Srikantha, P.Wang, J.2021-09-012021-09-012021-03J. Wang and P. Srikantha, "Stealthy Black-Box Attacks on Deep Learning Non-Intrusive Load Monitoring Models," in IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3479-3492, July 2021.1949-3053http://dx.doi.org/10.1109/TSG.2021.3062722http://hdl.handle.net/10315/38541With the advent of the advanced metering infrastructure, electricity usage data is being continuously generated at large volumes by smart meters vastly deployed across the modern power grid. Electric power utility companies and third party entities such as smart home management solution providers gain significant insights into these datasets via machine learning (ML) models. These are then utilized to perform active/passive power demand management that fosters economical and sustainable electricity usage. Although ML models are powerful, these remain vulnerable to adversarial attacks. A novel stealthy black-box attack construction model is proposed that targets deep learning models utilized to perform non-intrusive load monitoring based on smart meter data. These attacks are practical as there is no assumption of the knowledge of training data, internal parameters, and architecture of the targeted ML model. The profound impact of the proposed stealthy attack constructions on energy analytics and decision-making processes is shown through comprehensive theoretical, practical, and comparative analysis. This work sheds light on vulnerabilities of ML models in the smart grid context and provides valuable insights for securely accommodating increasing prevalence of artificial intelligence in the modern power grid.en© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.power system securitymachine learning algorithmspower system managementStealthy Black-box Attacks on Deep Learning Non-intrusive Load Monitoring ModelsArticlehttps://www.ieee.org/about/index.html?WT.mc_id=head_bmhttps://www.ieee.org/https://ieeexplore.ieee.org/abstract/document/9365710/keywords#keywords