Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/115889
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | - |
| dc.creator | Ran, X | - |
| dc.creator | Ma, L | - |
| dc.date.accessioned | 2025-11-11T05:28:22Z | - |
| dc.date.available | 2025-11-11T05:28:22Z | - |
| dc.identifier.issn | 1545-5955 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/115889 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
| dc.rights | The following publication X. Ran and L. Ma, 'An Extended False Data Injection Attack via Deep Reinforcement Learning: Attack Model and Countermeasures in Cyber-Physical Power Systems,' in IEEE Transactions on Automation Science and Engineering, vol. 22, pp. 19750-19762, 2025 is available at https://doi.org/10.1109/tase.2025.3596563. | en_US |
| dc.subject | Deep reinforcement learning | en_US |
| dc.subject | Extended false data injection attacks | en_US |
| dc.subject | Initial false data injection attacks | en_US |
| dc.title | An extended false data injection attack via deep reinforcement learning : attack model and countermeasures in cyber-physical power systems | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 19750 | - |
| dc.identifier.epage | 19762 | - |
| dc.identifier.volume | 22 | - |
| dc.identifier.doi | 10.1109/TASE.2025.3596563 | - |
| dcterms.abstract | False data injection attacks are commonly used to evade the bad data detector in cyber-physical power systems. This paper proposes an extended attack strategy and a deep reinforcement learning-based detection method. Traditional false data injection attacks aim to remain stealthy and avoid detection by conventional detection mechanisms. An extended load attack is introduced to increase the potential for damage. Directly adding an extended component directly to the measurement makes it easily detectable by bad data detector. Accordingly, the extended attack integrates the added component into the state variables to improve stealth. An optimization model for the extended components of the proposed attack is developed, along with a homologous matrix. Additionally, an online attack detection scheme is formulated as a partially observable Markov decision process problem. A deep reinforcement learning-based detection framework is proposed, featuring a compound reward designed to minimize false alarms and time delays. The proposed online detector extracts state features under varying operating conditions and generates a policy to determine whether the power grid is under attack. An extended Euclidean distance indicator and an adaptive weight matrix are also proposed in the dynamic state estimation to improve estimation or detection accuracy. Numerical experiments validate the effectiveness and robustness of the proposed deep reinforcement learning-based detection scheme in power systems. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | IEEE transactions on automation science and engineering, 2025, v. 22, p. 19750-19762 | - |
| dcterms.isPartOf | IEEE transactions on automation science and engineering | - |
| dcterms.issued | 2025 | - |
| dc.identifier.scopus | 2-s2.0-105012737427 | - |
| dc.identifier.eissn | 1558-3783 | - |
| dc.description.validate | 202511 bcel | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.SubFormID | G000339/2025-08 | en_US |
| dc.description.fundingSource | Self-funded | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Ran_Extended_False_Data.pdf | Pre-Published version | 6.53 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



