期刊文献+
共找到247篇文章
< 1 2 13 >
每页显示 20 50 100
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
1
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(fdi) attackS
在线阅读 下载PDF
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
2
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
Robust False Data Injection Identification Framework for Power Systems Using Explainable Deep Learning
3
作者 Ghadah Aldehim Shakila Basheer +1 位作者 Ala Saleh Alluhaidan Sapiah Sakri 《Computers, Materials & Continua》 2025年第11期3599-3619,共21页
Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors... Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors and operations are compromised,which can lead to big problems,disruptions,failures and blackouts.In response to this challenge,this paper presents a reliable and innovative detection framework that leverages Bidirectional Long Short-Term Memory(Bi-LSTM)networks and employs explanatory methods from Artificial Intelligence(AI).Not only does the suggested architecture detect potential fraud with high accuracy,but it also makes its decisions transparent,enabling operators to take appropriate action.Themethod developed here utilizesmodel-free,interpretable tools to identify essential input elements,thereby making predictions more understandable and usable.Enhancing detection performance is made possible by correcting class imbalance using Synthetic Minority Over-sampling Technique(SMOTE)-based data balancing.Benchmark power system data confirms that the model functions correctly through detailed experiments.Experimental results showed that Bi-LSTM+Explainable AI(XAI)achieved an average accuracy of 94%,surpassing XGBoost(89%)and Bagging(84%),while ensuring explainability and a high level of robustness across various operating scenarios.By conducting an ablation study,we find that bidirectional recursive modeling and ReLU activation help improve generalization and model predictability.Additionally,examining model decisions through LIME enables us to identify which features are crucial for making smart grid operational decisions in real time.The research offers a practical and flexible approach for detecting FDI attacks,improving the security of cyber-physical systems,and facilitating the deployment of AI in energy infrastructure. 展开更多
关键词 false data injection attacks bidirectional long short-term memory(Bi-LSTM) explainable AI(XAI) power systems
在线阅读 下载PDF
FDI Attack Detection and LLM-Assisted Resource Allocation for 6G Edge Intelligence-Empowered Distribution Power Grid
4
作者 Zhang Sunxuan Zhang Hongshuo +3 位作者 Zhou Wen Zhang Ruqi Yao Zijia Zhou Zhenyu 《China Communications》 2025年第7期58-73,共16页
The intelligent operation management of distribution services is crucial for the stability of power systems.Integrating the large language model(LLM)with 6G edge intelligence provides customized management solutions.H... The intelligent operation management of distribution services is crucial for the stability of power systems.Integrating the large language model(LLM)with 6G edge intelligence provides customized management solutions.However,the adverse effects of false data injection(FDI)attacks on the performance of LLMs cannot be overlooked.Therefore,we propose an FDI attack detection and LLM-assisted resource allocation algorithm for 6G edge intelligenceempowered distribution power grids.First,we formulate a resource allocation optimization problem.The objective is to minimize the weighted sum of the global loss function and total LLM fine-tuning delay under constraints of long-term privacy entropy and energy consumption.Then,we decouple it based on virtual queues.We utilize an LLM-assisted deep Q network(DQN)to learn the resource allocation strategy and design an FDI attack detection mechanism to ensure that fine-tuning remains on the correct path.Simulations demonstrate that the proposed algorithm has excellent performance in convergence,delay,and security. 展开更多
关键词 distribution power grids false data injection(fdi)attack large language model(LLM) resource allocation 6G edge intelligence
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
5
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control Hash algorithms false data injection attack
在线阅读 下载PDF
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:5
6
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(fdi)attacks remote state estimation stealthy attacks
在线阅读 下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:4
7
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 Cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
在线阅读 下载PDF
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:2
8
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULATORS remote kinematic control
在线阅读 下载PDF
Active resilient defense control against false data injection attacks in smart grids
9
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat false data injection attack Smart grids security Interval observer
原文传递
Security control of Markovian jump neural networks with stochastic sampling subject to false data injection attacks
10
作者 Lan Yao Xia Huang +1 位作者 Zhen Wang Min Xiao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第10期146-154,共9页
The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to rese... The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method. 展开更多
关键词 Markovian jumping neural networks stochastic sampling looped-functional false data injection attack
原文传递
Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition
11
作者 T.Satyanarayana Murthy P.Udayakumar +2 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期255-271,共17页
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation... The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%. 展开更多
关键词 false data injection attack security internet of things deep learning coot optimization algorithm
在线阅读 下载PDF
基于DACDiff的分布式电源调度控制系统FDIAs防御方法
12
作者 李元诚 孙鹤洋 +2 位作者 张桐 张贺方 杨立群 《信息网络安全》 北大核心 2025年第4期578-586,共9页
随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量... 随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量测数据干扰状态估计和调度决策,可能导致电力系统的不稳定、运行失误,甚至引发严重的电力事故。为确保新型电力系统的安全可靠运行,文章提出一种针对分布式电源调控FDIAs的DACDiff防御方法,该模型基于改进的条件扩散模型,采用DACformer作为去噪网络,采用双重注意力机制捕捉时间序列中的依赖性,通过上采样和多尺度设计更好保留数据特征,用高度逼真的生成数据替换受攻击影响的数据,以保证状态估计的连续性和调控指令的正确性。在电力数据集上的仿真实验结果表明,DACDiff模型在数据生成质量和防御能力方面表现优异,能够有效恢复受到FDIAs影响的分布式电源调控系统,提供了更优的安全性与稳定性。 展开更多
关键词 分布式电源调控 虚假数据注入攻击 主动防御 扩散模型 双重注意力机制
在线阅读 下载PDF
基于自适应差分进化-模糊宽度学习系统的FDIA定位检测方法
13
作者 席磊 陈洪军 +2 位作者 彭典名 王文卓 白芳岩 《中国电机工程学报》 北大核心 2025年第19期7468-7480,I0017,共14页
作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应... 作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应差分进化-模糊宽度学习系统的定位检测方法。所提算法采用具有横向网络结构的模糊宽度学习系统构成定位检测算法,实现定位检测的快速响应。同时,提出一种自适应差分进化算法对量测数据进行特征选择,剔除其中的冗余特征,有效地提升算法的定位检测精确性。在IEEE-14和57节点系统中进行大量仿真,验证所提方法能够对虚假数据注入攻击进行精确定位,且与多种传统检测算法相比,具有更佳的准确率、精度、召回率和F1-Score。 展开更多
关键词 能源互联网 电力信息物理系统 虚假数据注入攻击 模糊宽度学习系统 差分进化
原文传递
数据驱动算法的电力信息物理系统FDIA定位检测 被引量:1
14
作者 席磊 彭典名 +3 位作者 曹伟 陈洪军 白芳岩 王文卓 《中国电机工程学报》 北大核心 2025年第18期7110-7122,I0008,共14页
虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结... 虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结合为多层核极限学习机,逐层学习电力量测数据。然后,利用融合Tent映射和黄金正弦策略的哈里斯鹰算法为多层核极限学习机的参数寻优,提升寻优速度和收敛精度。最后,在IEEE-14和IEEE-118节点系统对所提算法进行仿真验证。结果表明,与其他算法相比,所提算法具有更优的检测速度、准确率、精确率、召回率和F1值,可快速精准定位受攻击节点。 展开更多
关键词 虚假数据注入攻击 电力信息物理系统 定位检测 哈里斯鹰优化算法 核极限学习机
原文传递
基于海马优化深层极限学习机的电力信息物理系统FDIA检测 被引量:2
15
作者 席磊 白芳岩 +3 位作者 王文卓 彭典名 陈洪军 李宗泽 《电力系统保护与控制》 北大核心 2025年第4期14-26,共13页
虚假数据注入攻击(false data injection attack,FDIA)严重威胁电力信息物理系统的安全稳定。针对已有FDIA检测算法无法精确定位受攻击位置的局限性,提出了一种基于精英余弦变异融合的海马优化算法优化深层极限学习机(deep extreme lear... 虚假数据注入攻击(false data injection attack,FDIA)严重威胁电力信息物理系统的安全稳定。针对已有FDIA检测算法无法精确定位受攻击位置的局限性,提出了一种基于精英余弦变异融合的海马优化算法优化深层极限学习机(deep extreme learning machine,DELM)的FDIA检测定位算法。首先,该算法将极限学习机和极限学习机自编码器相结合得到了具备强特征表达能力的DELM。然后,通过海马优化算法对DELM的偏置和输入权重进行择优,用于改善算法指标不稳定的问题。同时在捕食阶段引入精英余弦变异算法以提升海马的收敛速度与DELM的精度。最后,将系统量测数据作为输入特征,利用DELM得到节点状态标签,从而实现污染状态量的定位。通过在IEEE 14节点系统和IEEE 57节点系统进行大量仿真对比分析,验证了所提算法在准确率、精确率、召回率及F1值等检测定位性能方面均具有明显优势,能够实现FDIA的精确定位。 展开更多
关键词 电力信息物理系统 虚假数据注入攻击 海马优化算法 深层极限学习机
在线阅读 下载PDF
考虑FDIA的电力线通信赋能智慧园区时间同步方法
16
作者 张孙烜 薛佳朋 +4 位作者 刘昊东 周振宇 陈晓梅 吕磊 黄林 《中国电机工程学报》 北大核心 2025年第14期5443-5455,I0010,共14页
智慧园区新兴业务的信息采集及实时控制需要严格的时间同步作为前提,虚假数据注入攻击(false data injection attack,FDIA)对时间同步精度的影响不可忽视。如何通过电力线通信(power line communication,PLC)实现安全准确时间同步成为... 智慧园区新兴业务的信息采集及实时控制需要严格的时间同步作为前提,虚假数据注入攻击(false data injection attack,FDIA)对时间同步精度的影响不可忽视。如何通过电力线通信(power line communication,PLC)实现安全准确时间同步成为当前研究的重要问题。该文首先构建考虑FDIA的PLC赋能智慧园区时间同步网络,通过改进卡尔曼滤波修正时间同步误差;其次,以误差最小化为目标,建立站点时间同步问题;最后,提出基于改进深度Q网络的时间同步路由选择算法。所提算法能够根据FDIA概率动态学习时间同步路由选择策略,从而提高对未知状态的泛化能力。仿真验证表明,所提方法不仅能够显著提升FDIA检测的安全性能,同时可有效改善时间同步精度。 展开更多
关键词 智慧园区 时间同步 虚假数据注入攻击 电力线通信 改进深度Q网络 探索增强
原文传递
基于马尔可夫链的分布式智能电网FDIA检测方法
17
作者 易杨 华文韬 张永朋 《电气自动化》 2025年第5期108-112,共5页
针对当前分布式智能电网虚假数据注入攻击实时检测方法面临估计残差协方差矩阵不满秩的挑战,采用引入预白化技术的检测方法,降低估计残差矢量的维度,确保处理后的残差概率密度函数具备可计算性,优化实时虚假数据注入攻击检测机制。在此... 针对当前分布式智能电网虚假数据注入攻击实时检测方法面临估计残差协方差矩阵不满秩的挑战,采用引入预白化技术的检测方法,降低估计残差矢量的维度,确保处理后的残差概率密度函数具备可计算性,优化实时虚假数据注入攻击检测机制。在此基础上,分析时齐与非时齐马尔科夫链,推导了检测方法的虚警周期及平均检测时延的上限,为检测机制的稳定性和效率提供了理论依据。最后,在IEEE 14节点系统上验证所提方法的有效性。试验结果表明,所提方法在显著延长虚警周期的同时,成功实现了检测时延的大幅缩减,显著增强了智能电网安全防御能力。 展开更多
关键词 虚假数据注入攻击 攻击检测 分布式电网 检测时延 马尔可夫链
在线阅读 下载PDF
基于CCTGAN-OLGBM的电力CPS FDIAs检测方法
18
作者 薄小永 曲朝阳 +1 位作者 董运昌 王达 《计算机仿真》 2025年第6期124-128,202,共6页
电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)... 电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)相结合的FDIAs检测方法。首先改进提出了能够学习表格类样本数据的CCTGAN,然后通过引入焦点损失函数优化设计了OLGBM算法,并在此基础上提出了具备数据增强和攻击检测功能的FDIAs检测方法,最后通过算例分析验证了本文所提方法的有效性。 展开更多
关键词 生成对抗网络 电力信息物理系统 虚假数据注入攻击 攻击检测 数据驱动
在线阅读 下载PDF
基于反向鲸鱼-多隐层极限学习机的电网FDIA检测 被引量:5
19
作者 席磊 王艺晓 +2 位作者 何苗 程琛 田习龙 《中国电力》 CSCD 北大核心 2024年第9期20-31,共12页
针对目前已有的电力信息物理系统虚假数据注入攻击检测方法由于特征表达能力有限,而导致无法精确获取受攻击位置的问题,提出一种基于反向学习鲸鱼优化多隐层极限学习机的虚假数据注入攻击定位检测方法。所提方法不仅将极限学习机拓展为... 针对目前已有的电力信息物理系统虚假数据注入攻击检测方法由于特征表达能力有限,而导致无法精确获取受攻击位置的问题,提出一种基于反向学习鲸鱼优化多隐层极限学习机的虚假数据注入攻击定位检测方法。所提方法不仅将极限学习机拓展为多隐层神经网络,解决其特征表达能力有限的问题,而且引入鲸鱼优化算法对多隐层极限学习机的各隐层神经元个数进行寻优并采用反向学习策略提高其收敛速度和检测精度,以防止随机确定各隐层神经元个数对检测方法的泛化性能和定位检测结果造成影响。通过在不同场景下对IEEE-14和57节点测试系统进行大量实验,验证了所提方法能够通过历史数据自动识别受攻击的系统状态量所对应的精确位置。与其他多种方法相比,所提方法具有更优的精度、召回率和F1值。 展开更多
关键词 电力信息物理系统 虚假数据注入攻击 多隐层极限学习机 鲸鱼优化 反向学习
在线阅读 下载PDF
Detection and Defense Method Against False Data Injection Attacks for Distributed Load Frequency Control System in Microgrid 被引量:1
20
作者 Zhixun Zhang Jianqiang Hu +3 位作者 Jianquan Lu Jie Yu Jinde Cao Ardak Kashkynbayev 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第3期913-924,共12页
In the realm of microgrid(MG),the distributed load frequency control(LFC)system has proven to be highly susceptible to the negative effects of false data injection attacks(FDIAs).Considering the significant responsibi... In the realm of microgrid(MG),the distributed load frequency control(LFC)system has proven to be highly susceptible to the negative effects of false data injection attacks(FDIAs).Considering the significant responsibility of the distributed LFC system for maintaining frequency stability within the MG,this paper proposes a detection and defense method against unobservable FDIAs in the distributed LFC system.Firstly,the method integrates a bi-directional long short-term memory(Bi LSTM)neural network and an improved whale optimization algorithm(IWOA)into the LFC controller to detect and counteract FDIAs.Secondly,to enable the Bi LSTM neural network to proficiently detect multiple types of FDIAs with utmost precision,the model employs a historical MG dataset comprising the frequency and power variances.Finally,the IWOA is utilized to optimize the proportional-integral-derivative(PID)controller parameters to counteract the negative impacts of FDIAs.The proposed detection and defense method is validated by building the distributed LFC system in Simulink. 展开更多
关键词 MICROGRID load frequency control false data injection attack bi-directional long short-term memory(BiLSTM)neural network improved whale optimization algorithm(IWOA) detection and defense
原文传递
上一页 1 2 13 下一页 到第
使用帮助 返回顶部