{"title":"处理电网网络物理数据的深度学习体系结构","authors":"Daniel Calzada, S. Hossain-McKenzie, Zeyu Mao","doi":"10.1109/PECI54197.2022.9744015","DOIUrl":null,"url":null,"abstract":"Due to the increasing complexity of energy systems and consequent increase in attack vectors, protecting the power grid from unknown disturbances and attacks using special protection schemes is crucial. In this paper, we discuss the machine learning component of the HARMONIE special protection scheme which relies on a novel combination of graph neural networks and Transformer models to jointly process cyber (network) and physical data. Our approach shows promise in detecting cyber and physical disturbances and includes the capability to identify relevant portions of the input sequence that contribute to the model’s prediction. With this in place, the end goal of developing automated mitigation strategies is within reach.","PeriodicalId":245119,"journal":{"name":"2022 IEEE Power and Energy Conference at Illinois (PECI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Deep Learning Architecture for Processing Cyber-Physical Data in the Electric Grid\",\"authors\":\"Daniel Calzada, S. Hossain-McKenzie, Zeyu Mao\",\"doi\":\"10.1109/PECI54197.2022.9744015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the increasing complexity of energy systems and consequent increase in attack vectors, protecting the power grid from unknown disturbances and attacks using special protection schemes is crucial. In this paper, we discuss the machine learning component of the HARMONIE special protection scheme which relies on a novel combination of graph neural networks and Transformer models to jointly process cyber (network) and physical data. Our approach shows promise in detecting cyber and physical disturbances and includes the capability to identify relevant portions of the input sequence that contribute to the model’s prediction. With this in place, the end goal of developing automated mitigation strategies is within reach.\",\"PeriodicalId\":245119,\"journal\":{\"name\":\"2022 IEEE Power and Energy Conference at Illinois (PECI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Power and Energy Conference at Illinois (PECI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PECI54197.2022.9744015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Power and Energy Conference at Illinois (PECI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PECI54197.2022.9744015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deep Learning Architecture for Processing Cyber-Physical Data in the Electric Grid
Due to the increasing complexity of energy systems and consequent increase in attack vectors, protecting the power grid from unknown disturbances and attacks using special protection schemes is crucial. In this paper, we discuss the machine learning component of the HARMONIE special protection scheme which relies on a novel combination of graph neural networks and Transformer models to jointly process cyber (network) and physical data. Our approach shows promise in detecting cyber and physical disturbances and includes the capability to identify relevant portions of the input sequence that contribute to the model’s prediction. With this in place, the end goal of developing automated mitigation strategies is within reach.