[1] |
杨杉, 谭博, 郭静波. 基于双马尔科夫链的新型能源互联网虚假数据注入攻击检测[J]. 电力自动化设备, 2021, 41(2):131-137.
|
|
YANG Shan, TAN Bo, GUO Jingbo. Detection of false data injection attack for new-type energy Internet based on double Markov chains[J]. Electric Power Automation Equipment, 2021, 41(2):131-137.
|
[2] |
汤奕, 陈倩, 李梦雅, 等. 电力信息物理融合系统环境中的网络攻击研究综述[J]. 电力系统自动化, 2016, 40(17):59-69.
|
|
TANG Yi, CHEN Qian, LI Mengya, et al. Overview on cyber-attacks against cyber physical power system[J]. Automation of Electric Power Systems, 2016, 40(17):59-69.
|
[3] |
王琦, 邰伟, 汤奕, 等. 面向电力信息物理系统的虚假数据注入攻击研究综述[J]. 自动化学报, 2019, 45(1):72-83.
|
|
WANG Qi, TAI Wei, TANG Yi, et al. A review on false data injection attack toward cyber-physical power system[J]. Acta Automatica Sinica, 2019, 45(1):72-83.
|
[4] |
罗小元, 潘雪扬, 王新宇, 等 基于自适应Kalman滤波的智能电网假数据注入攻击检测[J/OL]. 自动化学报, 2020 (2020-07-13)[2021-08-12]. https://kns.cnki.net/kcms/detail/detail/11.2109.TP.20200710.1441.001.html.
|
|
LUO Xiaoyuan, PAN Xueyang, WANG XinYu, et al. Detection of false data injection attack in smart grid via adaptive kalman filtering[J/OL]. Acta Automatica Sinica, 2020(2020-07-13)[2021-08-12]. https://kns.cnki.net/kcms/detail/detail/11.2109.TP.20200710.1441.001.html.
|
[5] |
赵丽莉, 刘忠喜, 孙国强, 等. 基于非线性状态估计的虚假数据注入攻击代价分析[J]. 电力系统保护与控制, 2019, 47(19):38-45.
|
|
ZHAO Lili, LIU Zhongxi, SUN Guoqiang, et al. Cost analysis of the false data injection attack based on nonlinear state estimation[J]. Power System Protection and Control, 2019, 47(19):38-45.
|
[6] |
ZHAO J B, ZHANG G X, LA SCALA M, et al. Short-term state forecasting-aided method for detection of smart grid general false data injection attacks[J]. IEEE Transactions on Smart Grid, 2017, 8(4):1580-1590.
doi: 10.1109/TSG.2015.2492827
URL
|
[7] |
KHARE G, MOHAPATRA A, SINGH S N. A real-time approach for detection and correction of false data in PMU measurements[J]. Electric Power Systems Research, 2021, 191:106866.
doi: 10.1016/j.epsr.2020.106866
URL
|
[8] |
李元诚, 曾婧. 基于改进卷积神经网络的电网假数据注入攻击检测方法[J]. 电力系统自动化, 2019, 43(20):97-104.
|
|
LI Yuancheng, ZENG Jing. Detection method of false data injection attack on power grid based on improved convolutional neural network[J]. Automation of Electric Power Systems, 2019, 43(20):97-104.
|
[9] |
陈刘东, 刘念. 面向互动需求响应的虚假数据注入攻击及其检测方法[J]. 电力系统自动化, 2021, 45(3):15-23.
|
|
CHEN Liudong, LIU Nian. False data injection attack and its detection method for interactive demand response[J]. Automation of Electric Power Systems, 2021, 45(3):15-23.
|
[10] |
WANG J Y, SUN Z W, BAO B, et al. Malicious synchrophasor detection based on highly imbalanced historical operational data[J]. CSEE Journal of Power and Energy Systems, 2019, 5(1):11-20.
|
[11] |
李艳霞, 柴毅, 胡友强, 等. 不平衡数据分类方法综述[J]. 控制与决策, 2019, 34(4):673-688.
|
|
LI Yanxia, CHAI Yi, HU Youqiang, et al. Review of imbalanced data classification methods[J]. Control and Decision, 2019, 34(4):673-688.
|
[12] |
陈杰, 张浩天, 汤奕. 基于改进生成式对抗网络的电网异常数据辨识方法[J]. 电力建设, 2021, 42(5):9-15.
|
|
CHEN Jie, ZHANG Haotian, TANG Yi. An abnormal data identification method based on improved generative adversarial network[J]. Electric Power Construction, 2021, 42(5):9-15.
|
[13] |
张阳, 张涛, 陈锦, 等. 基于SMOTE和机器学习的网络入侵检测[J]. 北京理工大学学报, 2019, 39(12):1258-1262.
|
|
ZHANG Yang, ZHANG Tao, CHEN Jin, et al. Research on network intrusion detection based on SMOTE algorithm and machine learning[J]. Transactions of Beijing Institute of Technology, 2019, 39(12):1258-1262.
|
[14] |
石洪波, 陈雨文, 陈鑫. SMOTE过采样及其改进算法研究综述[J]. 智能系统学报, 2019, 14(6):1073-1083.
|
|
SHI Hongbo, CHEN Yuwen, CHEN Xin. Summary of research on SMOTE oversampling and its improved algorithms[J]. CAAI Transactions on Intelligent Systems, 2019, 14(6):1073-1083.
|
[15] |
GOODFELLOW I, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial networks[J]. Communications of the ACM, 2020, 63(11):139-144.
doi: 10.1145/3422622
URL
|
[16] |
TANAKA F H K D S, ARANHA C. Data augmentation using GANs[EB/OL]. [2021-08-12]. https://arxiv.org/abs/1904.09135
|
[17] |
ZHENG X T, WANG B, XIE L. Synthetic dynamic PMU data generation: A generative adversarial network approach[C]// 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). College Station, TX, USA: IEEE, 2019: 1-6.
|
[18] |
AHMADIAN S, MALKI H, HAN Z. Cyber attacks on smart energy grids using generative adverserial networks[C]// 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). Anaheim, CA, USA: IEEE, 2018: 942-946.
|
[19] |
MOHAMMADPOURFARD M, GHANAATPISHE F, MOHAMMADI M, et al. Generation of false data injection attacks using conditional generative adversarial networks[C]// 2020 IEEE PES Innovative Smart Grid Technologies Europe. Hague, Netherlands: IEEE, 2020: 41-45.
|
[20] |
LI Y C, WANG Y Y, HU S Y. Online generative adversary network based measurement recovery in false data injection attacks: A cyber-physical approach[J]. IEEE Transactions on Industrial Informatics, 2020, 16(3):2031-2043.
doi: 10.1109/TII.2019.2921106
URL
|
[21] |
XU L, SKOULARIDOU M, CUESTA-INFANTE A, et al. Modeling tabular data using conditional GAN[DB/OL]. 2019(2019-01-01)[2021-08-12]. https://arxiv.org/abs/1907.00503v2.
|
[22] |
PATKI N, WEDGE R, VEERAMACHANENI K. The synthetic data vault[C]// 2016 IEEE International Conference on Data Science and Advanced Analytics. IEEE, 2016: 399-410.
|
[23] |
赵渊, 刘庆尧, 邝俊威, 等. 电网可靠性评估中相关性变量的非参数R藤Copula模型[J]. 中国电机工程学报, 2020, 40(3):803-812.
|
|
ZHAO Yuan, LIU Qingyao, KUANG Junwei, et al. A nonparametric regular vine copula model for multidimensional dependent variables in power system reliability assessment[J]. Proceedings of the CSEE, 2020, 40(3):803-812.
|
[24] |
王奕森, 夏树涛. 集成学习之随机森林算法综述[J]. 信息通信技术, 2018, 12(1):49-55.
|
|
WANG Yisen, XIA Shutao. A survey of random forests algorithms[J]. Information and Communications Technologies, 2018, 12(1):49-55.
|
[25] |
CAMANA ACOSTA M R, AHMED S, GARCIA C E, et al. Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks[J]. IEEE Access, 2020, 8:19921-19933.
doi: 10.1109/ACCESS.2020.2968934
URL
|
[26] |
GULRAJANI I, ALMED F, ARJOVSKY M, et al. Improved training of wasserstein gans[DB/OL]. 2017(-03-31)[2021-0812]. https://arxiv.org/abs/1704.00028.
|
[27] |
LIN Z N, KHETAN A, FANTI G, et al. PacGAN: The power of two samples in generative adversarial networks[J]. IEEE Journal on Selected Areas in Information Theory, 2020, 1(1):324-335.
doi: 10.1109/JSAIT.2020.2983071
URL
|
[28] |
SMITH M J, SALA C, KANTER J M, et al. The machine learning bazaar: Harnessing the ML ecosystem for effective system development[C]// SIGMOD’20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 2020: 785-800.
|
[29] |
BEAVER J M, BORGES-HINK R C, BUCKNER M A. An evaluation of machine learning methods to detect malicious SCADA communications[C]// 2013 12th International Conference on Machine Learning and Applications. IEEE, 2013: 54-59.
|