (14) Reactor cooling water valve Sticking IDV (15) Condenser cooling water valve Sticking IDV (16) Unknown Unknown IDV (17) Unknown Unknown IDV (18) Unknown Unknown IDV (19) Unknown Unknown IDV (20) Unknown Unknown IDV (21) Valve position constant (stream 4) Constant position…”
Section: Process Variable Typementioning
confidence: 99%
“…PCA is a powerful tool for dimension reduction, which allows the most important variable information to be retained. It has been extensively used in feature extraction, data compression, image processing, and pattern recognition [8,9]. ICA can process high-intensity, high-noise and related data by extracting independent statistical variables hidden in the process to achieve process dimensionality reduction [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid developments of artificial intelligence technologies, the research works of data-driven technologybased detection methods are increasing dramatically. e principle component analysis is used to analyze the FDI attacks in the real-time environment [17], providing a more accurate and sensitive response than the previous FDI detection techniques. In [18], a supervised learning using labeled data called support vector machine-based FDI attacks detection method is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The DA is proposed because traditional FDIAs can be easily detected using the clustering-based and principal component analysis (PCA)-based approaches [9], [10]. The malicious measurements of the DA are deeply hidden in normal measurements because the distances between them and normal ones are minimized.…”
mentioning
confidence: 99%