Physics-Constrained Backdoor Attacks on Power System Fault Localization

11/07/2022
by   Jianing Bai, et al.
0

The advances in deep learning (DL) techniques have the potential to deliver transformative technological breakthroughs to numerous complex tasks in modern power systems that suffer from increasing uncertainty and nonlinearity. However, the vulnerability of DL has yet to be thoroughly explored in power system tasks under various physical constraints. This work, for the first time, proposes a novel physics-constrained backdoor poisoning attack, which embeds the undetectable attack signal into the learned model and only performs the attack when it encounters the corresponding signal. The paper illustrates the proposed attack on the real-time fault line localization application. Furthermore, the simulation results on the 68-bus power system demonstrate that DL-based fault line localization methods are not robust to our proposed attack, indicating that backdoor poisoning attacks pose real threats to DL implementations in power systems. The proposed attack pipeline can be easily generalized to other power system tasks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/13/2021

A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems

Due to the advances in computing and sensing, deep learning (DL) has wid...
research
02/23/2020

Adversarial Attack on DL-based Massive MIMO CSI Feedback

With the increasing application of deep learning (DL) algorithms in wire...
research
09/13/2022

PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models

Deep Learning (DL) models increasingly power a diversity of applications...
research
04/23/2020

Encoding Power Traces as Images for Efficient Side-Channel Analysis

Side-Channel Attacks (SCAs) are a powerful method to attack implementati...
research
09/08/2017

CuRTAIL: ChaRacterizing and Thwarting AdversarIal deep Learning

This paper proposes CuRTAIL, an end-to-end computing framework for chara...
research
07/08/2022

Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future

Recurrent models are frequently being used in online tasks such as auton...
research
04/07/2021

Which Neural Network to Choose for Post-Fault Localization, Dynamic State Estimation and Optimal Measurement Placement in Power Systems?

We consider a power transmission system monitored with Phasor Measuremen...

Please sign up or login with your details

Forgot password? Click here to reset