2023
DOI: 10.1016/j.energy.2022.125865
|View full text |Cite
|
Sign up to set email alerts
|

Graph-based detection for false data injection attacks in power grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…[81] proposed a spatiotemporal DL network for FDIA detection in AC-model power grids. As previous works did not consider power grid topology changes, [77] considered the FDIA issue under topology dynamics using a gated GNN and graph attention network-based model for detection.…”
Section: Classification Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…[81] proposed a spatiotemporal DL network for FDIA detection in AC-model power grids. As previous works did not consider power grid topology changes, [77] considered the FDIA issue under topology dynamics using a gated GNN and graph attention network-based model for detection.…”
Section: Classification Literaturementioning
confidence: 99%
“…Using deep learning as auxiliaries [52,66,72,74] Simply developing classifiers for detection [53,54,69,76,77,81] Locating false data injection attacks [55,56,60,63,68,75] Resorting to deep reinforcement learning for detection [64,65,79,95] Detecting attacks with specific targets [57,70,78,80] Addressing the problem of attack samples insufficiency [58,59,67,83] Considering disturbances from renewable energy integration [60,61] Handling the privacy problem in constructing detectors [62,71,73] [51] designed novel FDIA strategies by introducing adversarial samples (also called perturbation vectors) into FDIAs, thereby deceiving BDDs and DL-based detectors.…”
Section: Classification Literaturementioning
confidence: 99%
“…Thus, much effort should be devoted to investigating FDI attacks therein. Many interesting works have been conducted in recent years, including attack detection [35][36][37][38][39], resilient control strategies [40][41][42][43], and survey articles [15,44,45]. The following are some representative works on this subject since this subsection is not the primary focus; for more details, one may refer to the specialized survey paper on this topic listed above.…”
Section: False Data Injection (Fdi) Attackmentioning
confidence: 99%
“…The feedback mechanism, which utilizes a dynamic time-wrapping distance, was designed to handle delayed communication and varying attack signals. In [39], the authors designed a FDI detection approach relying on a graph neural network that considers changes in a power grid architecture. Using a gated graph neural network (GGNN), the approach collects spatial information from both the power grid structure and operational data.…”
Section: False Data Injection (Fdi) Attackmentioning
confidence: 99%
“…To prevent these issues, power grid operators adopt advanced monitoring systems to examine the grid performance in real time [ 4 , 5 ]. These systems collect data from sensors and other devices installed throughout the grid and employ sophisticated analytics to detect any anomalies or potential problems [ 6 , 7 ]. Therefore, thanks to early identification, grid operators can take corrective actions to avert power outages and ensure the reliability and stability of the grid.…”
Section: Introductionmentioning
confidence: 99%