Signature Identification of False Data Injection Attacks Based on Deep Vision Networks
编号:128 访问权限:仅限参会人 更新:2024-09-10 16:22:08 浏览:242次 口头报告

报告开始:暂无开始时间(Asia/Shanghai)

报告时间:暂无持续时间

所在会场:[暂无会议] [暂无会议段]

演示文件

提示:该报告下的文件权限为仅限参会人,您尚未登录,暂时无法查看。

摘要
The increasing integration of cyber-physical systems has markedly amplified the vulnerability of power systems to False Data Injection Attacks (FDIAs), posing significant threats to their security and reliability. FDIAs can emulate various power system dynamics, each with distinct objectives, potentially leading to incorrect decisions by operators or causing damage that may go undetected initially. The impact of these attacks often hinges on their specific signatures, which reflect the temporal characteristics of the injected data waveforms. Therefore, precise classification of these attack signatures is essential for predicting their potential effects and devising effective countermeasures. This paper addresses this challenge by proposing the use of the VGG16 network, a deep learning model commonly utilized in computer vision, to classify the attack signatures. Leveraging VGG16’s ability to identify complex patterns in data, the proposed method offers a robust solution for distinguishing between different types of FDIAs. Experimental validation on the IEEE 39-bus system confirms the effectiveness of this approach in improving the detection and classification of FDIAs.
关键词
attack signature,false data injection attack,VGG16,detection,classification
报告人
Yixuan He
student Huazhong University of Science and Technology

稿件作者
Yixuan He Huazhong University of Science and Technology
Jingyu Wang Huazhong University of Science and Technology
Dongyuan Shi Huazhong University of Science and Technology
发表评论
验证码 看不清楚,更换一张
全部评论
重要日期
  • 会议日期

    11月06日

    2024

    11月08日

    2024

  • 09月15日 2024

    初稿截稿日期

  • 11月08日 2024

    注册截止日期

主办单位
Huazhong University of Science and Technology
联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询