{"title":"可再生能源预测的鲁棒通用对抗性摄动攻击","authors":"Jiaqi Ruan;Liliang Wang;Shi Chen;Tianlei Zang;Yiwei Qiu;Gaoqi Liang;Buxiang Zhou","doi":"10.1109/JIOT.2025.3558522","DOIUrl":null,"url":null,"abstract":"Recent advances reveal that renewable energy forecasting (REF) models, particularly AI-driven approaches, may be vulnerable to adversarial attacks, potentially inducing substantial forecasting errors and disrupting power system operations. However, existing studies focused only on customized attack schemes tailored to specific REF models, single-time inputs, and predefined locations, which are computationally expensive and often suboptimal within practical dispatch intervals. To fill this gap, we first propose a universal adversarial perturbation (UAP) attack method, formulated in a fully offline manner, which can degrade REF performance across different REF model architectures and spatiotemporal scenarios. To enhance attack robustness, we further develop a robust UAP generation method tailored for closed-box, opaque settings through ensemble proxy models. Our findings reveal the new vulnerability of advanced REF technologies to fixed yet small perturbations, which can significantly amplify forecasting errors and severely compromise prediction accuracy, emphasizing the critical need for further investigation.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 11","pages":"18451-18454"},"PeriodicalIF":8.9000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robust Universal Adversarial Perturbation Attacks on Renewable Energy Forecasting\",\"authors\":\"Jiaqi Ruan;Liliang Wang;Shi Chen;Tianlei Zang;Yiwei Qiu;Gaoqi Liang;Buxiang Zhou\",\"doi\":\"10.1109/JIOT.2025.3558522\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent advances reveal that renewable energy forecasting (REF) models, particularly AI-driven approaches, may be vulnerable to adversarial attacks, potentially inducing substantial forecasting errors and disrupting power system operations. However, existing studies focused only on customized attack schemes tailored to specific REF models, single-time inputs, and predefined locations, which are computationally expensive and often suboptimal within practical dispatch intervals. To fill this gap, we first propose a universal adversarial perturbation (UAP) attack method, formulated in a fully offline manner, which can degrade REF performance across different REF model architectures and spatiotemporal scenarios. To enhance attack robustness, we further develop a robust UAP generation method tailored for closed-box, opaque settings through ensemble proxy models. Our findings reveal the new vulnerability of advanced REF technologies to fixed yet small perturbations, which can significantly amplify forecasting errors and severely compromise prediction accuracy, emphasizing the critical need for further investigation.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 11\",\"pages\":\"18451-18454\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10954976/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10954976/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Robust Universal Adversarial Perturbation Attacks on Renewable Energy Forecasting
Recent advances reveal that renewable energy forecasting (REF) models, particularly AI-driven approaches, may be vulnerable to adversarial attacks, potentially inducing substantial forecasting errors and disrupting power system operations. However, existing studies focused only on customized attack schemes tailored to specific REF models, single-time inputs, and predefined locations, which are computationally expensive and often suboptimal within practical dispatch intervals. To fill this gap, we first propose a universal adversarial perturbation (UAP) attack method, formulated in a fully offline manner, which can degrade REF performance across different REF model architectures and spatiotemporal scenarios. To enhance attack robustness, we further develop a robust UAP generation method tailored for closed-box, opaque settings through ensemble proxy models. Our findings reveal the new vulnerability of advanced REF technologies to fixed yet small perturbations, which can significantly amplify forecasting errors and severely compromise prediction accuracy, emphasizing the critical need for further investigation.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.