Pub Date : 2024-11-18DOI: 10.1109/tsg.2024.3501356
Zelin Liu, Tao Liu, Yue Song, David J. Hill
{"title":"Consecutive Load Redistribution Attack Without Line Admittance Information","authors":"Zelin Liu, Tao Liu, Yue Song, David J. Hill","doi":"10.1109/tsg.2024.3501356","DOIUrl":"https://doi.org/10.1109/tsg.2024.3501356","url":null,"abstract":"","PeriodicalId":13331,"journal":{"name":"IEEE Transactions on Smart Grid","volume":"74 1","pages":""},"PeriodicalIF":9.6,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142670584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-15DOI: 10.1109/tsg.2024.3498945
Weifeng Zhong, Wei Su, Xumin Huang, Jiawen Kang, Chau Yuen, Ruilong Deng, Yan Zhang, Shengli Xie
{"title":"Joint Energy-Computation Management for Electric Vehicles under Coordination of Power Distribution Networks and Computing Power Networks","authors":"Weifeng Zhong, Wei Su, Xumin Huang, Jiawen Kang, Chau Yuen, Ruilong Deng, Yan Zhang, Shengli Xie","doi":"10.1109/tsg.2024.3498945","DOIUrl":"https://doi.org/10.1109/tsg.2024.3498945","url":null,"abstract":"","PeriodicalId":13331,"journal":{"name":"IEEE Transactions on Smart Grid","volume":"21 1","pages":""},"PeriodicalIF":9.6,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142643036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-31DOI: 10.1109/TSG.2024.3489172
{"title":"2023-2024 Index IEEE Transactions on Smart Grid Vol. 15","authors":"","doi":"10.1109/TSG.2024.3489172","DOIUrl":"10.1109/TSG.2024.3489172","url":null,"abstract":"","PeriodicalId":13331,"journal":{"name":"IEEE Transactions on Smart Grid","volume":"15 6","pages":"6183-6276"},"PeriodicalIF":8.6,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10740495","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-25DOI: 10.1109/TSG.2024.3478449
{"title":"IEEE Transactions on Smart Grid Information for Authors","authors":"","doi":"10.1109/TSG.2024.3478449","DOIUrl":"10.1109/TSG.2024.3478449","url":null,"abstract":"","PeriodicalId":13331,"journal":{"name":"IEEE Transactions on Smart Grid","volume":"15 6","pages":"C3-C3"},"PeriodicalIF":8.6,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10736380","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-02DOI: 10.1109/TSG.2024.3453648
Alaa Selim;Junbo Zhao;Bo Yang
This letter demonstrates a proof-of-concept validation of the Large Language Model (LLM) for smart inverter cyberattack detection through textual control commands. The proposed method can detect the manipulation of Volt/VAR curves and the comparison results with state-of-the-art machine learning techniques highlight its efficacy in identifying cyber attacks. Test results obtained from a real distribution feeder in Colorado, USA, validate the high accuracy for attack classification as well as demonstrate the potential of LLMs in adding a robust security layer for cyber-attacks.
{"title":"Large Language Model for Smart Inverter Cyber-Attack Detection via Textual Analysis of Volt/VAR Commands","authors":"Alaa Selim;Junbo Zhao;Bo Yang","doi":"10.1109/TSG.2024.3453648","DOIUrl":"10.1109/TSG.2024.3453648","url":null,"abstract":"This letter demonstrates a proof-of-concept validation of the Large Language Model (LLM) for smart inverter cyberattack detection through textual control commands. The proposed method can detect the manipulation of Volt/VAR curves and the comparison results with state-of-the-art machine learning techniques highlight its efficacy in identifying cyber attacks. Test results obtained from a real distribution feeder in Colorado, USA, validate the high accuracy for attack classification as well as demonstrate the potential of LLMs in adding a robust security layer for cyber-attacks.","PeriodicalId":13331,"journal":{"name":"IEEE Transactions on Smart Grid","volume":"15 6","pages":"6179-6182"},"PeriodicalIF":8.6,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In multi-agent active distribution networks, the information exchanges in the ADMM algorithm for the decentralized distribution-level optimal power flow (D-OPF) may expose sensitive load flows of tie-lines across adjacent agents. This may be overheard by adversarial agents for business competition. To preserve this privacy, this paper proposes a differentially private consensus ADMM (DP-C-ADMM) algorithm, which can offer a mixture solution of both realistically optimal generator outputs and obfuscated-but-feasible load flows of tie-lines. And $epsilon -$