2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia) 2019
DOI: 10.1109/isgt-asia.2019.8881664
|View full text |Cite
|
Sign up to set email alerts
|

Poisoning Attack on Load Forecasting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…D val represents an untrained identically distributed validation set, as attackers are restricted to have no access to the test set, the attack effect is evaluated by model performance on D val . As the output at a single timestamp lacks specific meaning in regression problems, the current works design the attack effect W with overall performance, such as maximizing the MSE (Mean Square Error) of the output [22], [21].…”
Section: Existing Attack Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…D val represents an untrained identically distributed validation set, as attackers are restricted to have no access to the test set, the attack effect is evaluated by model performance on D val . As the output at a single timestamp lacks specific meaning in regression problems, the current works design the attack effect W with overall performance, such as maximizing the MSE (Mean Square Error) of the output [22], [21].…”
Section: Existing Attack Methodsmentioning
confidence: 99%
“…Overall, for both data poisoning and adversarial attacks, most of the existing methods in the literature only aim to degrade the overall forecasting performance (e.g., maximizing the Mean Square Error (MSE) [22]). However, significantly decreased forecasting performance can be easily aware by the system operator or detected via deployed detection mechanisms.…”
Section: Existing Attack Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…GPS synchronized devices may be subject to well-known GPS spoofing attacks. In [116] authors describe poisoning attack on load forecasting mechanism in Smart Grid, while authors in [117] give brief overview of attacks on load forecasting.…”
Section: An Example Dosmentioning
confidence: 99%
“…The studies in [28]- [30] have all focused on evasion attacks. To the best of our knowledge, the only study on poisoning attacks in power systems is done in [31], where the impact of poisoning attacks against short term load forecasting is studied.…”
Section: A Literature Reviewmentioning
confidence: 99%