Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow

被引:0
|
作者
Zuo, Ke [1 ]
Sun, Mingyang [2 ,3 ]
Zhang, Zhenyong [4 ]
Cheng, Peng [1 ]
Strbac, Goran [5 ]
Kang, Chongqing [6 ]
机构
[1] Zhejiang Univ, Control Sci & Engn, Hangzhou 310058, Peoples R China
[2] Peking Univ, Coll Engn, Dept Ind Engn & Management, Beijing 100091, Peoples R China
[3] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[4] Guizhou Univ, Dept Comp Sci & Technol, Guiyang 550025, Peoples R China
[5] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[6] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Power system stability; Transient analysis; Security; Robustness; Load flow; Stability analysis; Closed box; Machine learning; robustness; cyber security; transferability-oriented adversarial attack; security-constrained optimal power flow; STATE ESTIMATION; TRANSIENT;
D O I
10.1109/TSG.2024.3397654
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security-constrained optimal power flow (SCOPF) aims to achieve an economical operation while considering the security issues during contingencies. Data-driven security assessment methods can provide security constraints for SCOPF and have been widely developed in the smart grid community to deal with the challenges arising from the increased penetration of renewable energy resources and the deployment of power electronic devices. Nevertheless, it has been recognized that the machine learning model is vulnerable to adversarial examples, and the power system communication network is prone to cyber attacks, which affects the decision-making of security assessment and SCOPF. To this end, a transferability-oriented adversarial robust security-constrained optimal power flow (TOAR-SCOPF) is proposed to diminish the potential security risks from attacks, formulated as an attacker-defender problem. To alleviate the conservatism of TOAR-SCOPF, a more realistic scenario with unknown features and unknown selected machine learning models is considered in this work by developing a novel transferability-oriented adversarial attack (TOA) method for data-driven security assessment while considering the power system's physical constraints to bypass the bad data detection mechanism. Case studies are conducted based on the IEEE 39-bus and IEEE 68-bus systems, respectively, to explore the vulnerability and demonstrate the effectiveness of the proposed TOAR-SCOPF.
引用
收藏
页码:5169 / 5181
页数:13
相关论文
共 50 条
  • [11] Contingency filtering techniques for preventive security-constrained optimal power flow
    Capitanescu, Florin
    Glavic, Mevludin
    Ernst, Damien
    Wehenkel, Louis
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) : 1690 - 1697
  • [12] Benders decomposition algorithm for corrective security-constrained optimal power flow
    Zhong, Shimin
    Han, Xueshan
    Liu, Daowei
    Wang, Mengxia
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2011, 31 (01): : 65 - 71
  • [13] A Novel MOGNDO Algorithm for Security-Constrained Optimal Power Flow Problems
    Pandya, Sundaram B.
    Visumathi, James
    Mahdal, Miroslav
    Mahanta, Tapan K.
    Jangir, Pradeep
    ELECTRONICS, 2022, 11 (22)
  • [14] Optimizing Primary Response in Preventive Security-Constrained Optimal Power Flow
    Dvorkin, Yury
    Henneaux, Pierre
    Kirschen, Daniel S.
    Pandzic, Hrvoje
    IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 414 - 423
  • [15] Toward a scalable robust security-constrained optimal power flow using a proximal projection bundle method
    Dandurand, Brian
    Kim, Kibaek
    Schanen, Michel
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 189
  • [16] A distributionally robust chance constrained optimization approach for security-constrained optimal power flow problems considering dependent uncertainty of wind power
    Huang, Wenwei
    Qian, Tong
    Tang, Wenhu
    Wu, Jianzhong
    Applied Energy, 2025, 383
  • [17] Parallel computation methods for static security-constrained optimal power flow of power system
    Yang Y.
    Tao Z.
    Liu H.
    Qin Z.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2019, 39 (01): : 99 - 105
  • [18] Stochastic security-constrained optimal power flow incorporating preventive and corrective actions
    Sharifzadeh, Hossein
    Amjady, Nima
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2016, 26 (11): : 2337 - 2352
  • [19] Preventive Security-Constrained Optimal Power Flow Considering UPFC Control Modes
    Wu, Xi
    Zhou, Zhengyu
    Liu, Gang
    Qi, Wanchun
    Xie, Zhenjian
    ENERGIES, 2017, 10 (08)
  • [20] Corrective Security-Constrained Optimal Power and Gas Flow With Binding Contingency Identification
    Sun, Guoqiang
    Chen, Sheng
    Wei, Zhinong
    Cheung, Kwok W.
    Zang, Haixiang
    IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2020, 11 (02) : 1033 - 1042