A Multi-Stage Game Model for the False Data Injection Attack Against Power Systems

Author(s):  
Qi Wang ◽  
Xingpu Cai ◽  
Wei Tai ◽  
Yi Tang
Dialogue ◽  
1996 ◽  
Vol 35 (3) ◽  
pp. 529-552 ◽  
Author(s):  
Joseph Heath

If there is one aspect of David Gauthier's program for a contractualist morality that has been most sceptically received, it is his view that instrumentally rational agents would choose to adopt a disposition that would in turn constrain their future choices. Instead of remaining “straightforward maximizers” caught in a suboptimal state of nature, they would become “constrained maximizers” who could avoid prisoner's dilemmas (PDs) by engaging in conditional co-operation. Apart from the fact that Gauthier's entirely prescriptive orientation leads him to omit any specification of the mechanism through which this might be accomplished, serious doubts have been raised about the adequacy of the argument that he offers in support of adopting constrained maximization.


2021 ◽  
Vol 9 ◽  
Author(s):  
Zhaoyang Qu ◽  
Yunchang Dong ◽  
Nan Qu ◽  
Huashun Li ◽  
Mingshi Cui ◽  
...  

In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy. From the perspective of the correlation and redundancy of the essential characteristics of the attack data, a detection method of the FDIA in smart grids based on cyber-physical genes is proposed. Firstly, the principle and characteristics of the FDIA are analyzed, and the concept of the cyber-physical FDIA gene is defined. Considering the non-functional dependency and nonlinear correlation of cyber-physical data in power systems, the optimal attack gene feature set of the maximum mutual information coefficient is selected. Secondly, an unsupervised pre-training encoder is set to extract the cyber-physical attack gene. Combined with the supervised fine-tuning classifier to train and update the network parameters, the FDIA detection model with stacked autoencoder network is constructed. Finally, a self-adaptive cuckoo search algorithm is designed to optimize the model parameters, and a novel attack detection method is proposed. The analysis of case studies shows that the proposed method can effectively improve the detection accuracy and effect of the FDIA on cyber-physical power systems.


Sign in / Sign up

Export Citation Format

Share Document