Security protection strategy of power terminal based on deep learning

被引:0
|
作者
Cai, RongYan [1 ]
Cheng, Yong [1 ]
Jia, YongLiang [2 ]
机构
[1] State Grid Fujian Elect Power Co Ltd, 257 Wusi Rd, Fuzhou 350000, Fujian, Peoples R China
[2] State Grid Hebei Mkt Serv Ctr, Shijiazhuang, Hebei, Peoples R China
关键词
Deep learning; Long short-term memory neural network; Security protection; Power terminal; MODEL;
D O I
10.1109/ISCSIC57216.2022.00069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to solve the problem of security vulnerabilities in embedded power terminals, this paper studies the application of long short-term memory neural network to the security protection of power terminals, and establishes a security protection model. According to the characteristic that the protection model lacks negative samples for training in the training process, the study uses the characteristics of long short-term memory neural network to improve the model, and compares and analyzes it with the same type of model in practical applications. The results show that the model designed by the research has a model accuracy of 0.99 in the original dataset and a model accuracy of 0.98 in the mixed dataset, and the model performance data is the best among the same type of models. It can be seen that the model of research design has sufficient practicability and can provide a new idea for related fields.
引用
收藏
页码:301 / 305
页数:5
相关论文
共 50 条
  • [21] Crucial Power Transfer Interface Identification Based on Deep Learning and Bagging Strategy
    Huang, Tian-en
    Niu, Tao
    Guo, Qinglai
    Sun, Hongbin
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018,
  • [22] Power system transient security assessment based on deep learning considering partial observability
    Pournabi, Mehrdad
    Mohammadi, Mohammad
    Afrasiabi, Shahabodin
    Setoodeh, Peyman
    ELECTRIC POWER SYSTEMS RESEARCH, 2022, 205
  • [23] Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization
    Gao, Xin
    Zhou, Yang
    Xu, Lijuan
    Zhao, Dawei
    ENTROPY, 2022, 24 (12)
  • [24] The protection strategy of data security based on JAVA stream filtering
    Lin, Jian Bing
    Zou, Jin An
    Applied Mechanics and Materials, 2013, 433-435 : 1631 - 1634
  • [25] Deep Reinforcement Learning Based Load Control Strategy for Combined Heat and Power Units
    Xie, Ge
    Cui, Chenggang
    Zhao, Huirong
    Yang, Jiguang
    Shi, Yunfei
    2021 11TH INTERNATIONAL CONFERENCE ON POWER AND ENERGY SYSTEMS (ICPES 2021), 2021, : 280 - 284
  • [26] Novel adaptive stability enhancement strategy for power systems based on deep reinforcement learning
    Zhao, Yincheng
    Hu, Weihao
    Zhang, Guozhou
    Huang, Qi
    Chen, Zhe
    Blaabjerg, Frede
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2023, 152
  • [27] Power Mobile Terminal Security Risk Assessment Based on AHP
    Chen Lu
    Li Nige
    Chen Mu
    Li Yong
    Xi Zesheng
    2018 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2018, : 126 - 130
  • [28] Ontology Based Security Risk Model for Power Terminal Equipment
    Liang, Xiao
    Ma, Lixin
    An, Ningyu
    Jiang, Dongxiao
    Li, Chenggang
    Chen, Xiaona
    Zhao, Lijiao
    2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 212 - 216
  • [29] A photolabile protection strategy for terminal alkynes
    Gschneidtner, Tina A.
    Moth-Poulsen, Kasper
    TETRAHEDRON LETTERS, 2013, 54 (40) : 5426 - 5429
  • [30] Static Security Oriented Preventive Control of Power System Based on Double Deep Reinforcement Learning
    Li B.
    Zhao J.
    Han X.
    Yang J.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2023, 43 (05): : 1818 - 1830