期刊文献+
共找到247篇文章
< 1 2 13 >
每页显示 20 50 100
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
1
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
2
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(FDI) attacks
在线阅读 下载PDF
Robust False Data Injection Identification Framework for Power Systems Using Explainable Deep Learning
3
作者 Ghadah Aldehim Shakila Basheer +1 位作者 Ala Saleh Alluhaidan Sapiah Sakri 《Computers, Materials & Continua》 2025年第11期3599-3619,共21页
Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors... Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors and operations are compromised,which can lead to big problems,disruptions,failures and blackouts.In response to this challenge,this paper presents a reliable and innovative detection framework that leverages Bidirectional Long Short-Term Memory(Bi-LSTM)networks and employs explanatory methods from Artificial Intelligence(AI).Not only does the suggested architecture detect potential fraud with high accuracy,but it also makes its decisions transparent,enabling operators to take appropriate action.Themethod developed here utilizesmodel-free,interpretable tools to identify essential input elements,thereby making predictions more understandable and usable.Enhancing detection performance is made possible by correcting class imbalance using Synthetic Minority Over-sampling Technique(SMOTE)-based data balancing.Benchmark power system data confirms that the model functions correctly through detailed experiments.Experimental results showed that Bi-LSTM+Explainable AI(XAI)achieved an average accuracy of 94%,surpassing XGBoost(89%)and Bagging(84%),while ensuring explainability and a high level of robustness across various operating scenarios.By conducting an ablation study,we find that bidirectional recursive modeling and ReLU activation help improve generalization and model predictability.Additionally,examining model decisions through LIME enables us to identify which features are crucial for making smart grid operational decisions in real time.The research offers a practical and flexible approach for detecting FDI attacks,improving the security of cyber-physical systems,and facilitating the deployment of AI in energy infrastructure. 展开更多
关键词 false data injection attacks bidirectional long short-term memory(Bi-LSTM) explainable AI(XAI) power systems
在线阅读 下载PDF
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:5
4
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(FDI)attacks remote state estimation stealthy attacks
在线阅读 下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:4
5
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 Cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
在线阅读 下载PDF
Active resilient defense control against false data injection attacks in smart grids
6
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense Attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat false data injection attack Smart grids security Interval observer
原文传递
Security control of Markovian jump neural networks with stochastic sampling subject to false data injection attacks
7
作者 Lan Yao Xia Huang +1 位作者 Zhen Wang Min Xiao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第10期146-154,共9页
The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to rese... The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method. 展开更多
关键词 Markovian jumping neural networks stochastic sampling looped-functional false data injection attack
原文传递
基于DACDiff的分布式电源调度控制系统FDIAs防御方法
8
作者 李元诚 孙鹤洋 +2 位作者 张桐 张贺方 杨立群 《信息网络安全》 北大核心 2025年第4期578-586,共9页
随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量... 随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量测数据干扰状态估计和调度决策,可能导致电力系统的不稳定、运行失误,甚至引发严重的电力事故。为确保新型电力系统的安全可靠运行,文章提出一种针对分布式电源调控FDIAs的DACDiff防御方法,该模型基于改进的条件扩散模型,采用DACformer作为去噪网络,采用双重注意力机制捕捉时间序列中的依赖性,通过上采样和多尺度设计更好保留数据特征,用高度逼真的生成数据替换受攻击影响的数据,以保证状态估计的连续性和调控指令的正确性。在电力数据集上的仿真实验结果表明,DACDiff模型在数据生成质量和防御能力方面表现优异,能够有效恢复受到FDIAs影响的分布式电源调控系统,提供了更优的安全性与稳定性。 展开更多
关键词 分布式电源调控 虚假数据注入攻击 主动防御 扩散模型 双重注意力机制
在线阅读 下载PDF
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:2
9
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULATORS remote kinematic control
在线阅读 下载PDF
Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition
10
作者 T.Satyanarayana Murthy P.Udayakumar +2 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期255-271,共17页
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation... The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%. 展开更多
关键词 false data injection attack security internet of things deep learning coot optimization algorithm
在线阅读 下载PDF
基于CCTGAN-OLGBM的电力CPS FDIAs检测方法
11
作者 薄小永 曲朝阳 +1 位作者 董运昌 王达 《计算机仿真》 2025年第6期124-128,202,共6页
电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)... 电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)相结合的FDIAs检测方法。首先改进提出了能够学习表格类样本数据的CCTGAN,然后通过引入焦点损失函数优化设计了OLGBM算法,并在此基础上提出了具备数据增强和攻击检测功能的FDIAs检测方法,最后通过算例分析验证了本文所提方法的有效性。 展开更多
关键词 生成对抗网络 电力信息物理系统 虚假数据注入攻击 攻击检测 数据驱动
在线阅读 下载PDF
Detection and Defense Method Against False Data Injection Attacks for Distributed Load Frequency Control System in Microgrid 被引量:1
12
作者 Zhixun Zhang Jianqiang Hu +3 位作者 Jianquan Lu Jie Yu Jinde Cao Ardak Kashkynbayev 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第3期913-924,共12页
In the realm of microgrid(MG),the distributed load frequency control(LFC)system has proven to be highly susceptible to the negative effects of false data injection attacks(FDIAs).Considering the significant responsibi... In the realm of microgrid(MG),the distributed load frequency control(LFC)system has proven to be highly susceptible to the negative effects of false data injection attacks(FDIAs).Considering the significant responsibility of the distributed LFC system for maintaining frequency stability within the MG,this paper proposes a detection and defense method against unobservable FDIAs in the distributed LFC system.Firstly,the method integrates a bi-directional long short-term memory(Bi LSTM)neural network and an improved whale optimization algorithm(IWOA)into the LFC controller to detect and counteract FDIAs.Secondly,to enable the Bi LSTM neural network to proficiently detect multiple types of FDIAs with utmost precision,the model employs a historical MG dataset comprising the frequency and power variances.Finally,the IWOA is utilized to optimize the proportional-integral-derivative(PID)controller parameters to counteract the negative impacts of FDIAs.The proposed detection and defense method is validated by building the distributed LFC system in Simulink. 展开更多
关键词 MICROGRID load frequency control false data injection attack bi-directional long short-term memory(BiLSTM)neural network improved whale optimization algorithm(IWOA) detection and defense
原文传递
Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks
13
作者 Yue-Ming Wang Yuan-Xin Li 《Journal of Control and Decision》 EI 2024年第1期50-59,共10页
In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation ... In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation mechanism is introduced in the backstepping control design to mitigate the effect of FDI attacks.Secondly,to solve the unknown sign time-varying statefeedback gains aroused by the FDI attacks,a type of Nussbaum function is employed in the adaptive security control.Then,by constructing a barrier Lyapunov function,it can be ensured that all signals of controlled system are bounded and the time-varying state constraints are not transgressed.Finally,the provided simulation examples demonstrate the effectiveness of the proposed controller. 展开更多
关键词 Neural networks backstepping technology false data injection(FDI)attacks nonlinear cyber-physical systems controls
原文传递
重载群组列车自组织网络系统虚假数据注入攻击检测方法 被引量:1
14
作者 宋宗莹 杨迎泽 +2 位作者 王兴中 于晓泉 李烁 《铁路计算机应用》 2025年第6期40-44,共5页
针对重载群组列车自组织网络系统(简称:自组织网络系统)因其高度互联性面临虚假数据注入攻击的问题,设计了一种基于回声状态网络的虚假数据注入攻击检测方法。通过构建自组织网络系统的信息物理模型,设计相应的协同控制策略,确保列车组... 针对重载群组列车自组织网络系统(简称:自组织网络系统)因其高度互联性面临虚假数据注入攻击的问题,设计了一种基于回声状态网络的虚假数据注入攻击检测方法。通过构建自组织网络系统的信息物理模型,设计相应的协同控制策略,确保列车组间的速度同步与安全间距。仿真实验表明,该方法成功检测出不同情境下的虚假数据注入攻击,为重载群组列车自组织网络系统提供了有效的安全保障,为铁路运输系统智能化发展提供支撑。 展开更多
关键词 协同控制 虚假数据注入攻击 攻击检测 重载群组列车 自组织网络系统
在线阅读 下载PDF
具有网络攻击防御力的DG变流器设计及其分布式控制
15
作者 韦永军 覃秋密 《电源学报》 北大核心 2025年第5期112-120,共9页
为了降低控制系统对通信网络的依赖性,直流微电网DC-MG(DC microgrid)通常采用分布式控制架构,然而由于缺乏全局信息,这种控制方式极易受到网络攻击,使得DC-MG存在较大安全隐患。网络攻击的种类较多,其中虚假数据注入攻击FDIA(false dat... 为了降低控制系统对通信网络的依赖性,直流微电网DC-MG(DC microgrid)通常采用分布式控制架构,然而由于缺乏全局信息,这种控制方式极易受到网络攻击,使得DC-MG存在较大安全隐患。网络攻击的种类较多,其中虚假数据注入攻击FDIA(false data injection attack)占比最高,其危害性也最大。基于此,针对FDIA造成DC-MG运行中断等不稳定问题,提出了1种基于前馈神经网络FNN(feedforward neural network)的DC-MG网络攻击检测与控制方法。该方法首先研究了FDIA造成控制系统不稳定的影响机理,建立了FDIA不稳定影响的数学模型;然后,利用FNN构建了智能估计器来监测DC-MG中分布式电源变换器的输出电流,并根据估计器的输出计算出FDIA的错误数据值;接着,针对错误数据的计算值,引入基于PI控制器的参考跟踪方法,以减少被攻击转换器中的错误数据,此外,所提方法还可消除所有高域不平衡攻击;最后,分别在MATLAB/Simulink和OPAL-RT环境下对所提方法进行了仿真和实验验证,仿真实验结果验证了所提方法的有效性。 展开更多
关键词 直流微网 虚假数据注入攻击 前馈神经网络 网络攻击
在线阅读 下载PDF
基于自适应差分进化-模糊宽度学习系统的FDIA定位检测方法
16
作者 席磊 陈洪军 +2 位作者 彭典名 王文卓 白芳岩 《中国电机工程学报》 北大核心 2025年第19期7468-7480,I0017,共14页
作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应... 作为能源互联网的关键组成部分,电力信息物理系统面临着虚假数据注入攻击的威胁。针对此类攻击的检测技术往往忽视攻击注入位置的定位检测,而试图解决这一问题的研究难以在检测精度和计算时间上取得平衡。因此,该文提出一种基于自适应差分进化-模糊宽度学习系统的定位检测方法。所提算法采用具有横向网络结构的模糊宽度学习系统构成定位检测算法,实现定位检测的快速响应。同时,提出一种自适应差分进化算法对量测数据进行特征选择,剔除其中的冗余特征,有效地提升算法的定位检测精确性。在IEEE-14和57节点系统中进行大量仿真,验证所提方法能够对虚假数据注入攻击进行精确定位,且与多种传统检测算法相比,具有更佳的准确率、精度、召回率和F1-Score。 展开更多
关键词 能源互联网 电力信息物理系统 虚假数据注入攻击 模糊宽度学习系统 差分进化
原文传递
针对信息物理系统远程状态估计的隐蔽虚假数据注入攻击 被引量:1
17
作者 金增旺 刘茵 +3 位作者 刁靖东 王震 孙长银 刘志强 《自动化学报》 北大核心 2025年第2期356-365,共10页
从攻击者的角度探讨信息物理系统(Cyber-physical system,CPS)中隐蔽虚假数据注入(False data injection,FDI)攻击的最优策略.选取Kullback-Leibler(K-L)散度作为攻击隐蔽性的评价指标,设计攻击信号使得攻击保持隐蔽且最大程度地降低CP... 从攻击者的角度探讨信息物理系统(Cyber-physical system,CPS)中隐蔽虚假数据注入(False data injection,FDI)攻击的最优策略.选取Kullback-Leibler(K-L)散度作为攻击隐蔽性的评价指标,设计攻击信号使得攻击保持隐蔽且最大程度地降低CPS远程状态估计的性能.首先,利用残差的统计特征计算远程状态估计误差协方差,将FDI最优策略问题转化为二次约束优化问题.其次,在攻击隐蔽性的约束下,运用拉格朗日乘子法及半正定规划推导出最优策略.最后,通过仿真实验验证所提方法与现有方法相比在隐蔽性方面具有显著优势. 展开更多
关键词 信息物理系统 虚假数据注入攻击 Kullback-Leibler散度 远程状态估计
在线阅读 下载PDF
基于最大信息系数-双层置信极端梯度提升树的电网虚假数据注入攻击定位检测 被引量:4
18
作者 席磊 王文卓 +3 位作者 白芳岩 陈洪军 彭典名 李宗泽 《电网技术》 北大核心 2025年第2期824-833,I0112-I0114,共13页
面向高维复杂的电力量测数据,现有攻击定位检测方法存在定位精度差的问题。为此该文提出一种基于最大信息系数-双层置信极端梯度提升树的电网虚假数据注入攻击定位检测方法。所提方法引入最大信息系数对量测数据进行特征选择,能够非线... 面向高维复杂的电力量测数据,现有攻击定位检测方法存在定位精度差的问题。为此该文提出一种基于最大信息系数-双层置信极端梯度提升树的电网虚假数据注入攻击定位检测方法。所提方法引入最大信息系数对量测数据进行特征选择,能够非线性地衡量数据特征之间的关联性,且公平地根据一个特征变量中包含另一个特征变量的信息量来去除冗余特征,有效解决虚假数据注入攻击定位检测方法普遍面临的量测数据高维冗余问题;同时提出一种具有正反馈信息传递作用的双层置信极端梯度提升树来对各节点状态进行分类,通过结合电网拓扑关系学习标签相关性,从而有选择性地利用前序标签有效预测信息,来减少后续分类器学习到的前序标签预测信息中包含的错误,最终实现对受攻击位置的精确定位。在IEEE-14、IEEE-57节点系统上进行大量仿真,算例结果验证了所提方法的有效性,且相较于其他方法具有更高的准确率、精度、召回率、F1值和AUC(area under curve)值。 展开更多
关键词 虚假数据注入攻击 最大信息系数 双层置信 极端梯度提升树 标签相关性
原文传递
基于改进卷积神经网络的电网虚假数据注入攻击定位方法 被引量:2
19
作者 席磊 程琛 田习龙 《南方电网技术》 北大核心 2025年第1期74-84,共11页
虚假数据注入攻击通过篡改数据采集与监视控制系统采集的数据,进而破坏电力系统的稳定运行。传统虚假数据注入攻击检测方法无法对受攻击位置进行定位,亦或定位精度低。首先提出一种改进海鸥优化卷积神经网络的虚假数据注入攻击检测方法... 虚假数据注入攻击通过篡改数据采集与监视控制系统采集的数据,进而破坏电力系统的稳定运行。传统虚假数据注入攻击检测方法无法对受攻击位置进行定位,亦或定位精度低。首先提出一种改进海鸥优化卷积神经网络的虚假数据注入攻击检测方法,所提方法利用具有共享权值和局部连接特性的卷积神经网络来对高维历史量测数据进行高效的特征提取及分类。然后引入具备平衡全局搜索和局部搜索能力的改进海鸥优化算法进行超参数寻优,以获得虚假数据检测的高度匹配网络结构,进而对不良数据进行检测和定位。最后通过对IEEE-14和IEEE-57节点系统进行大量攻击检测实验,验证了所提方法的有效性,并与其他多种检测方法对比,验证了所提方法的具有更优的分类性能、更高的准确率、精度、召回率和F1值。 展开更多
关键词 虚假数据注入攻击 电力系统 卷积神经网络 海鸥优化 数据检测
在线阅读 下载PDF
数据驱动算法的电力信息物理系统FDIA定位检测 被引量:1
20
作者 席磊 彭典名 +3 位作者 曹伟 陈洪军 白芳岩 王文卓 《中国电机工程学报》 北大核心 2025年第18期7110-7122,I0008,共14页
虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结... 虚假数据注入攻击严重威胁电力信息物理系统的安全。针对传统攻击检测方法无法高精度识别攻击并快速定位受攻击节点的问题,该文提出一种数据驱动算法的电力信息物理系统虚假数据注入攻击定位检测方法。首先,将核极限学习机与自编码器结合为多层核极限学习机,逐层学习电力量测数据。然后,利用融合Tent映射和黄金正弦策略的哈里斯鹰算法为多层核极限学习机的参数寻优,提升寻优速度和收敛精度。最后,在IEEE-14和IEEE-118节点系统对所提算法进行仿真验证。结果表明,与其他算法相比,所提算法具有更优的检测速度、准确率、精确率、召回率和F1值,可快速精准定位受攻击节点。 展开更多
关键词 虚假数据注入攻击 电力信息物理系统 定位检测 哈里斯鹰优化算法 核极限学习机
原文传递
上一页 1 2 13 下一页 到第
使用帮助 返回顶部