[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Upadhyay et al., 2023 - Google Patents

Comparative analysis of tabular generative adversarial network (GAN) models for generation and validation of power grid synthetic datasets

Upadhyay et al., 2023

Document ID
16852873024407810863
Author
Upadhyay D
Luo Q
Manero J
Zaman M
Sampalli S
Publication year
Publication venue
IEEE EUROCON 2023-20th International Conference on Smart Technologies

External Links

Snippet

The demand for securing SCADA (Supervisory Control and Data Acquisition)-based power grid systems from cyber-attacks has been increasing significantly in the last few years. Current research trends widely adopt Machine Learning (ML) techniques to prevent attacks …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Similar Documents

Publication Publication Date Title
Mukherjee et al. Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids
Viet et al. Using deep learning model for network scanning detection
Vincent et al. Detection of false data injection attacks in cyber–physical systems using graph convolutional network
Elsisi et al. Design of reliable IoT systems with deep learning to support resilient demand side management in smart grids against adversarial attacks
Tasfi et al. Deep neural networks with confidence sampling for electrical anomaly detection
Trevizan et al. Data-driven physics-based solution for false data injection diagnosis in smart grids
Waghmare et al. Data driven approach to attack detection in a cyber-physical smart grid system
Althobaiti et al. Energy theft in smart grids: a survey on data-driven attack strategies and detection methods
Peng et al. Localizing false data injection attacks in smart grid: A spectrum-based neural network approach
Raghuvamsi et al. Detection and reconstruction of measurements against false data injection and DoS attacks in distribution system state estimation: A deep learning approach
Berghout et al. EL-NAHL: Exploring labels autoencoding in augmented hidden layers of feedforward neural networks for cybersecurity in smart grids
Kesici et al. Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks
Kawoosa et al. Using machine learning ensemble method for detection of energy theft in smart meters
Almutairy et al. Detection and mitigation of gps spoofing attacks on phasor measurement units using deep learning
Mukherjee Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach
D'Angelo et al. A stacked autoencoder‐based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems
Saheed et al. ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
Zhu et al. Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions
Zideh et al. An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids
Upadhyay et al. Comparative analysis of tabular generative adversarial network (GAN) models for generation and validation of power grid synthetic datasets
Zhang et al. Market-Level Integrated Detection Against Cyber Attacks in Real-Time Market Operations By Self-Supervised Learning
Murugesan et al. Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid
Varshini et al. Detection of Data Integrity Attack Using Model and Data‐Driven‐Based Approach in CPPS
Bai et al. Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis
Alshaikh et al. Advanced techniques for cyber threat intelligence-based APT detection and mitigation in cloud environments