Upadhyay et al., 2023 - Google Patents
Comparative analysis of tabular generative adversarial network (GAN) models for generation and validation of power grid synthetic datasetsUpadhyay et al., 2023
- Document ID
- 16852873024407810863
- Author
- Upadhyay D
- Luo Q
- Manero J
- Zaman M
- Sampalli S
- Publication year
- Publication venue
- IEEE EUROCON 2023-20th International Conference on Smart Technologies
External Links
Snippet
The demand for securing SCADA (Supervisory Control and Data Acquisition)-based power grid systems from cyber-attacks has been increasing significantly in the last few years. Current research trends widely adopt Machine Learning (ML) techniques to prevent attacks …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mukherjee et al. | Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids | |
Viet et al. | Using deep learning model for network scanning detection | |
Vincent et al. | Detection of false data injection attacks in cyber–physical systems using graph convolutional network | |
Elsisi et al. | Design of reliable IoT systems with deep learning to support resilient demand side management in smart grids against adversarial attacks | |
Tasfi et al. | Deep neural networks with confidence sampling for electrical anomaly detection | |
Trevizan et al. | Data-driven physics-based solution for false data injection diagnosis in smart grids | |
Waghmare et al. | Data driven approach to attack detection in a cyber-physical smart grid system | |
Althobaiti et al. | Energy theft in smart grids: a survey on data-driven attack strategies and detection methods | |
Peng et al. | Localizing false data injection attacks in smart grid: A spectrum-based neural network approach | |
Raghuvamsi et al. | Detection and reconstruction of measurements against false data injection and DoS attacks in distribution system state estimation: A deep learning approach | |
Berghout et al. | EL-NAHL: Exploring labels autoencoding in augmented hidden layers of feedforward neural networks for cybersecurity in smart grids | |
Kesici et al. | Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks | |
Kawoosa et al. | Using machine learning ensemble method for detection of energy theft in smart meters | |
Almutairy et al. | Detection and mitigation of gps spoofing attacks on phasor measurement units using deep learning | |
Mukherjee | Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach | |
D'Angelo et al. | A stacked autoencoder‐based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems | |
Saheed et al. | ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems | |
Zhu et al. | Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions | |
Zideh et al. | An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids | |
Upadhyay et al. | Comparative analysis of tabular generative adversarial network (GAN) models for generation and validation of power grid synthetic datasets | |
Zhang et al. | Market-Level Integrated Detection Against Cyber Attacks in Real-Time Market Operations By Self-Supervised Learning | |
Murugesan et al. | Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid | |
Varshini et al. | Detection of Data Integrity Attack Using Model and Data‐Driven‐Based Approach in CPPS | |
Bai et al. | Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis | |
Alshaikh et al. | Advanced techniques for cyber threat intelligence-based APT detection and mitigation in cloud environments |