Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow

被引:1
|
作者
Zuo, Ke [1 ]
Sun, Mingyang [2 ,3 ]
Zhang, Zhenyong [4 ]
Cheng, Peng [1 ]
Strbac, Goran [5 ]
Kang, Chongqing [6 ]
机构
[1] Zhejiang Univ, Control Sci & Engn, Hangzhou 310058, Peoples R China
[2] Peking Univ, Coll Engn, Dept Ind Engn & Management, Beijing 100091, Peoples R China
[3] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[4] Guizhou Univ, Dept Comp Sci & Technol, Guiyang 550025, Peoples R China
[5] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[6] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Power system stability; Transient analysis; Security; Robustness; Load flow; Stability analysis; Closed box; Machine learning; robustness; cyber security; transferability-oriented adversarial attack; security-constrained optimal power flow; STATE ESTIMATION; TRANSIENT;
D O I
10.1109/TSG.2024.3397654
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security-constrained optimal power flow (SCOPF) aims to achieve an economical operation while considering the security issues during contingencies. Data-driven security assessment methods can provide security constraints for SCOPF and have been widely developed in the smart grid community to deal with the challenges arising from the increased penetration of renewable energy resources and the deployment of power electronic devices. Nevertheless, it has been recognized that the machine learning model is vulnerable to adversarial examples, and the power system communication network is prone to cyber attacks, which affects the decision-making of security assessment and SCOPF. To this end, a transferability-oriented adversarial robust security-constrained optimal power flow (TOAR-SCOPF) is proposed to diminish the potential security risks from attacks, formulated as an attacker-defender problem. To alleviate the conservatism of TOAR-SCOPF, a more realistic scenario with unknown features and unknown selected machine learning models is considered in this work by developing a novel transferability-oriented adversarial attack (TOA) method for data-driven security assessment while considering the power system's physical constraints to bypass the bad data detection mechanism. Case studies are conducted based on the IEEE 39-bus and IEEE 68-bus systems, respectively, to explore the vulnerability and demonstrate the effectiveness of the proposed TOAR-SCOPF.
引用
收藏
页码:5169 / 5181
页数:13
相关论文
共 50 条
  • [21] Security-Constrained Optimal Power Flow via Cross-Entropy Method
    Carvalho, Leonel de Magalhaes
    Leite da Silva, Armando Martins
    Miranda, Vladimiro
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) : 6621 - 6629
  • [22] A Scalable Formulation for Look-Ahead Security-Constrained Optimal Power Flow
    Varawala, Lamia
    Hesamzadeh, Mohammad Reza
    Dan, Gyorgy
    Baldick, Ross
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 138 - 150
  • [23] Probabilistic security-constrained optimal power flow including the controllability of HVDC lines
    Vrakopoulou, Maria
    Chatzivasileiadis, Spyros
    Andersson, Goeran
    2013 4TH IEEE/PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2013,
  • [24] Improving the statement of the corrective security-constrained optimal power-flow problem
    Capitanescu, Florin
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (02) : 887 - 889
  • [25] SECURITY-CONSTRAINED OPTIMAL POWER FLOW WITH POST-CONTINGENCY CORRECTIVE RESCHEDULING
    MONTICELLI, A
    PEREIRA, MVF
    GRANVILLE, S
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1987, 2 (01) : 175 - 182
  • [26] A New Iterative Approach to the Corrective Security-Constrained Optimal Power Flow Problem
    Capitanescu, Florin
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1533 - 1541
  • [27] Optimal security-constrained power scheduling by Benders decomposition
    Martínez-Crespo, Jorge
    Usaola, Julio
    Fernández, Jose L.
    ELECTRIC POWER SYSTEMS RESEARCH, 2007, 77 (07) : 739 - 753
  • [28] Security-Constrained Unit Commitment with Optimal Robust Confidence Levels
    Feng, Changsen
    Ni, Linna
    Wen, Fushuan
    Li, Zhiyi
    Shahidehpour, Mohammad
    Xue, Yusheng
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [29] Reactive Power Planning using Security-Constrained AC Optimal Power Flow and Sensitivity Analyses
    Alkhraijah, Mohannad
    Alowaifeer, Maad
    Molzahn, Daniel K.
    Li, Xiawen
    Till, Micah
    2021 IEEE POWER AND ENERGY CONFERENCE AT ILLINOIS (PECI), 2021,
  • [30] Optimizing Multi-Timestep Security-Constrained Optimal Power Flow for Large Power Grids
    Sharadga, Hussein
    Mohammadi, Javad
    Crozier, Constance
    Baker, Kyri
    2024 IEEE TEXAS POWER AND ENERGY CONFERENCE, TPEC, 2024, : 548 - 553