Stealthy Black-box Attacks on Deep Learning Non-intrusive Load Monitoring Models

dc.contributor.authorSrikantha, P.
dc.contributor.authorWang, J.
dc.date.accessioned2021-09-01T18:34:08Z
dc.date.available2021-09-01T18:34:08Z
dc.date.issued2021-03
dc.description.abstractWith the advent of the advanced metering infrastructure, electricity usage data is being continuously generated at large volumes by smart meters vastly deployed across the modern power grid. Electric power utility companies and third party entities such as smart home management solution providers gain significant insights into these datasets via machine learning (ML) models. These are then utilized to perform active/passive power demand management that fosters economical and sustainable electricity usage. Although ML models are powerful, these remain vulnerable to adversarial attacks. A novel stealthy black-box attack construction model is proposed that targets deep learning models utilized to perform non-intrusive load monitoring based on smart meter data. These attacks are practical as there is no assumption of the knowledge of training data, internal parameters, and architecture of the targeted ML model. The profound impact of the proposed stealthy attack constructions on energy analytics and decision-making processes is shown through comprehensive theoretical, practical, and comparative analysis. This work sheds light on vulnerabilities of ML models in the smart grid context and provides valuable insights for securely accommodating increasing prevalence of artificial intelligence in the modern power grid.en_US
dc.identifier.citationJ. Wang and P. Srikantha, "Stealthy Black-Box Attacks on Deep Learning Non-Intrusive Load Monitoring Models," in IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3479-3492, July 2021.en_US
dc.identifier.issn1949-3053
dc.identifier.urihttp://dx.doi.org/10.1109/TSG.2021.3062722en_US
dc.identifier.urihttp://hdl.handle.net/10315/38541
dc.language.isoenen_US
dc.publisherIEEE Transactions on Smart Griden_US
dc.rights© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rights.articlehttps://ieeexplore.ieee.org/abstract/document/9365710/keywords#keywordsen_US
dc.rights.journalhttps://www.ieee.org/about/index.html?WT.mc_id=head_bmen_US
dc.rights.publisherhttps://www.ieee.org/en_US
dc.subjectpower system securityen_US
dc.subjectmachine learning algorithmsen_US
dc.subjectpower system managementen_US
dc.titleStealthy Black-box Attacks on Deep Learning Non-intrusive Load Monitoring Modelsen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Srikantha_AAM_10.1109.TSG.2021.3062722.pdf
Size:
4.65 MB
Format:
Adobe Portable Document Format
Description:
Main Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.83 KB
Format:
Item-specific license agreed upon to submission
Description: