Abstract
In a smart grid, state estimation (SE) is a very important component of energy management system. Its main functions include system SE and detection of cyber anomalies. Recently, it has been shown that conventional SE techniques are vulnerable to false data injection (FDI) attack, which is a sophisticated new class of attacks on data integrity in smart grid. The main contribution of this paper is to propose a new FDI attack detection technique using a new data-driven SE model, which is different from the traditional weighted least square based SE model. This SE model has a number of unique advantages compared with traditional SE models. First, the prediction technique can better maintain the inherent temporal correlations among consecutive measurement vectors. Second, the proposed SE model can learn the actual power system states. Finally, this paper shows that this SE model can be effectively used to detect FDI attacks that otherwise remain stealthy to traditional SE-based bad data detectors. The proposed FDI attack detection technique is evaluated on a number of standard bus systems. The performance of state prediction and the accuracy of FDI attack detection are benchmarked against the state-of-the-art techniques. Experimental results show that the proposed FDI attack detection technique has a higher detection rate compared with the existing techniques while reducing the false alarms significantly.
THE emergence of cutting-edge information and communication technology with the power grid has transformed the energy ecosystem into the current arena of cyber-physical system known as the smart grid. However, their integration into the power grid has also brought a great number of vulnerabilities that pose breaches of data integrity, confidentiality, availability, and so forth. Threats to the smart grid can take many forms, from compromising meter reading, carrying out remote attacks against communication protocols, to compromising power system state estimation (SE) results.
Weighted least squares (WLS) [
The main motivation of this paper is the challenge of existing SEs against the incumbent FDI attack. Besides, because of the inherent complexity of power systems, the sheer volume of data and the fact that high-performance computing devices are becoming available, data-driven techniques are increasingly powering various applications of the smart grid. For example, [
The main contributions of this paper are summarized as follows. ① A model is developed for the state prediction and a KL distance is derived as an attack detection metric. ② Experiments have been conducted considering attack-free scenario and a wide range of false data attack scenarios. In the proposed model, a false data attack alert is generated when the computed KL value of the predicted states is greater than a decision threshold. One of the main reasons why existing BDD techniques fail to detect FDI attack is that the dissimilarity measure (i.e., residual vectors of the SE) after the attack drops below the threshold of BDD. However, our proposed FDI attack detection technique is capable of adjusting the detection threshold adaptive using the probability distributions between estimated states and previously known attack-free states. ③ In addition, the experiments incorporate medium- to large-scale power system transmission networks (namely 39-, 118-, 300-, and 500-bus systems) to evaluate the scalability of the proposed state prediction model. Besides, the proposed model has been evaluated towards network topology changes and compared with the WLS-based SE models. ④ Moreover, the numerical results show that the proposed model can perform estimations very similar to the results of the WLS estimator. The estimation error in terms of mean square error (MSE) of the predictive SE and the WLS is in the order of , which is acceptable [
The remainder of this paper is organized as follows. First, the background on measurement models and security of the power system SE is briefly presented. Next, Section II reviews the existing literature where related works of existing SE techniques and FDI attack detection techniques are discussed in Sections II-A and II-B, respectively. Section III discusses the architecture and methodology of the proposed SPAD framework and covers comprehensively each method of state prediction and SPAD. Section IV illustrates the experimental setup and performance evaluation of the proposed state prediction. Moreover, the adversary models used within the proposed SPAD framework are examined in Section V. Further, Section VI presents the numerical results and discussion of the proposed SPAD framework. Finally, this paper is concluded in Section VII.
In a control center, an SE aims to obtain optimum system states based on the received measurements. The m-dimensional measurement vector y can be formulated through a non-linear AC model or a linearised DC model [
Various SE methods have been reported in the literature. Reference [
and LNR are two mostly used attack detectors in the SE. However, it has been shown earlier that they are vulnerable to FDI attack. A considerable amount of research has been done in the mitigation strategy against FDI attack and can be broadly classified into three main categories: protection, detection based on SE, and detection based on ML [
Statistical-based detection schemes [
Type | Comparison attributes | [ | [ | [ | [ | Proposed |
---|---|---|---|---|---|---|
SE | Approach | WLS | WLS | WLS | WLS | Data-driven |
Power flow model | AC | AC | AC | AC | DC and AC | |
Estimation performance | Not considered | Not considered | Not considered | Not considered | Considered | |
Computational efficiency | Low | Low | Low | Low | Low | |
Detection | Proposed detection approach | Detection of FDI using KL distance | Detection of FDI using KL distance and joint image processing | Detection of FDI using JS distance | Detection of energy theft using JS distance | Detection of FDI using predictive SE and KL distance |
Probability distribution based on | Estimated measurements | Estimated measurements | Estimated measurements | Estimated measurements | Predicted states | |
Adaptive threshold | Not considered | Not considered | Not considered | Not considered | Considered | |
Detection performance | Detection parameter | , FPR | FPR v.s. TPR | FPR v.s. TPR | ||
Detection accuracy | High | High | Unknown | Unknown | Very high | |
AUC | Not considered | Not considered | Not considered | Not considered | Considered | |
Recall | Not considered | Not considered | Not considered | Not considered | Considered | |
Precision | Not considered | Not considered | Not considered | Not considered | Considered |
In summary, this paper is unique in the following aspects. One of the key differences lies on the SE method. We have taken the unique FDI attack detection technique using predictive SE, which is different from the existing WLS-based FDI attack detection techniques. The main idea is to avoid WLS-based SE, which is vulnerable to the majority of stealthy FDI attacks. The other feature of this paper is based on the detection threshold. If the detection threshold is relatively high, existing detectors will incorrectly report a false negative, and existing detectors report a false positive when the threshold is very small. This can be challenging especially when the malicious user can inject sparse attack vectors into the measurements. The proposed binary classification algorithm uses adaptive detection threshold using probability distributions of the normal and attack data. Instead of using a default threshold obtained from the KL distance metric, the detector is evaluated using a number of thresholds, where one that results in the optimal detection performance is selected as the optimal decision threshold. Furthermore, unlike existing works on the KL-based detectors, this paper has evaluated a number of detection performance metrics including receiver operating characteristic (ROC) curve, AUC, recall, and precision.

Fig. 1 Block diagram of power system SE and attack detection. (a) Considering conventional framework. (b) Considering proposed SPAD framework.
Conventional SE requires network topology processing [
Assumption 1 (topology parameter settings) In one training instance, it is assumed that the topology parameter does not change.
Assumption 1 implies that only one topology parameter is active at any point of time instead of combining the different network topology configurations. In other words, the topology parameter does not change for a configuration considered, and each training procedure is associated with each setup of system configuration. Hence, the datasets are created following the network topology configurations identified by the network topology processor, and are stored in the database of the control center.
For the implementation of the proposed SPAD framework, two DNN concepts namely DRNN and deep feed forward NN (DFFNN) are used. The proposed framework includes three modular elements, namely data acquisition and pre-processing module, predictive SE module (i.e., Stage 1), and the FDI detection attack module (i.e., Stage 2). These are discussed in the following subsections.
In real-world scenarios, field devices installed over transmission networks measure electrical quantities, and relay their readings to the control centre through IEDs (e.g., Fig. ). In a typical modern EMS, system operators store plenty of historical measurement data in database systems for a variety of applications such as monitoring and security tools [
Further, real-time power load data are used which are obtained from Global Energy Forecasting Competition 2012 [
The objective of the proposed state prediction model is to infer x based on y. The model is trained using a training data sequence given by . As mentioned previously, real-time power load data are used that span a range of time intervals. Hence, the matrix notations Y and X are used for the training and testing, respectively, where , and .
Algorithm 1 : power system state prediction |
---|
1: procedure (Y) 2: function Read network topology configuration for to do if then load {(Y, X)} corresponding to end if end for end function Initialize , , , 3: 80%() 4: 20%() 5: Configure model hyperparameters 6: Compute non-linear activation functions 7: Compute loss function over forward loop 8: repeat 9: Using optimiser and 10: Backprop errors, Update 11: function (trainingSet) 12: for each feature of training set do 13: 14: return 15: end for 16: end function 17: function 18: for each feature of test set do 19: 20: return 21: end for 22: end function 23: end repeat until model improved 24: function 25: for to do 26: Obtain , 27: return 28: end for 29: end function 30: end procedure |
Assumption 2 (network topology configurations) The power grid considered has a finite number of network topology configurations denoted by . Suppose is the index of the configurations with .
The ESTIMATE(Y) procedure in
Before training the model using the function, hyperparameters such as optimizer, batch size (represented as batchSize), and learning rate (represented as learningRate), etc. are configured in each layer and weights are initialized using the Xavier normal distribution [
RNNs are a class of NNs specialised for predicting a sequence of data involving time. In contrast to FFNNs, RNNs allow cyclical connections that can map to each output from previous inputs. Theoretical and experimental evidences [
For a given observation time and number of features , the training sequence for the network model is denoted as . The construction of the model is defined through functions between the input, hidden, and output layers. The neuron at the hidden layer (represented by , where is the number of the hidden neurons) receives the input vector of y and hidden neurons of the previous state. This is represented by (1).
(1) |
where is the non-linear activation function of the
The KL distance is applied in numerous cases [
Definition 1 (state variation) The state variation () is the difference between two consecutive states given by where and denote the current and previous time instants, respectively. Let and be the probability distribution of the previous and the predicted current , respectively.
Remark 1 After computation of and in Definition 1, the KL distance from to can be expressed mathematically as:
(2) |
Definition 2 (KL distance) is a non-negative number, and can be defined as:
(3) |
Remark 2 of Definition 2 is asymmetrical, meaning that:
(4) |
Definition 3 (attack detection) The FDI anomaly detection is formulated as a binary classification problem (defined by (5)) as our aim is to classify measurement samples into normal and FDI attack classes.
(5) |
where is obtained from a statistical estimation based on the confidence interval.
The confidence interval is given by:
(6) |
where is the mean of the set of KL values; z is a value obtained corresponding to each detection confidence level as given in Table I; and is the standard deviation of samples with a sample size of .
(%) | z value |
---|---|
90.0 | 1.645 |
95.0 | 1.960 |
98.0 | 2.330 |
99.0 | 2.576 |
99.5 | 2.807 |
99.9 | 3.291 |
The attack detection algorithm is trained through predicted states of the normal traffic, and evaluated using both normal and bad data injected traffics.
(%) | z value | KL threshold | |
---|---|---|---|
Without attack | With attack | ||
95.0 | 2.330 | 0.0653 | 2.4637 |
98.0 | 2.576 | 0.0684 | 2.4891 |
99.0 | 2.807 | 0.0695 | 2.4975 |
99.5 | 3.291 | 0.0700 | 2.5017 |
99.9 | 3.291 | 0.0704 | 2.5051 |
(%) | z value | KL threshold | |
---|---|---|---|
Without attack | With attack | ||
95.0 | 1.960 | 0.2223 | 2.0764 |
98.0 | 2.330 | 0.2262 | 2.0992 |
99.0 | 2.576 | 0.2275 | 2.1068 |
99.5 | 2.807 | 0.2282 | 2.1106 |
99.9 | 3.291 | 0.2287 | 2.1136 |
Algorithm 2 : FDI attack detection |
---|
1: Input: 2: procedure 3: function 4: for each y in Y do 5: Evaluate using Algorithm 1 6: Evaluate as well as 7: 8: Evaluate using (6) and 9: return 10: end for 11: end function 12: function (y) 13: for each smart meter measurement do 14: Compute and 15: 16: if then FDI attack detected 17: end if 18: if then no FDI attack detected 19: end if 20: end for 21: end function 22: end procedure |
In this section, justifications through numerical simulations of the proposed state prediction are presented.
The data from four power grid standard test systems, i.e., IEEE 39-bus, 118-bus, 300-bus, and ACTIVSg 500-bus systems, are used to assess the performance of the proposed state prediction. The IEEE 118-bus system has 118 buses, 186 branches, with a total of 304 sensor measurements considering the DC power flow. The IEEE 39-bus system has 39 buses, 46 branches, and a total of 85 nodal injections and branch power flows given the DC power flow. For the AC power flow, while the system states include voltage magnitude and phase angle, the measurement data include real and reactive power injections, and real and reactive power flows. Similarly, the IEEE 300-bus and ACTIVSg 500-bus systems have a total of 711 and 1097 measurement data, respectively, considering DC power flow.
The experimental dataset is prepared using GEFCom based on an hourly interval. Real-time power load profile of five power zones of two categories are used. The first is for 2004 (a total of 43920 dataset used) and the other is for 2004 to 2008 (a total of 90320 dataset used). The hourly real-time power load data have been sampled to a 5-min interval. This system-level load distribution has further been normalized, distributed to the bus-level load rating of the simulated system. The procedures of dataset preparation of the two test systems and the actual load power data using MATLAB R2019B and MATPOWER [
The proposed state prediction is analysed using the DC and AC power flow models. Implementation results of the DC model for the IEEE 39-bus and 118-bus systems are based on three densely-connected hidden layers. Likewise, the AC model for the IEEE 39-bus and 118-bus systems and the DC model for the IEEE 300-bus and ACTIVSg 500-bus systems are based on six densely-connected hidden layers.
Bus system | Input layer | Hidden layer | Output layer |
---|---|---|---|
39-bus (DC) | 85 | , , | 38 (for voltage angle) |
(DC) 118-bus | 304 | , , | 118 (for voltage angle) |
39-bus (AC) | 117 | , , ..., | 77 (38 for voltage angle and 39 for voltage magnitude) |
118-bus (AC) | 354 | , , ..., | 236 (118 for voltage angle and 118 for voltage magnitude) |
300-bus (DC) | 711 | , , ..., | 300 (for voltage angle) |
500-bus (DC) | 1097 | , , ..., | 500 (for voltage angle) |
Figures

Fig. 2 Voltage angle prediction of proposed state prediction model and WLS state estimator. (a) IEEE 118-bus system. (b) IEEE 39-bus system.

Fig. 3 Voltage magnitude prediction of proposed state prediction model and WLS state estimator. (a) IEEE 118-bus system. (b) IEEE 39-bus system.
Additionally, to see the efficiency of the proposed model, it has been evaluated using additional unseen data of four different weeks (labeled as week-27, week-28, week-29, and week-52). This is demonstrated in

Fig. 4 Evaluation of proposed state prediction model using various unseen datasets (DC power flow). (a) IEEE 118-bus system. (b) IEEE 39-bus system.

Fig. 5 Voltage angle prediction before and after topology changes. (a) IEEE 300-bus system. (b) ACTIVSg 500-bus system.
The prediction performance of the proposed model is also evaluated against topology changes. This part is assessed in accordance with Assumptions 1 and 2 using the IEEE 300-bus and ACTIVSg 500-bus systems. The aim of this experiment is to evaluate the performance of the predictive SE model if the underlying network topology changes (e.g., such topology updates can be obtained from the network topology processor). In this regard, topology configurations of some selected networks of the IEEE 300-bus and ACTIVSg 500-bus systems have been randomly modified. Only 5 sets of configurations are modified in the IEEE 300-bus system, while 10 sets of configurations are modified in the ACTIVSg 500-bus system.
The sets of configurations are parts of the Jacobian matrices H and are generated from MATPOWER [
Numerical results demonstrate that the proposed state prediction is very comparable to the conventional WLS estimator whose estimation error is acceptable for the purposes of power system SE. Except for the AC power flow in
Furthermore, the performance of the predictive SE is evaluated through the metric MSE. The MSE is defined as (7) for a total number of states and observations.
(7) |
The performance evaluation in terms of the MSE with the different models for IEEE 39-bus and 118-bus systems is shown in
Type | Prediction model | MSE | |
---|---|---|---|
IEEE 39-bus system | IEEE 118-bus system | ||
DC | WLS | ||
DFFNN | |||
DRNN | |||
AC | WLS | ||
DFFNN | 7.57 | ||
DRNN |
Attackers come up with different adversarial strategies whereby the final effect of the malicious data leads to damage the state variables across the power system domain. Generally, there are two main FDI anomaly strategies for power system measurement models. One requires knowledge of power system topology [
The vulnerability of the detection module to adversarial ML is analyzed as follows. Although the main assumption of adversarial model considered in this paper is the false injection attack, coordinated adversarial ML attacks can also be potential challenges against the proposed cyber-attack detection or decision-making module. The adversarial ML may bring inconsistencies against the model during its training and retraining phases and introduce errors into unseen datasets, thereby creating a confusion over a previously trained detection model. Overall, such threat models can cause the ML model to make a wrong decision or misclassifications and affect its detection performance. This current work assumes that the cyber-physical processes involved include data sensing, communication, and decision-making using the ML module. While the false injection attack is against the data integrity of the smart grid, the adversarial ML attack can be like poisoning or evasion attack against the ML module.
Therefore, the whole cyber-physical process is considering the false injection attack during the communication and/or injection across the sensors. As a result, we limit the scope of this paper to just the cyber-attack against the data integrity (, the FDI attack).
The adversary is assumed to have access to the network topology. In particular, two realistic attack models are examined: random FDI attack and targeted FDI attack. While the former aims to inject an attack vector to the measurement quantities that will lead to a falsified estimate of state vectors, the latter aims to find an attack vector that can inject arbitrary errors into some state vectors.
Here, it is assumed that the adversary can have access only to some sensor readings (where ). This may be due to the fact that some sensors have specific physical defences or may be beyond the reach of the adversary. Let be the set of indices of sensors. According to Theorem II in [
(6) |
Algorithm 3 : adversary model I |
---|
1: Input: , H, y 2: Output: y 3: procedure (, H, y) 4: 5: if then 6: a(i) 7: y(i) 8: end if 9: if then 10: a(i) 11: end if 12: end procedure |
Here we consider a targeted FDI attack where the adversary intends to inject bad data into certain chosen state vectors. Again, for a successful FDI attack, we assume that the adversary has the knowledge of the network topology such as bus and chosen state vectors. Suppose the adversary has chosen set of state variables , where is the position of the subset of state vectors. In this model of the attack, the adversary aims to construct . Details of the construction of this attack model are given in [
Here, we present scenarios to justify the performance of the data-driven KL metric for the detection of bad data injection. The scenarios demonstrated in this subsection are based on the adversary model I. The histogram of state variations of normal and injections of false data are demonstrated in

Fig. 6 Histogram of state variations without and with FDI attack. (a) 1-year data. (b) 5-year data.

Fig. 7 KL distances of 1-year data (with and without FDI attack). (a) KL of predicted states (without FDI attack). (b) KL of predicted states (with FDI attack). (c) KL distance.

Fig. 8 KL distances of 5-year data (with and without FDI attack). (a) KL of predicted states (without FDI attack). (b) KL of predicted states (with FDI attack). (c) KL distance.

Fig. 9 CDF between ground truth and predicted states of KL distance of 1-year and 5-year data.
The detection module is trained through the KL values of the predicted state vectors. ROC curve, AUC, recall and precision are employed for the detection performance. The performance of ROC is evaluated in terms of the probability of correctly classifying the computed KL distance of the predicted states as either attack-free or manipulated data using the decision rule given by (5). The ROC curve, which is a plot of FPR v.s. TPR, is obtained by varying the decision thresholds. FPR and TPR are defined as (9) and (10), respectively. Additionally, the recall and precision are given by (11) and (12), respectively.
(9) |
(10) |
(11) |
(12) |
where represents the successfully identified FDI attacks; represents the number of states that are wrongly classified as FDI attacks; and FN represents the number of states that are wrongly classified as normal.
The proposed detection performance is compared against distribution test, and with one of recent findings on KL metric based FDI attack detection using WLS estimation [
To perform the FDI attack detection, three attack scenarios are considered. For each scenario, 12000 samples are used.
For attack simulation of the IEEE 118-bus system, we assume that the adversary has access to measurement meters, a condition that satisfies the criteria [

Fig. 10 Attack detection results using 5-year data in attack scenario I.
These two case scenarios are based on the targeted FDI attack. When the adversary manipulates the state variables, the measurements associated with these elements will be tempered. To inject the bad data, we simulate the bias vector b to be added on each of the 118 state variables of the power network using different settings. First, we use a 10% increase from the initial state value (here referred to as attack scenario II). Then, we increase the bad data by 40%, which means (attack scenario III). In both attack scenarios, although the proposed SPAD framework outperforms existing techniques, its classification accuracy deteriorates when the magnitude of the attacks are too small. However, as the magnitude of the attacks increases, so does the KL distance, which leads to a much higher probability of attack detection by the SPAD framework. Figures

Fig. 11 Attack detection results using 5-year data in attack scenario II.

Fig. 12 Attack detection results using 5-year data in attack scenario III.
Power flow model | Attack scenario I (%) | Attack scenario II (%) | Attack scenario III (%) | ||||||
---|---|---|---|---|---|---|---|---|---|
AUC | Recall | Precision | AUC | Recall | Precision | AUC | Recall | Precision | |
DC | 99.41 | 98.59 | 99.25 | 86.47 | 84.77 | 85.63 | 98.15 | 97.54 | 97.76 |
AC | 97.41 | 95.54 | 96.36 | 84.90 | 82.48 | 82.67 | 96.43 | 94.89 | 95.03 |
This research work identifies vulnerabilities of existing power system SEs against the FDI attack and proposes data-driven state prediction and defence strategies to ensure the data integrity of power systems. In particular, the proposed SPAD framework is formulated using DL, where a predictive SE is deployed for estimating the system states, and a KL metric-based detection leverages the predicted states. Accordingly, an attack alert is generated when the computed KL value of the predicted states is greater than the decision threshold. Numerical simulations show that under normal operating conditions of the power system, there occurs only a minimal dissimilarity between consecutive state vectors; however, the KL score rises when falsified measurement data is injected into the meter readings. The proposed SPAD framework detects FDI attacks with a higher accuracy compared with the existing FDI attack detection algorithms. In the future, given low-dimensional properties of power system measurement data and sparsity properties of the FDI attack, attack localization can be explored using data-driven techniques. Furthermore, to deter the growing challenges of data integrity cyber-attacks, a comprehensive data-driven approach of FDI attack construction and cyber defence strategy can be proposed leveraging state-of-the-art DL, reinforcement learning, or deep reinforcement learning models along with optimization approaches. Finally, ML adversarial attacks can exploit the ML-based cyber-attack detection of the smart grid SE and can inject bad data to the decision-making module. Hence, cyber-attack detection against the ML adversarial attacks is recommended as an open research issue.
REFERENCES
A. Abur and A. G. Exposito, Power System State Estimation: Theory and Implementation, 1st ed., Boca Raton: CRC Press, 2004, pp. 1-327. [Baidu Scholar]
M. Gol and A. Abur, “LAV based robust state estimation for systems measured by PMUs,” IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1808-1814, Jul. 2014. [Baidu Scholar]
G. Wang, G. B. Giannakis, and J. Chen, “Robust and scalable power system state estimation via composite optimization,” IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6137-6147, Nov. 2019. [Baidu Scholar]
Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security, vol. 14, no. 13, pp. 1-33, May 2011. [Baidu Scholar]
H. T. Reda, A. Anwar, and A. Mahmood. (2021, Jul.). Comprehensive survey and taxonomies of false injection attacks in smart grid: attack models, targets, and impacts. [Online]. Available: https://arxiv.org/abs/2103.10594 [Baidu Scholar]
Z. Zhao, Y. Huang, Z. Zhen et al., “Data-driven false data-injection attack design and detection in cyber-physical systems,” IEEE Transactions on Cybernetics, vol. 51, no. 12, pp. 6179-6187, Dec. 2021. [Baidu Scholar]
Y. Chen, S. Huang, F. Liu et al., “Evaluation of reinforcement learning-based false data injection attack to automatic voltage control,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2158-2169, Mar. 2019. [Baidu Scholar]
H. T. Reda, A. Anwar, A. N. Mahmood et al. (2021, Mar.). A taxonomy of cyber defence strategies against false data attacks in smart grid. [Online]. Available: https://arxiv.org/abs/2103.16085 [Baidu Scholar]
A. S. Zamzam, X. Fu, and N. D. Sidiropoulos, “Data-driven learning-based optimization for distribution system state estimation,” IEEE Transactions on Power Systems, vol. 34, no. 6, pp. 4796-4805, Nov. 2019. [Baidu Scholar]
L. Zhang, G. Wang, and G. B. Giannakis, “Real-time power system state estimation and forecasting via deep unrolled neural networks,” IEEE Transactions on Signal Processing, vol. 67, no. 15, pp. 4069-4077, Aug. 2019. [Baidu Scholar]
H. Mosbah and M. El-Hawary, “Multilayer artificial neural networks for real time power system state estimation,” in Proceedings of IEEE Electrical Power and Energy Conference, London, Canada, Oct. 2015, pp. 344-351. [Baidu Scholar]
P. N. P. Barbeiro, J. Krstulovic, H. Teixeira et al., “State estimation in distribution smart grids using autoencoders,” in Proceedings of IEEE 8th International Power Engineering and Optimization Conference, Langkawi, Malaysia, Mar. 2014, pp. 358-363. [Baidu Scholar]
G. Wang, G. B. Giannakis, Y. Saad et al., “Retrieval via reweighted amplitude flow,” IEEE Transactions on Signal Processing, vol. 66, no. 11, pp. 2818-2833, Jun. 2018. [Baidu Scholar]
M. H. Ansari, V. T. Vakili, B. Bahrak et al., “Graph theoretical defense mechanisms against false data injection attacks in smart grids,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 860-871, Sept. 2018. [Baidu Scholar]
N. Zivkovi and A. T. Sari, “Detection of false data injection attacks using unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 847-859, Sept. 2018. [Baidu Scholar]
G. Chaojun, P. Jirutitijaroen, and M. Motani, “Detecting false data injection attacks in AC state estimation,” IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2476-2483, Sept. 2015. [Baidu Scholar]
S. K. Singh, K. Khanna, R. Bose et al., “Joint-transformation-based detection of false data injection attacks in smart grid,” IEEE Transactions on Industrial Informatics, vol. 14, no. 1, pp. 89-97, Jan. 2018. [Baidu Scholar]
H. Manyun, N. Ming, L. Manli et al., “Detecting false data injection attacks on modern power systems based on Jensen-Shannon distance,” in Proceedings of IEEE 8th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, Tianjin, China, Jul. 2018, pp. 1154-1159. [Baidu Scholar]
S. K. Singh, R. Bose, and A. Joshi, “Minimizing energy theft by statistical distance based theft detector in AMI,” in Proceedings of 24th National Conference on Communications, Hyderabad, India, Feb. 2018, pp. 1-5. [Baidu Scholar]
T. Hong, P. Pinson, and S. Fan, “Global energy forecasting competition 2012,” International Journal of Forecasting, vol. 30, no. 2, pp. 357-363. [Baidu Scholar]
X. Glorot and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, May 2010, pp. 249-256. [Baidu Scholar]
D. P. Kingma and J. L. Ba, “Adam: a method for stochastic optimization,” in Proceedings of International Conference on Learning Representations (ICLR), San Diego, USA, May 2015, pp. 1-41. [Baidu Scholar]
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436-444, May 2015. [Baidu Scholar]
S. Kullback and R. A. Leibler, “On information and sufficiency,” The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79-86, Mar. 1951. [Baidu Scholar]
R. D. Zimmerman and C. Murillo-Sanchez. (2016, Dec.). Matpower 6.0 user’s manual. [Online]. Available: https://matpower.org/docs/MATPOWER-manual-6.0.pdf [Baidu Scholar]
A. Sayghe, Y. Hu, I. Zografopoulos et al., “Survey of machine learning methods for detecting false data injection attacks in power systems,” IET Smart Grid, vol. 3, no. 5, pp. 581-595, Nov. 2020. [Baidu Scholar]