Real-Time Anomaly Detection in Smart Grid Networks Using Deep Learning with Cross-Domain Generalization and Multi-Task Learning
DOI:
https://doi.org/10.62051/ijmee.v3n1.02Keywords:
Smart Grip, Deep Learning, Anomaly DetectionAbstract
Real-time anomaly detection in smart grid networks is critical for ensuring the reliability and security of energy distribution systems. Traditional methods often struggle with the complexity and volume of data generated by these networks. This paper presents a novel deep learning-based approach that integrates Cross-Domain Generalization (CDG) and Multi-Task Learning (MTL) to enhance the detection of anomalies in smart grid data. By leveraging diverse datasets and iterative learning techniques, our method improves model robustness and generalization. Experimental results demonstrate significant improvements over baseline methods, showcasing the effectiveness of our approach. We provide comprehensive evaluations and discuss the broader implications for anomaly detection in industrial applications.
References
Anderson, M., et al. (2020). Real-time anomaly detection in smart grids. Journal of Energy Management, 45(3), 123-135.
X. Chen, M. Liu, Y. Niu, X. Wang and Y. Cheng Wu, "Deep-Learning-Based Lithium Battery Defect Detection via Cross-Domain Generalization," in IEEE Access, vol. 12, pp. 78505-78514, 2024.
Li, J., et al. (2019). Anomaly detection in smart grids: A survey. IEEE Communications Surveys & Tutorials, 21(3), 1948-1972.
Wang, T., et al. (2020). Multi-task learning for anomaly detection in smart grids. IEEE Transactions on Smart Grid, 11(2), 1185-1194.
Zhang, Y., et al. (2018). Real-time anomaly detection for high-speed railway systems. IEEE Transactions on Intelligent Transportation Systems, 19(5), 1104-1116.
Gao, H., et al. (2019). Machine learning approaches for anomaly detection in smart grid networks. Electric Power Systems Research, 170, 15-23.
Goodfellow, I., et al. (2016). Deep Learning. MIT Press.
Hochreiter, S., & Schmidhuber, J. (1997). Long Short-Term Memory. Neural Computation, 9(8), 1735-1780.
Kingma, D. P., & Ba, J. (2015). Adam: A method for stochastic optimization. International Conference on Learning Representations.
LeCun, Y., et al. (2015). Deep learning. Nature, 521(7553), 436-444.
Chen, Y., et al. (2021). A Review of Anomaly Detection in Smart Grids. Journal of Energy Engineering, 147(5), 04021031.
Graves, A., et al. (2013). Speech Recognition with Deep Recurrent Neural Networks. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 6645-6649.
Karpathy, A., et al. (2015). Deep Visual-Semantic Alignments for Generating Image Descriptions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 3128-3137.
Ng, A. Y. (2011). Sparse Autoencoder. Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS), 652-660.
Vincent, P., et al. (2008). Extracting and Composing Robust Features with Denoising Autoencoders. Proceedings of the International Conference on Machine Learning (ICML), 1096-1103.
Wang, Y., et al. (2019). Smart Grid Fault Detection Using Convolutional Neural Networks. IEEE Transactions on Smart Grid, 10(4), 4502-4510.
Kim, H., et al. (2018). Anomaly Detection for Industrial Control Systems Using Machine Learning. Proceedings of the IEEE Conference on Communications and Network Security (CNS), 1-9.
Zheng, Z., et al. (2018). Wide & Deep Learning for Recommender Systems. Proceedings of the ACM Conference on Recommender Systems (RecSys), 7-15.
Cho, K., et al. (2014). Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), 1724-1734.
Srivastava, N., et al. (2015). Training Very Deep Networks. Proceedings of the Advances in Neural Information Processing Systems (NIPS), 2377-2385.
Wang, X., Wu, Y. C., Ji, X., & Fu, H. (2024). Algorithmic discrimination: examining its types and regulatory measures with emphasis on US legal practices. Frontiers in Artificial Intelligence, 7, 1320277.
Ioffe, S., & Szegedy, C. (2015). Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. Proceedings of the International Conference on Machine Learning (ICML), 448-456.
Wang, X., Wu, Y. C., & Ma, Z. (2024). Blockchain in the courtroom: exploring its evidentiary significance and procedural implications in US judicial processes. Frontiers in Blockchain, 7, 1306058.
Szegedy, C., et al. (2015). Going Deeper with Convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1-9.
Alahi, A., et al. (2016). Social LSTM: Human Trajectory Prediction in Crowded Spaces. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 961-971.
Ganin, Y., et al. (2016). Domain-Adversarial Training of Neural Networks. Proceedings of the Advances in Neural Information Processing Systems (NIPS), 2093-2102.
Han, S., et al. (2016). Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization, and Huffman Coding. Proceedings of the International Conference on Learning Representations (ICLR).
Radford, A., et al. (2016). Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. Proceedings of the International Conference on Learning Representations (ICLR).
Silver, D., et al. (2016). Mastering the Game of Go with Deep Neural Networks and Tree Search. Nature, 529(7587), 484-489.
Ma, Z., Chen, X., Sun, T., Wang, X., Wu, Y. C., & Zhou, M. (2024). Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization. Future Internet, 16(5), 163.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.