Picture for Katherine Davis

Katherine Davis

Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty

May 25, 2023
Figure 1 for Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty
Figure 2 for Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty
Figure 3 for Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty
Figure 4 for Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty
Viaarxiv icon

Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids

Jun 25, 2022
Figure 1 for Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Figure 2 for Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Figure 3 for Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Figure 4 for Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Viaarxiv icon

Spatio-Temporal Failure Propagation in Cyber-Physical Power Systems

Feb 05, 2022
Figure 1 for Spatio-Temporal Failure Propagation in Cyber-Physical Power Systems
Figure 2 for Spatio-Temporal Failure Propagation in Cyber-Physical Power Systems
Figure 3 for Spatio-Temporal Failure Propagation in Cyber-Physical Power Systems
Viaarxiv icon

Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks

Dec 25, 2021
Figure 1 for Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Figure 2 for Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Figure 3 for Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Figure 4 for Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Viaarxiv icon

Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach

Nov 20, 2021
Figure 1 for Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
Figure 2 for Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
Figure 3 for Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
Figure 4 for Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
Viaarxiv icon

Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks

Apr 24, 2021
Figure 1 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 2 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 3 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 4 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Viaarxiv icon

Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids

Apr 05, 2021
Figure 1 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 2 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 3 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 4 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Viaarxiv icon

Multi-Source Data Fusion for Cyberattack Detection in Power Systems

Jan 18, 2021
Figure 1 for Multi-Source Data Fusion for Cyberattack Detection in Power Systems
Figure 2 for Multi-Source Data Fusion for Cyberattack Detection in Power Systems
Figure 3 for Multi-Source Data Fusion for Cyberattack Detection in Power Systems
Figure 4 for Multi-Source Data Fusion for Cyberattack Detection in Power Systems
Viaarxiv icon