Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow

被引:1
|
作者
Zuo, Ke [1 ]
Sun, Mingyang [2 ,3 ]
Zhang, Zhenyong [4 ]
Cheng, Peng [1 ]
Strbac, Goran [5 ]
Kang, Chongqing [6 ]
机构
[1] Zhejiang Univ, Control Sci & Engn, Hangzhou 310058, Peoples R China
[2] Peking Univ, Coll Engn, Dept Ind Engn & Management, Beijing 100091, Peoples R China
[3] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[4] Guizhou Univ, Dept Comp Sci & Technol, Guiyang 550025, Peoples R China
[5] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[6] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Power system stability; Transient analysis; Security; Robustness; Load flow; Stability analysis; Closed box; Machine learning; robustness; cyber security; transferability-oriented adversarial attack; security-constrained optimal power flow; STATE ESTIMATION; TRANSIENT;
D O I
10.1109/TSG.2024.3397654
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security-constrained optimal power flow (SCOPF) aims to achieve an economical operation while considering the security issues during contingencies. Data-driven security assessment methods can provide security constraints for SCOPF and have been widely developed in the smart grid community to deal with the challenges arising from the increased penetration of renewable energy resources and the deployment of power electronic devices. Nevertheless, it has been recognized that the machine learning model is vulnerable to adversarial examples, and the power system communication network is prone to cyber attacks, which affects the decision-making of security assessment and SCOPF. To this end, a transferability-oriented adversarial robust security-constrained optimal power flow (TOAR-SCOPF) is proposed to diminish the potential security risks from attacks, formulated as an attacker-defender problem. To alleviate the conservatism of TOAR-SCOPF, a more realistic scenario with unknown features and unknown selected machine learning models is considered in this work by developing a novel transferability-oriented adversarial attack (TOA) method for data-driven security assessment while considering the power system's physical constraints to bypass the bad data detection mechanism. Case studies are conducted based on the IEEE 39-bus and IEEE 68-bus systems, respectively, to explore the vulnerability and demonstrate the effectiveness of the proposed TOAR-SCOPF.
引用
收藏
页码:5169 / 5181
页数:13
相关论文
共 50 条
  • [41] Security-Constrained Optimal Power Flow Solved With a Dynamic Multichain Particle Swarm Optimizer
    Zhang, Haixiang
    Liu, Jianan
    Xiao, Dongliang
    Qiao, Wei
    2019 51ST NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2019,
  • [42] Robust N - k Security-constrained Optimal Power Flow Incorporating Preventive and Corrective Generation Dispatch to Improve Power System Reliability
    Huang, Liping
    Lai, Chun Sing
    Zhao, Zhuoli
    Yang, Guangya
    Zhong, Bang
    Lai, Loi Lei
    CSEE JOURNAL OF POWER AND ENERGY SYSTEMS, 2023, 9 (01): : 351 - 364
  • [43] Object-Oriented Security Constrained Quadratic Optimal Power Flow
    Zhong, Chiyang
    Meliopoulos, A. P. Sakis
    AlOwaifeer, Maad
    Xie, Jiahao
    Ilunga, Gad
    2020 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2020,
  • [44] A SECURITY-CONSTRAINED DECOMPOSITION APPROACH TO OPTIMAL REACTIVE POWER PLANNING
    GOMEZ, T
    PEREZARRIAGA, IJ
    LUMBRERAS, J
    PARRA, VM
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1991, 6 (03) : 1069 - 1076
  • [45] Security-constrained optimal power flow of power grid connected with wind farms considering corrective control
    Jiang, Donglin
    Xu, Xiangdong
    Liu, Tianqi
    Chen, Zhenhuan
    Wang, Fujun
    Li, Xiaohu
    Yin, Zhuan
    Dianwang Jishu/Power System Technology, 2013, 37 (01): : 172 - 177
  • [46] Fast Security-Constrained Optimal Power Flow Through Low-Impact and Redundancy Screening
    Weinhold, Richard
    Mieth, Robert
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (06) : 4574 - 4584
  • [47] Security-constrained optimal power flow: A parallel self-adaptive differential evolution approach
    Thitithamrongchai, C.
    Eua-Arporn, B.
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2008, 36 (03) : 280 - 298
  • [48] Unit Commitment considering Security-Constrained Optimal Power Flow by Lagrangian Relaxation with Genetic Algorithm
    Poommalee, Weeraya
    Damrongkulkamjorn, Parnjit
    ECTI-CON 2008: PROCEEDINGS OF THE 2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 893 - 896
  • [49] Unified power flow controllers for security-constrained transmission management
    Bruno, S
    La Scala, M
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2004, 19 (01) : 418 - 426
  • [50] Minimal Impact Corrective Actions in Security-Constrained Optimal Power Flow Via Sparsity Regularization
    Phan, Dzung T.
    Sun, Xu Andy
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (04) : 1947 - 1956