Sign in

Power System Security Under False Data Injection Attacks With Exploitation and Exploration Based on Reinforcement Learning.

Zhisheng WangYing ChenFeng LiuYue XiaXuemin Zhang
Published in: IEEE Access (2018)
Keyphrases
  • power system
  • data sources
  • injection attacks
  • database
  • reinforcement learning
  • computational intelligence
  • optimal power flow
  • network structure
  • network security