Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks
Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks
Abstract—False data injection attacks (FDIA) are a main cate- X ∈ Rn State space.
gory of cyber-attacks threatening the security of power systems. Z ∈ Rm Measurement space.
Contrary to the detection of these attacks, less attention has x∈X A state vector.
been paid to identifying the attacked units of the grid. To this
end, this work jointly studies detecting and localizing the stealth x̂ ∈ X Original state vector without an attack.
FDIA in power grids. Exploiting the inherent graph topology of x̌ ∈ X False data injected state vector.
power systems as well as the spatial correlations of measure- z∈Z A measurement vector.
ment data, this paper proposes an approach based on the graph zo ∈ Z Original measurement vector.
neural network (GNN) to identify the presence and location of za ∈ Z Attacked measurement vector.
the FDIA. The proposed approach leverages the auto-regressive
moving average (ARMA) type graph filters (GFs) which can a∈Z Attack vector.
better adapt to sharp changes in the spectral domain due to h(x) Nonlinear measurement function at x.
their rational type filter composition compared to the polyno- T Attacker’s target area to perform FDI attack.
mial type GFs such as Chebyshev. To the best of our knowledge, W ∈ Rn×n Weighted
adjacency matrix.
this is the first work based on GNN that automatically detects D ∈ Rn×n Dii = j W ij Diagonal degree matrix.
and localizes FDIA in power systems. Extensive simulations and
visualizations show that the proposed approach outperforms the ∈ Rn×n = diag [λ1 , . . . , λn ] Graph Fourier
available methods in both detection and localization of FDIA frequencies.
for different IEEE test systems. Thus, the targeted areas can be U ∈ Rn×n = [u1 , . . . , un ] Graph Fourier basis.
identified and preventive actions can be taken before the attack L ∈ Rn×n = UUT Normalized graph Laplacian.
impacts the grid.
Index Terms—False data injection attacks, graph neural
networks, machine learning, smart grid, power system security. I. I NTRODUCTION
MART grids integrate Information and Communication
S Technologies (ICT) into large-scale power networks
to generate, transmit, and distribute electricity more effi-
N OMENCLATURE
ciently [1]. Remote Terminal Units (RTUs) and Phasor
Pi + jQi Complex power injection at bus i. Measurement Units (PMUs) are utilized to acquire the physical
Pij + jQij Complex power flow between bus i and j. measurements and deliver them to the Supervisory Control and
Vi , θi Voltage magnitude and phase angle of bus i. Data Acquisition Systems (SCADAs). Then, the ICT network
n, m Number of buses, number of measurements. transfers these measurements to the application level where
Manuscript received May 23, 2021; revised August 27, 2021 and September the power system operators process them and take the nec-
30, 2021; accepted October 2, 2021. Date of publication October 5, 2021; essary actions [2]. As a direct consequence, power system
date of current version December 23, 2021. This work was supported by NSF reliability is determined by the accuracy of the steps along
under Award 1808064. Paper no. TSG-00795-2021. (Corresponding author:
Osman Boyaci.) this cyber-physical pipeline [3]. Power system state estima-
Osman Boyaci, Katherine R. Davis, Thomas J. Overbye, and tion (PSSE) modules employ these measurements to estimate
Erchin Serpedin are with the Department of Electrical and Computer the current operating point of the grid [4] and thus the integrity
Engineering, Texas A&M University, College Station, TX 77843 USA
(e-mail: [email protected]; [email protected]; [email protected]; and trustworthiness of the measurements are crucial for proper
[email protected]). operation of power systems. In addition, the accuracy of power
Mohammad Rasoul Narimani is with the College of Engineering, Arkansas system analysis tools such as energy management, contin-
State University, Jonesboro, AR 72404 USA (e-mail: [email protected]).
Muhammad Ismail is with the Department of Computer Science, gency and reliability analysis, load and price forecasting, and
Tennessee Technological University, Cookeville, TN 38505 USA (e-mail: economic dispatch depends on these measurements [5]. Thus,
[email protected]). power system operation strongly depends on the accuracy of
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TSG.2021.3117977. the measurements and the integrity of their flow through the
Digital Object Identifier 10.1109/TSG.2021.3117977 system. Therefore, metering devices represent highly attractive
1949-3053
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
808 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
targets for adversaries that try to obstruct the grid operation a threshold using the Mahalanobis norm of the residuals of
by corrupting the measurements. the non-attacked situation. Any residue larger than the thresh-
By disrupting the integrity of measurement data, false data old is regarded as an attacked sample. Apart from the manual
injection attacks (FDIAs) constitute a considerable cyber- threshold optimization steps, detection times are at the range of
physical threat. More specifically, an adversary injects some seconds in their estimation based models. A generalized mod-
false data to the measurements in order to mislead the PSSE ulation operator that is applied on the states of the system is
and force it to converge to another operating point. Since the presented as an ongoing work in a brief announcement in [12]
state of the power system is miscalculated by using these to localize the FDIAs in power systems. Yet, the results are
false data, any action taken by the grid operator based on not published as of today. Authors in [13] present an internal
the false operating point can lead to serious physical con- observer-based detection and localization method for FDIA in
sequences including systematic problems and failures [6]. In power systems. They create and assign an interval observer
traditional power grids, the largest normalized residual test to each measurement device and construct a customized logic
(LNRT) is employed within the bad data detection (BDD) localization judgment matrix to detect and localize the FDIA.
module along with PSSE to detect the “bad” measurement Nevertheless, their average detection delay is more than 1.1
data [4]. Nevertheless, a designed false data injected measure- seconds, which can highly limit their usability in a real life
ment can bypass the BDD. In particular, [2], [7] show that by scenario. Lack of scalability and the need for a custom solu-
satisfying the power flow equations, an intruder can create an tion requiring manual labor represent additional limitations of
unobservable (stealth) FDIA and bypass the BDD if s/he has this method. A Graph Signal Processing (GSP) based approach
sufficient information about the grid. Various methods have is developed in [14] to detect and localize FDIAs using the
been proposed to alert the grid operator about the presence of Graph Fourier Transform (GFT), local smoothness, and vertex-
the FDIA without providing any information about the attack frequency energy distribution methods. Hovewer, the random
location [8], [9]. Localizing the attack is crucial for power and easily detectable attacks employed to test their models do
system operators since they can take preventive action such as not comprehensively assess the actual performance of the mod-
isolating the under-attack buses and re-dispatching the system els. Besides, manual threshold tuning of graph filters (GFs)
accordingly. Therefore, this paper focuses jointly on detection brings extra effort for their proposed methods. Authors in [15]
and localization of the FDIA in power systems. propose physics- and learning-based approaches to detect and
localize the FDIAs in automatic generation control (AGC)
of power systems. While the physics-based method relies on
A. Related Works interaction variables, the learning-based approach exploits the
In general, there are two main approaches to detect historical Area Control Error (ACE) data, and utilizes a Long
and localize the FDIAs: model-based and data driven Short Term Memory (LSTM) Neural Network (NN) to gener-
approaches [8]. In the model-based methods [10]–[14], a ate a model for learning the data pattern. Nevertheless, [15]
model for the system is built and its parameters are esti- reports results limited to a 5-bus system and assumes training
mated to detect the FDIAs. Since there is no training, these an LSTM model for each measurement. Thus, the limited num-
methods do not require the historical data. However, the ber of components deeply confines the large scale attributes of
detection delays, scalability issues and threshold tuning steps the proposed method. Furthermore, training a separate detector
can limit the performance and usability of the model-based for each bus extremely increases the overall model complex-
approaches [9]. Conversely, the data-driven methods [15] are ity for large systems and reduces its suitability for real world
system independent and require historical data and a train- applications.
ing procedure. However, they provide scalability and real time
compatibility due to the excessive training. Data driven meth-
ods, machine learning (ML) [16], in particular, offer superior B. Motivation
performances to detect FDIAs in power systems as the his- Due to their graph-based topology, graph structural data
torical datasets are growing [8], [9]. Therefore, we employ a such as social networks, traffic networks, and electric grid
data driven approach in this work for detecting and localizing networks cannot be modeled efficiently in the Euclidean space
FDIAs in power systems. and require graph-type architectures [17]. Processing (filter-
While there has been a great deal of research on detection of ing) an image having 30 pixels and a power grid having 30
FDIAs, only a few attempts have been made to localize these buses are demonstrated in Fig. 1. Since nodes are ordered and
attacks [10]–[15]. Since localization of FDIAs is relatively a have the same number of neighbors for image data, it can
newer research subject compared to detection of these attacks, be processed in a 2D Euclidean space. For example a slid-
the current approaches proposed in literature suffer from some ing kernel can easily capture the spatial correlations of pixels
limitations. A multistage localization algorithm based on graph in this Euclidean space. Conversely, neighborhood relation-
theory results is proposed in [10] to localize the attack at clus- ships are unordered and vary from node to node in a graph
ter level. Nevertheless, the low resolution hinders the benefits signal [17]. Therefore, graph signals need to be processed in
of localization in cluster level algorithms. In [11], a model- non-Euclidean spaces determined by the topology of the graph.
driven analytical redundancy approach utilizing Kalman filters In fact, as a highly complex graph structural data, smart grid
is presented for joint detection and mitigation of FDIA in AGC signals require graph type architectures such as GSP or GNN
systems. In their model, the authors of [11] first determine to exploit the spatial correlations of the grid.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 809
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
810 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
in G is represented by a vector f ∈ Rn , where the element i to approximate the required filter response [20]. Since only
of the vector corresponds to a scalar at the vertex i ∈ V. K-hop neighbors of v are considered to calculate the filter
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 811
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
812 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
TABLE I
I MPLEMENTED FDIA S
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 813
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
814 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 815
TABLE V
J OINT D ETECTION AND L OCALIZATION T IMES IN M ILLISECONDS
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
816 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 817
Fig. 9. t-SNE embedding of model’s layers to visualize the attack detection where true input and output data are given in Fig. 8. For each model and each
layer l, output of the model is embedded in 2D using t-SNE. Since t-SNE preserves the structure of the high dimensional data, models’ transformation can be
visualized and compared in a lower dimension, such as 2D. Note that due to its topology aware ARMA graph filtering, the proposed model better classifies
samples by converging to the true output depicted in Fig. 8(b). As a consequence, it yields the minimum number of FP and FN compared to other models.
is more advantageous than other architectures as can be seen the global characteristics of the graph, an FIR GF requires
from the detection results in Table IV and the localization dis- “high” order spectral response as can be seen from Fig. 4.
tributions in Figs. 6 and 7. As for the GNN family, ARMA Nevertheless, due to the poor interpolation and extrapolation
outperforms CHEB due to the fact that rational GFs imple- capabilities of the high order polynomials, it becomes sensi-
mented using the ARMA architecture provide more flexible tive to variations and may overfit to the training data [21].
frequency responses compared to the polynomial filters such To verify this characteristic, we fix the other parameters of
as CHEB [29]. CHEB GF at their optimal values tabulated in Table III and
It is observed from our extensive experiments that the train a CHEB model for the IEEE 300-bus test system for
proposed ARMA based model performs better compared to each K ∈ {5, 7, 9, 11}. FDIA detection results in terms of
other models for larger test cases. As an illustration, for the F1% are depicted in Fig. 10. Clearly, increasing K beyond a
95% F1 threshold level, it outperforms the second best model certain point makes the model susceptible to variations such
CHEB by 5.64%, 8.56%, and 10.07% in SW localization and as noise, and thus, it can degrade the test set performance.
by 8.78%, 11.87%, and 14.67% in NW localization for IEEE Note that similar conclusion can also be corroborated for the
57-, 118-, and 300-bus systems, respectively. This difference localization results.
is due to the fact that in larger and denser graphs, (i) the spa- Bus level localization is a multi-label classification task and
tial correlation between adjacent measurements becomes more should be evaluated accordingly. Besides, performance metrics
dominant compared to the global correlations and (ii) ARMA can cause inaccurate or misleading outcomes when they are
GFs better adapt to abrupt changes in the spectral domain not interpreted correctly. Namely, missing an attack (FN) could
compared to the polynomial ones. be much more severe than a false alarm (FP) when dealing
As stated before, the output of each vertex v only depends with FDIAs due to their consequences. An example of local-
on its K-hop neighbors for a K-order polynomial GF. In other ization results for a hypothetical model is given in Table VI
words, the output of v is independent of the vertices beyond the with 4 samples in rows and 5 buses in columns where TP, FP,
K-hop neighbors for a K-order FIR GF [22]. Thus, to capture FN, and TN samples are highlighted with green, blue, red, and
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
818 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 1, JANUARY 2022
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.
BOYACI et al.: JOINT DETECTION AND LOCALIZATION OF STEALTH FALSE DATA INJECTION ATTACKS 819
[20] M. Defferrard, X. Bresson, and P. Vandergheynst, “Convolutional neural Osman Boyaci (Graduate Student Member, IEEE)
networks on graphs with fast localized spectral filtering,” in Advances in received the B.Sc. degree (Hons.) in electronics
Neural Information Processing Systems (NIPS). Red Hook, NY, USA: engineering in 2013, the B.Sc. degree (Hons.) in
Curran, 2016. computer engineering in 2013, and the M.Sc. degree
[21] F. M. Bianchi, D. Grattarola, L. Livi, and C. Alippi, “Graph in computer engineering in 2017 from Istanbul
neural networks with convolutional ARMA filters,” IEEE Technical University, Istanbul, Turkey. He is cur-
Trans. Pattern Anal. Mach. Intell., early access, Jan. 26, 2021, rently pursuing the Ph.D. degree with Texas A&M
doi: 10.1109/TPAMI.2021.3054830. University, working on graph neural network-based
[22] X. Shi, H. Feng, M. Zhai, T. Yang, and B. Hu, “Infinite impulse response cybersecurity in smart grids.
graph filters in wireless sensor networks,” IEEE Signal Process. Lett., His research interests include machine learning,
vol. 22, no. 8, pp. 1113–1117, Aug. 2015. artificial intelligence, and cybersecurity.
[23] N. Tremblay, P. Gonçalves, and P. Borgnat, “Design of graph filters
and filterbanks,” in Cooperative and Graph Signal Processing. London, Mohammad Rasoul Narimani (Member, IEEE)
U.K.: Elsevier, 2018, pp. 299–324. received the B.S. degree in electrical engineer-
[24] O. Boyaci et al., “Graph neural networks based detection of stealth ing from Razi University, the M.S. degree in
false data injection attacks in smart grids,” 2021. [Online]. Available: electrical engineering from the Shiraz University
arXiv:2104.02012. of Technology, and the Ph.D. degree in electri-
[25] L. V. D. Maaten and G. Hinton, “Visualizing data using t-SNE,” J. Mach. cal engineering from the Missouri University of
Learn. Res., vol. 9, pp. 2579–2605, Nov. 2008. Science & Technology. He is an Assistant Professor
[26] J. C. Mason and D. C. Handscomb, Chebyshev Polynomials. Boca Raton, with the College of Engineering, Arkansas State
FL, USA: CRC Press, 2002. University. Before joining Arkansas State University,
[27] S. W. Smith, The Scientist and Engineer’s Guide to Digital Signal he was a Postdoctoral Researcher with Texas A&M
Processing, vol. 14. San Diego, CA, USA: California Techn. Publ., 1997. University, College Station. His research interests are
[28] H. Föllmer and U. Küchler, “Richard von Mises,” in Mathematics in in the application of optimization techniques to electric power systems.
Berlin. Basel, Switzerland: Springer, 1998, pp. 111–116.
[29] A. Loukas, A. Simonetto, and G. Leus, “Distributed autoregressive Katherine R. Davis (Senior Member, IEEE)
moving average graph filters,” IEEE Signal Process. Lett., vol. 22, received the B.S. degree in electrical engineering
no. 11, pp. 1931–1935, Nov. 2015. from the University of Texas at Austin, Austin, TX,
[30] A. Loukas, M. Zuniga, M. Woehrle, M. Cattani, and K. Langendoen, USA, in 2007, and the M.S. and Ph.D. degrees in
“Think globally, act locally: On the reshaping of information land- electrical engineering from the University of Illinois
scapes,” in Proc. 12th Int. Conf. Inf. Process. Sens. Netw., Philadelphia, at Urbana–Champaign, Champaign, IL, USA, in
PA, USA, 2013, pp. 265–276. 2009 and 2011, respectively. She is currently an
[31] E. Isufi, A. Loukas, A. Simonetto, and G. Leus, “Autoregressive moving Assistant Professor of Electrical and Computer
average graph filtering,” IEEE Trans. Signal Process., vol. 65, no. 2, Engineering with Texas A&M University.
pp. 274–288, Jan. 2017.
[32] J. Zhao, J. Wang, and L. Yin, “Detection and control against replay
attacks in smart grid,” in Proc. 12th Int. Conf. Comput. Intell. Security Muhammad Ismail (Senior Member, IEEE)
(CIS), Wuxi, China, 2016, pp. 624–627. received the B.Sc. (Hons.) and M.Sc. degrees in
[33] G. Chaojun, P. Jirutitijaroen, and M. Motani, “Detecting false data injec- electrical engineering (electronics and communica-
tion attacks in AC state estimation,” IEEE Trans. Smart Grid, vol. 6, tions) from Ain Shams University, Cairo, Egypt, in
no. 5, pp. 2476–2483, Sep. 2015. 2007 and 2009, respectively, and the Ph.D. degree
[34] S. Tan, W.-Z. Song, M. Stewart, J. Yang, and L. Tong, “Online data in electrical and computer engineering from the
integrity attacks against real-time electrical market in smart grid,” IEEE University of Waterloo, Waterloo, ON, Canada, in
Trans. Smart Grid, vol. 9, no. 1, pp. 313–322, Jan. 2018. 2013. He is currently an Assistant Professor with
[35] J. Giraldo, A. Cárdenas, and N. Quijano, “Integrity attacks on real-time the Department of Computer Science, Tennessee
pricing in smart grids: Impact and countermeasures,” IEEE Trans. Smart Technological University, Cookeville, TN, USA. He
Grid, vol. 8, no. 5, pp. 2249–2257, Sep. 2017. was a co-recipient of the Best Paper Awards in the
[36] New York Independent System Operator (NYISO). (Jul. 2021). Actual— IEEE ICC 2014, the IEEE Globecom 2014, the SGRE 2015, the Green 2016,
Historical. [Online]. Available: https://www.nyiso.com/load-data the Best Conference Paper Award from the IEEE TCGCN at the IEEE ICC
[37] M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H. V. Poor, 2019, and IEEE IS 2020.
“Machine learning methods for attack detection in the smart grid,” Thomas J. Overbye (Fellow, IEEE) received the
IEEE Trans. Neural Netw. Learn. Syst., vol. 27, no. 8, pp. 1773–1786, B.S., M.S., and Ph.D. degrees in electrical engi-
Aug. 2016. neering from the University of Wisconsin Madison,
[38] J. Yan, B. Tang, and H. He, “Detection of false data attacks in smart Madison, WI, USA. He is currently with Texas
grid with supervised learning,” in Proc. Int. Joint Conf. Neural Netw. A&M University, where he is a Professor and holder
(IJCNN), Vancouver, BC, Canada, 2016, pp. 1395–1402. of the O’Donnell Foundation Chair III.
[39] L. Thurner et al., “Pandapower—An open-source python tool for conve-
nient modeling, analysis, and optimization of electric power systems,”
IEEE Trans. Power Syst., vol. 33, no. 6, pp. 6510–6521, Nov. 2018.
[40] F. Pedregosa et al., “Scikit-learn: Machine learning in python,” J. Mach.
Learn. Res., vol. 12, pp. 2825–2830, Nov. 2011.
[41] M. Abadi et al., “TensorFlow: A system for large-scale machine learn- Erchin Serpedin (Fellow, IEEE) is a Professor
ing,” in Proc. 12th USENIX Symp. Oper. Syst. Design Implement. with the Electrical and Computer Engineering
(OSDI), 2016, pp. 265–283. Department, Texas A&M University, College
[42] A. Jindal, A. Dua, K. Kaur, M. Singh, N. Kumar, and S. Mishra, Station. He has authored four research monographs,
“Decision tree and svm-based data analytics for theft detection in one textbook, 17 book chapters, 170 journal papers,
smart grid,” IEEE Trans. Ind. Informat., vol. 12, no. 3, pp. 1005–1016, and 270 conference papers. His current research
Jun. 2016. interests include signal processing, machine
[43] D. Wang, X. Wang, Y. Zhang, and L. Jin, “Detection of power grid dis- learning, artificial intelligence, cyber security,
turbances and cyber-attacks based on machine learning,” J. Inf. Security smart grids, and wireless communications. He
Appl., vol. 46, pp. 42–52, Jun. 2019. served as an Associate Editor for more than 12
[44] Y. Wang, M. M. Amin, J. Fu, and H. B. Moussa, “A novel data analyti- journals, including journals such as the IEEE
cal approach for false data injection cyber-physical attack mitigation in T RANSACTIONS ON I NFORMATION T HEORY, IEEE T RANSACTIONS ON
smart grids,” IEEE Access, vol. 5, pp. 26022–26033, 2017. S IGNAL P ROCESSING, IEEE T RANSACTIONS ON C OMMUNICATIONS,
[45] T. O’Malley et al.. (2019). Keras Tuner. [Online]. Available: IEEE S IGNAL P ROCESSING L ETTERS, IEEE C OMMUNICATIONS L ETTERS,
https://github.com/keras-team/keras-tuner IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS, IEEE Signal
[46] J. W. Tukey, Exploratory Data Analysis, vol. 2. Reading, MA, USA: Processing Magazine, and Signal Processing (Elsevier), and as a technical
Addison-Wesley, 1977. chair for six major conferences.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:28:24 UTC from IEEE Xplore. Restrictions apply.