Monthly
ISSN 1000-7229
CN 11-2583/TM
ELECTRIC POWER CONSTRUCTION ›› 2022, Vol. 43 ›› Issue (3): 58-65.doi: 10.12204/j.issn.1000-7229.2022.03.007
• Application of Artificial Intelligence in Power Grid Fault Diagnosis and Location ·Hosted by Professor WANG Xiaojun, Associate Professor LUO Guomin and Associate Professor SHI Fang· • Previous Articles Next Articles
XIA Yunshu1(), WANG Yong1(), ZHOU Lin1(), FAN Rusen2()
Received:
2021-09-12
Online:
2022-03-01
Published:
2022-03-24
Contact:
XIA Yunshu
E-mail:carriexia@163.com;wy616@126.com;zhou@shiep.edu.cn;fanrusen107@163.com
Supported by:
CLC Number:
XIA Yunshu, WANG Yong, ZHOU Lin, FAN Rusen. False Data Injection Attack Detection Method Based onImproved Generative Adversarial Network[J]. ELECTRIC POWER CONSTRUCTION, 2022, 43(3): 58-65.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.cepc.com.cn/EN/10.12204/j.issn.1000-7229.2022.03.007
[1] | 杨杉, 谭博, 郭静波. 基于双马尔科夫链的新型能源互联网虚假数据注入攻击检测[J]. 电力自动化设备, 2021, 41(2):131-137. |
YANG Shan, TAN Bo, GUO Jingbo. Detection of false data injection attack for new-type energy Internet based on double Markov chains[J]. Electric Power Automation Equipment, 2021, 41(2):131-137. | |
[2] | 汤奕, 陈倩, 李梦雅, 等. 电力信息物理融合系统环境中的网络攻击研究综述[J]. 电力系统自动化, 2016, 40(17):59-69. |
TANG Yi, CHEN Qian, LI Mengya, et al. Overview on cyber-attacks against cyber physical power system[J]. Automation of Electric Power Systems, 2016, 40(17):59-69. | |
[3] | 王琦, 邰伟, 汤奕, 等. 面向电力信息物理系统的虚假数据注入攻击研究综述[J]. 自动化学报, 2019, 45(1):72-83. |
WANG Qi, TAI Wei, TANG Yi, et al. A review on false data injection attack toward cyber-physical power system[J]. Acta Automatica Sinica, 2019, 45(1):72-83. | |
[4] | 罗小元, 潘雪扬, 王新宇, 等 基于自适应Kalman滤波的智能电网假数据注入攻击检测[J/OL]. 自动化学报, 2020 (2020-07-13)[2021-08-12]. https://kns.cnki.net/kcms/detail/detail/11.2109.TP.20200710.1441.001.html. |
LUO Xiaoyuan, PAN Xueyang, WANG XinYu, et al. Detection of false data injection attack in smart grid via adaptive kalman filtering[J/OL]. Acta Automatica Sinica, 2020(2020-07-13)[2021-08-12]. https://kns.cnki.net/kcms/detail/detail/11.2109.TP.20200710.1441.001.html. | |
[5] | 赵丽莉, 刘忠喜, 孙国强, 等. 基于非线性状态估计的虚假数据注入攻击代价分析[J]. 电力系统保护与控制, 2019, 47(19):38-45. |
ZHAO Lili, LIU Zhongxi, SUN Guoqiang, et al. Cost analysis of the false data injection attack based on nonlinear state estimation[J]. Power System Protection and Control, 2019, 47(19):38-45. | |
[6] |
ZHAO J B, ZHANG G X, LA SCALA M, et al. Short-term state forecasting-aided method for detection of smart grid general false data injection attacks[J]. IEEE Transactions on Smart Grid, 2017, 8(4):1580-1590.
doi: 10.1109/TSG.2015.2492827 URL |
[7] |
KHARE G, MOHAPATRA A, SINGH S N. A real-time approach for detection and correction of false data in PMU measurements[J]. Electric Power Systems Research, 2021, 191:106866.
doi: 10.1016/j.epsr.2020.106866 URL |
[8] | 李元诚, 曾婧. 基于改进卷积神经网络的电网假数据注入攻击检测方法[J]. 电力系统自动化, 2019, 43(20):97-104. |
LI Yuancheng, ZENG Jing. Detection method of false data injection attack on power grid based on improved convolutional neural network[J]. Automation of Electric Power Systems, 2019, 43(20):97-104. | |
[9] | 陈刘东, 刘念. 面向互动需求响应的虚假数据注入攻击及其检测方法[J]. 电力系统自动化, 2021, 45(3):15-23. |
CHEN Liudong, LIU Nian. False data injection attack and its detection method for interactive demand response[J]. Automation of Electric Power Systems, 2021, 45(3):15-23. | |
[10] | WANG J Y, SUN Z W, BAO B, et al. Malicious synchrophasor detection based on highly imbalanced historical operational data[J]. CSEE Journal of Power and Energy Systems, 2019, 5(1):11-20. |
[11] | 李艳霞, 柴毅, 胡友强, 等. 不平衡数据分类方法综述[J]. 控制与决策, 2019, 34(4):673-688. |
LI Yanxia, CHAI Yi, HU Youqiang, et al. Review of imbalanced data classification methods[J]. Control and Decision, 2019, 34(4):673-688. | |
[12] | 陈杰, 张浩天, 汤奕. 基于改进生成式对抗网络的电网异常数据辨识方法[J]. 电力建设, 2021, 42(5):9-15. |
CHEN Jie, ZHANG Haotian, TANG Yi. An abnormal data identification method based on improved generative adversarial network[J]. Electric Power Construction, 2021, 42(5):9-15. | |
[13] | 张阳, 张涛, 陈锦, 等. 基于SMOTE和机器学习的网络入侵检测[J]. 北京理工大学学报, 2019, 39(12):1258-1262. |
ZHANG Yang, ZHANG Tao, CHEN Jin, et al. Research on network intrusion detection based on SMOTE algorithm and machine learning[J]. Transactions of Beijing Institute of Technology, 2019, 39(12):1258-1262. | |
[14] | 石洪波, 陈雨文, 陈鑫. SMOTE过采样及其改进算法研究综述[J]. 智能系统学报, 2019, 14(6):1073-1083. |
SHI Hongbo, CHEN Yuwen, CHEN Xin. Summary of research on SMOTE oversampling and its improved algorithms[J]. CAAI Transactions on Intelligent Systems, 2019, 14(6):1073-1083. | |
[15] |
GOODFELLOW I, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial networks[J]. Communications of the ACM, 2020, 63(11):139-144.
doi: 10.1145/3422622 URL |
[16] | TANAKA F H K D S, ARANHA C. Data augmentation using GANs[EB/OL]. [2021-08-12]. https://arxiv.org/abs/1904.09135 |
[17] | ZHENG X T, WANG B, XIE L. Synthetic dynamic PMU data generation: A generative adversarial network approach[C]// 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). College Station, TX, USA: IEEE, 2019: 1-6. |
[18] | AHMADIAN S, MALKI H, HAN Z. Cyber attacks on smart energy grids using generative adverserial networks[C]// 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). Anaheim, CA, USA: IEEE, 2018: 942-946. |
[19] | MOHAMMADPOURFARD M, GHANAATPISHE F, MOHAMMADI M, et al. Generation of false data injection attacks using conditional generative adversarial networks[C]// 2020 IEEE PES Innovative Smart Grid Technologies Europe. Hague, Netherlands: IEEE, 2020: 41-45. |
[20] |
LI Y C, WANG Y Y, HU S Y. Online generative adversary network based measurement recovery in false data injection attacks: A cyber-physical approach[J]. IEEE Transactions on Industrial Informatics, 2020, 16(3):2031-2043.
doi: 10.1109/TII.2019.2921106 URL |
[21] | XU L, SKOULARIDOU M, CUESTA-INFANTE A, et al. Modeling tabular data using conditional GAN[DB/OL]. 2019(2019-01-01)[2021-08-12]. https://arxiv.org/abs/1907.00503v2. |
[22] | PATKI N, WEDGE R, VEERAMACHANENI K. The synthetic data vault[C]// 2016 IEEE International Conference on Data Science and Advanced Analytics. IEEE, 2016: 399-410. |
[23] | 赵渊, 刘庆尧, 邝俊威, 等. 电网可靠性评估中相关性变量的非参数R藤Copula模型[J]. 中国电机工程学报, 2020, 40(3):803-812. |
ZHAO Yuan, LIU Qingyao, KUANG Junwei, et al. A nonparametric regular vine copula model for multidimensional dependent variables in power system reliability assessment[J]. Proceedings of the CSEE, 2020, 40(3):803-812. | |
[24] | 王奕森, 夏树涛. 集成学习之随机森林算法综述[J]. 信息通信技术, 2018, 12(1):49-55. |
WANG Yisen, XIA Shutao. A survey of random forests algorithms[J]. Information and Communications Technologies, 2018, 12(1):49-55. | |
[25] |
CAMANA ACOSTA M R, AHMED S, GARCIA C E, et al. Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks[J]. IEEE Access, 2020, 8:19921-19933.
doi: 10.1109/ACCESS.2020.2968934 URL |
[26] | GULRAJANI I, ALMED F, ARJOVSKY M, et al. Improved training of wasserstein gans[DB/OL]. 2017(-03-31)[2021-0812]. https://arxiv.org/abs/1704.00028. |
[27] |
LIN Z N, KHETAN A, FANTI G, et al. PacGAN: The power of two samples in generative adversarial networks[J]. IEEE Journal on Selected Areas in Information Theory, 2020, 1(1):324-335.
doi: 10.1109/JSAIT.2020.2983071 URL |
[28] | SMITH M J, SALA C, KANTER J M, et al. The machine learning bazaar: Harnessing the ML ecosystem for effective system development[C]// SIGMOD’20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 2020: 785-800. |
[29] | BEAVER J M, BORGES-HINK R C, BUCKNER M A. An evaluation of machine learning methods to detect malicious SCADA communications[C]// 2013 12th International Conference on Machine Learning and Applications. IEEE, 2013: 54-59. |
[1] | LI Bin, WEI Yinwu, QI Bing, SUN Yi, CHEN Songsong. DDoS Attack Detection Method Based on EEMD-LSTM for Demand Response Terminal [J]. ELECTRIC POWER CONSTRUCTION, 2022, 43(4): 81-90. |
[2] | ZHANG Jie, LIU Yang, LI Wenfeng, WANG Lei, XU Lixiong. Power Load Curve Identification Method Based on Two-Phase Data Enhancement and Bi-directional Deep Residual TCN [J]. ELECTRIC POWER CONSTRUCTION, 2022, 43(2): 89-97. |
[3] | WANG Jingcai, LI Yan, XU Tianqi. Modeling of False Data Injection Attack and Rapid Screening of Vulnerable Lines Under Attack [J]. ELECTRIC POWER CONSTRUCTION, 2022, 43(1): 104-112. |
[4] | WANG Ruogu, CHEN Guo, WANG Xiuli, QIAN Tao, GAO Xin. Two-Stage Stochastic Unit Commitment Considering the Uncertainty of Wind Power and Electric Vehicle Travel Patterns [J]. ELECTRIC POWER CONSTRUCTION, 2021, 42(8): 63-70. |
[5] | CHEN Jie, ZHANG Haotian, TANG Yi. An Abnormal Data Identification Method Based on Improved Generative Adversarial Network [J]. ELECTRIC POWER CONSTRUCTION, 2021, 42(5): 9-15. |
[6] | ZHU Qing, ZHENG Hongjuan, TANG Ziyi, WEI Siya, ZOU Zixiao, WU Xi. Load Scenario Generation of Integrated Energy System Using Generative Adversarial Networks [J]. ELECTRIC POWER CONSTRUCTION, 2021, 42(12): 1-8. |
[7] | LIANG Xiurui, LIU Daowei, YANG Hongying, LI Weixing, SHAO Guanghui, XU Xingwei, WANG Kefei, LI Zonghan, ZHAO Gaoshang. Data-Driven Situation Assessment of Power System Static Voltage Stability [J]. Electric Power Construction, 2020, 41(1): 126-132. |
[8] | CAI Xingpu, WANG Qi, TAI Wei, LIU Keyan. A Multi-Stage Game Based Defense Method against False Data Injection Attack on Cyber Physical Power System [J]. Electric Power Construction, 2019, 40(5): 48-54. |
[9] | XIAO Zeqing, HUA Haochen, CAO Junwei. Overview of the Application of Artificial Intelligence in Energy Internet [J]. Electric Power Construction, 2019, 40(5): 63-70. |
[10] | YANG Yinan, QI Linhai, WANG Hong, SU Linping. Research on Generation Technology of Small Sample Data Based on Generative Adversarial Network [J]. Electric Power Construction, 2019, 40(5): 71-77. |
[11] | ZHOU Yue, TAN Bendong, LI Miao, YANG Xuan, ZHOU Qiangming, ZHANG Zhenxing, TAN Min, YANG Jun . Transient Stability Assessment of Power System Based on Deep Learning Technology [J]. Electric Power Construction, 2018, 39(2): 103-. |
[12] | DAI Yan, WANG Liuwang, LI Yuan, YAN Yong, HAN Jiajia, WEN Fushuan. A Brief Survey on Applications of New Generation Artificial Intelligence in Smart Grids [J]. Electric Power Construction, 2018, 39(10): 1-11. |
[13] |
ZHANG Chun, TIAN Fang, YU Zhihong, LI Yansong, ZHANG Shuang, TIAN Bei.
Application of Improved Sammon Mapping Algorithm in Input Features Validity Analysis of Transient Stability Assessment
[J]. Electric Power Construction, 2016, 37(12): 96-.
|
[14] | WANG Qin, JIANG Huaiguang,WEN Fushuan, MEI Tianhua. Concept, Technology and Challengs of Big Data in Smart Grids [J]. Electric Power Construction, 2016, 37(12): 1-. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
Copyright @ ELECTRIC POWER CONSTRUCTION Editorial Office
Address: Tower A225, SGCC, Future Science & Technology Park,Beijing, China Postcode:102209 Telephone:010-66602697
Technical support: Beijing Magtech Co.ltd support@magtech.com.cn