Real-Time_AI-Based_Anomaly_Detection_and_Classification_in_Power_Electronics_Dominated_Grids
Real-Time_AI-Based_Anomaly_Detection_and_Classification_in_Power_Electronics_Dominated_Grids
Abstract—Real-time anomaly detection system (ADS) and These challenges include control, privacy, stability, planning,
anomaly classification system (ACS) techniques are becoming a resilience, and cyber-physical security aspects [2].
crucial need for future power electronic dominated grid (PEDG). The PEDG resilient operation is constrained with predefined
Artificial intelligence techniques such as recurrent neural net-
works, specifically long short-term memory (LSTM) provide a boundaries for variables such as frequency, voltage, and power
promising solution to detect anomalies in power grids. The main quality indices. Any anomaly could cause destructive conse-
challenge is the implementation of these methods for real-time quences on the operation of the PEDG. These anomalies could
detection and classification for preventing catastrophic failure in have different characteristics such as component failure, faults,
PEDG. This article is addressing the challenge for detection and or malicious intrusive attacks. By considering the recent intru-
classification of anomalies in real-time in PEDG. The proposed
approach is based on integration of model predictive control (MPC) sive attempts on the power systems, cyber-physical security of
and LSTM for realizing real-time ADS and ACS. The LSTM the system gains extensive attention from governmental agencies
detection network can utilize the same time-series input data as and decision-making organizations, since it affects the national
the MPC, allowing for anomaly classification and correction. The security. Thus, prevention, detection [4], mitigation [5], and, if
proposed integrated LSTM-MPC approach has features of power needed, isolation of these cyber-physical intrusions are trending
electronics internal failure detection and corrective actions, which
is an important aspect in future PEDG to differentiate inverters research topics for modern PEDG. High penetration of DERs in
internal failures versus anomalies. Such internal failures include the grid requires various agents for proper functionality. These
open circuit fault that needs to be detected and classified from a include smart meters, PMUs, observers, smart loads, and the hi-
potential cyber-attack, allowing resilient operation of PEDG. The erarchical control architecture of the PEDG. Thus, it is necessary
proposed integrated LSTM-MPC scheme for real-time ADS and
to incorporate multilayer anomaly detection and classification
ACS scheme is tested on a realistic 14-bus system dominated with
inverters forming PEDG. (MADC) systems performing in multiple timescales. This is
inevitable to ensure the secure and seamless operation of the
Index Terms—Anomaly classification, anomaly detection, entire system.
cyberattack, fault-tolerance, inverter fault detection.
One of the most common cyber-attacks on power systems is
false data injection (FDI). FDIs target the data integrity of the
I. INTRODUCTION system which would push the control system to adopt inadequate
HE power system is experiencing a massive change to decisions [3], [4]. Attack consequences could vary, depending on
T be able to house ever-increasing distributed energy re-
sources (DERs) across the grid, to decrease the dependency
the number of compromised assets, attacker’s level of knowledge
on the system, attack propagation, and its persistence [5], [6].
on nonrenewable-based sources, and shift it toward renew- Even attacking one node of the system could impact the other
able resources, i.e., photovoltaics and wind. This new energy nodes across the PEDG, since the compromised DER may im-
paradigm is called power electronics dominated grid (PEDG) pact the neighboring nodes’ power quality and optimal operation
[1]. With all the benefits the PEDG introduces, it brings up of other DERs. The consequence of this attack is cascading
some challenges that need to be properly addressed prior to full failures across the grid. Thus, it is crucial for resilient operation
implementation of such a complex system in the real world. of PEDG to isolate the anomalous nodes to avoid cascading
failure across the PEDG that could results in catastrophic failure
Manuscript received 27 June 2022; revised 21 September 2022 and 26 October
of the power grid.
2022; accepted 17 November 2022. Date of publication 5 December 2022; date The supervisory layer of the PEDG must be able to dif-
of current version 23 March 2023. This work was supported by the Qatar ferentiate between these cyber intrusions and internal inverter
National Research Fund (QNRF is a member of Qatar Foundation) under
Grant NPRP12S-0226-190158. This paper was presented in part at the IEEE
failures to be able to make the most optimal decision for the
International Conference on Smart Grid and Renewable Energy, Doha, Qatar, PEDG. Without this knowledge, the supervisory layer will not
2022. (Corresponding author: Mohammad B. Shadmand.) be able to adopt the best decisions for a system with fleets
The authors are with the Department of Electrical and Computer Engi-
neering, University of Illinois Chicago, Chicago, IL 60607 USA (e-mail:
of smart assets across it. In the literature, numerous inverter
[email protected]; [email protected]; [email protected]; shadmand@uic. fault-tolerant control schemes are proposed [7], [8], [9], [10].
edu). The existing solutions are mainly focusing on detection, location
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/JESTIE.2022.3227005.
of the faulty switch, and updating the switching sequences
Digital Object Identifier 10.1109/JESTIE.2022.3227005 accordingly. The missing piece of the puzzle in improving the
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
550 IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS, VOL. 4, NO. 2, APRIL 2023
resiliency of the PEDG is differentiating these internal faults strong contender for scenarios in which the NN-based solutions
from malicious intrusions. Differentiating between these allows do not significantly increase computational time compared to
for optimal corrective action. A critically important missing conventional MPC and where real-time detection of anomalies
piece in exiting solutions is ensuring this process occurs in is of upmost importance. The work in [27] demonstrates an
real-time. If the MADC cannot detect and classify the anomaly ability for MPC-based controllers to detect open circuit faults
in a real-time-basis, the existing window for making proper using the MPC cost function. This control scheme utilizes the
decision might be missed. main core of MPC to generate modified switching sequences
The existing solutions for anomaly detection can be classi- constraint by the faulty switches without the need of major com-
fied into two main categories, which are system model-based putation. The model used for generating the switching sequences
techniques [11], [12], and data-driven schemes [13], [14], [15], is proven to be sufficient for open-circuit faults. However, for
[16], [17]. Generally, in model-based approaches, a model of more comprehensive anomaly detection and classification, this
the system must be developed, and the system parameters article proposes an NN module integrated within the MPC
must be estimated. Since there is not a training mechanism in framework. Therefore, a NN-based-detection scheme must pro-
model-based approaches, data mining is not needed. However, vide additional utility which the conventional MPC itself cannot.
the main drawbacks of model-based techniques is scalability of The main technical challenge for NN integration with MPC for
the detection mechanism, meaning that if the system changes, MADC is sufficient data collection for accurate classification in
a new model needs to be developed [18]. In model-based real-time.
schemes, for detection purposes, usually an observer is designed Existing solutions mostly focus on detecting FDI attacks and
to oversee the dynamic behavior of the system. The observers they neglect the internal failure of the DERs [2]. Also, the
for these model-based techniques could use Kalman filter [19], existing literature, mostly focuses on detection only and they
principle component analysis [20], and weighted least-square are not proposing any solutions after the detection is executed in
[21]. These model-based techniques could be implemented in real-time [2]. Additional utility is presented in classifying FDI
real-time applications. However, since they are highly depen- attacks and circuit faults with a single NN. The main contribution
dent on the mathematical model of the system, they are prone of this article is the realization of a framework, which is able to
to uncertainties, unforeseen disturbances, and computational detect and classify the anomalies across the PEDG in real-time.
burden as the system becomes more complex. Additionally, The proposed control scheme could be used at the primary layer
the model must be modified to account for any change in the of the control hierarchy of the PEDG to ensure detection and
PEDG. On the other hand, data-driven-based schemes can be classification of anomalies of any nature, i.e., inverter internal
used to perform effective detection and classification of wide failure or cyber-attack, in a real-time manner. Thus, integra-
range of anomalies such as FDIs in complex systems. As an tion of the proposed MADC in the primary control level at
example, artificial-neural-network-based approaches illustrated microseconds time scale results in smart self-learning inverters
proper performance for nonlinear systems. These tools are an operating at the grid-edge toward resilient and secure PEDG. The
appealing candidate for anomaly detection system (ADS) and considered attack model includes noise injection over the voltage
anomaly classification system (ACS) in PEDG. However, these and current measurements. The noise-based attacks are among
schemes require huge datasets for training purposes in order to the difficult-to-detect malicious activities, and their destructive
provide accurate performance. Other machine learning-based impacts are considerable, varying from service interruptions to
schemes such as k-nearest neighbor (k-NN), support vector ma- cascading failures across the grid. Specifically, the proposed
chine (SVM) [22], [23], and deep learning [24] suffer from the control framework employs recurrent neutral networks (RNN).
same drawbacks and real-time implementation. As illustrated in RNNs are utilized as feedforward NN techniques classification
[14] and [25], for power system applications, SVM illustrates proved unable to determine fault classification [28]. Thus, for
better performance than k-NN, however, the performance of anomaly classification a deep NN topology is preferred. This
SVM highly depends on kernel type selection. In [26], a deep- category of neural networks are among the top candidates to per-
learning-based method, which is modified version of WaveNet, form classifications on time-dependent variables while taking
was proposed and applied to IEEE 14-bus system while high into the account the previous inputs of the system [29]. Among
penetration of renewable resources are considered. With all these different variants of RNNs, the long short-term memory (LSTM)
methodologies, real-time implementation and scalability of the employs an internal memory to create the predictions for next
ADC and ACS are the remailing challenges. steps of the system [29], a perfect match to be integrated with
Incorporating neural network (NN) based scheme, thus, has MPC with long-time horizon prediction and optimization for the
an opportunity to cooperate with control methods to ensure application in hand and real-time implementation. This internal
an impactful contribution. In this article, the inherent charac- memory with better predictive capabilities makes the LSTM the
teristics of model predictive control (MPC) is leveraged for best option for fault classification within a system as complex as
effective real-time integration of NN-based network for realizing the PEDG. The initial part of the proposed framework employs
MADC in highly nonlinear PEDG. Conventional finite-set MPC LSTM in conjunction with MPC to perform anomaly detection
determines optimal switching sequences based on the model and classification for inverters at the primary layer controller.
and a cost function for optimization. The main focus of this The considered inverter topology in this article is cascaded
article is to develop a framework for integration of MPC and multilevel inverted (CMI) due to its fault-tolerant capability
NN for real-time MADC. The proposed work seeks to be a [27], [30]. It is worth mentioning that the same approach could
BAKER et al.: REAL-TIME AI-BASED ANOMALY DETECTION AND CLASSIFICATION IN POWER 551
Fig. 1. Complete system under study for this work. The proposed neural network scheme exists as a per phase detection of the cascaded multilevel inverter at
DER 4. This anomaly detection network is connected to the higher level 14-bus system at Bus 3. Anomalies are detected initially at the local controller, then verified
at the supervisory level before corrective action is taken.
Various communication protocols are developed for smart grid loop or communication link of each individual inverter. In that
applications for secure communications with minimal latency case, although the supervisory layer has assigned specific set
[32], [33], [34]. These protocols include, IEEE 802.15.4 (Zig- points to the MPC-based layer of the framework, the noise-based
Bee), IEEE 802.11 (Wireless LAN (WLAN) or Wi-Fi), IEEE- FDI attack prevents proper power injection when the measured
802.16 (WiMAX), GSM and GPRS, and DASH7. But even with current is incorrect. This means the balance between generation
these improvements in communication protocols, the commu- and consumption will deteriorate, and voltage or frequency
nication layer is the most vulnerable layer of the PEDG. stabilities of the system will be endangered. On the other hand,
FDI attacks are possible attacks on the communication layer. the supervisory layer of the PEDG needs an accurate model of
In this article, the attacks considered are noise-based FDI at- the entire system to perform a load flow analysis to determine the
tacks on the sensors measuring the current injected by the DERs. voltage of each node and consequently determine the power set-
When there is communication between a supervisory controller points for each individual inverter. Within the concept of PEDG,
and local controller, an attacker’s plan can be to interfere with where the distributed resources and consumers are changing
the communication layer and inject noise into the feedback dynamically according to the time of the day and season, having
BAKER et al.: REAL-TIME AI-BASED ANOMALY DETECTION AND CLASSIFICATION IN POWER 553
Fig. 3. Operational diagram of the LSTM-MPC. The input data of INP is collected in step one. Then, is given to the 2-layer LSTM-MPC to create a probability
of anomaly in step two. The number of hidden units in each layer of step two is variable and based on the results of Table II. The final step triggers corrective action
when the probability passes the trigger threshold, as explained in Section III.
The aim of the NN training process is to ensure proper network 2) False Data Injection Data: Data collection for the FDI
structure and training procedure, which can detect these anoma- attack follows a similar setup as the open circuit fault data. To
lies in real-time and accurately. model an FDI attack, white noise is injected into the current sen-
The DER as described in Section II and Table I is created sor, which outputs normally distributed random noise. The noise
in MATLAB/Simulink version 2021b to collect training data. has a power of 0.1. The attack occurs at 0.5 s, halfway through the
The Simscape Specialized Power systems toolbox is utilized for data collection time of 1 s. To accumulate data for a wide range
solving power flow equations at each discrete step instance. The of situations, the amplitude of the noise and the power reference
data creation is executed in this environment as it would also be are varied. The output of the noise generator is multiplied by a
used to verify the network operation in the case studies section. constant NFDI , which varies from 0 to 2 in increments of 0.05.
Thus, a comprehensive dataset is collected from a realistic PEDG A total of 32 200 000 data points from this collection process
bus as a true replica of DER in real world. In fact, this model can are used for the FDI anomaly detection NN scheme. The data
be considered as the digital twin of an actual physical system are grouped into blocks the same as the fault data.
for collecting comprehensive data set for training purpose of
NN network. Matching the training data accumulation to the
method in which the system is tested and operated eliminates B. Training
additional noise or unrealistic data, which might potentially 1) Neural Network Topology: With the training data col-
skew the training process. lected, the next step is to describe the operation LSTM system.
1) Open Circuit Fault Data: To collect data for an internal The fully trained MADC is able to determine when an anomaly is
fault anomaly, the DER operates as a three-phase system with probable, which of the two classes the anomaly is in, and signals
a seven-level CMI. An open circuit fault is simulated through to the supervisory controller that corrective action is needed. The
the opening of a breaker in series with the faulted switch. LSTM-MPC has three classes to represent the training data,
Thus, for open circuit faults, the potential number of faulty “normal,” “fault,” and “cyberattack.” Should different data be
switches in each inverter is 36. To ensure sufficient training collected to train another LSTM-MPC, the number of classes
data is collected, the simulation is run 36 times with a different will change to match the additional data and classifications. To
switch causing an open circuit fault in each instance. For the data create more balanced training data, half of the “normal” class
collection scheme, the simulation in each iteration is run for 1 s of data from each data collection process is excluded from the
of simulation time where the open circuit fault occurs at 0.5 s. As training data set. The final data set classes are approximately
the system operates with a line frequency of 60 Hz, 30 complete 29.2% “fault,” 37.4% “cyberattack,” and 33.3% “normal.” The
line cycles occur for each open circuit fault. This amount of data goal of the LSTM-MPC is to have an accuracy above 90%. This
is sufficient for NN training and not so large as to unnecessarily data is sufficiently balanced to meet this goal since 90% accuracy
increase training time. The seven inputs of INP are collected at a requires high accuracy of each class and no individual class can
sampling rate of 100 kHz, as well as the 1 × 36 array denoting the dominate training. After detection, the supervisory controller
status of each fault. Should a controller need the NN to operate at can confirm the anomaly with a mirrored NN, should extra
a slower frequency, the entire dataset can be under sampled to the validation be required. Finally, corrective action is implemented.
required frequency. Combining the sample rate simulation time 2) Hyperparameters Selection: The LSTM network is
and number of iterations along with the input and class data for trained in MATLAB 2021b. Determining the exact hyperparam-
the network, a total of 25 200 000 data points from this collection eters of the system, specifically the number of LSTM units in
process are used for training the fault anomaly detection NN each of the two layers, is cause for further investigation to the
scheme. These data are grouped into blocks 50 sample long specific control system. In this article, various hyperparameters
to minimize the sample size needed for classification, leading are tested and examined to pick the most proper NN system
to improved response time. Finally, data are randomly split into for anomaly detection. Top priorities of operation in the 14-bus
training, validation, and testing subsets, which are divided as system are accuracy, detection speed, computational effort, and
70%, 15%, and 15% of the total data acquired, respectively. scalability. Accuracy is crucial for resilient operation of PEDG,
BAKER et al.: REAL-TIME AI-BASED ANOMALY DETECTION AND CLASSIFICATION IN POWER 555
Fig. 5. Results of the second case study, which examines the impact of the
Fig. 4. Results of the first case study, verifying the neural network’s ability
fault correction network across a 14-bus system. In both simulations, an open
to detect and correct an open circuit fault in Phase A of DER 4 of the 14-bus
circuit fault occurs in S1 at t = 2 s. (a) Detection network is present. It detects and
system. In both simulations, an open circuit fault occurs at t = 2 s. When the
applies corrective action to mitigate the fault in under one line cycle, allowing
fault detection network has high enough confidence to determine a fault, the
for continued operation. (b) No mitigation technique is present. The low power
Fault Status flag goes HIGH and the states array is updated to exclude switching
quality after the fault forces DER 4 to isolate from the 14-bus after five line
states requiring the faulty switch to be closed. (a) Fault occurs in S1. (b) Fault
cycles. Since the synchronous generator is unable to compensate, the system
occurs in S2.
frequency collapses.
TABLE IV
BUS VOLTAGES DURING FDI ATTACK
Fig. 7. Fourth case study demonstrates the impact of corrective action after an
FDI attack is determined. The bus voltage and current injected by Phase A are
as designed. No false positive occurs during the change in Pref , shown at the bus with the FDI. (a) Without the anomaly corrective action. (b)
With anomaly detection and corrective action. After isolation from the system,
and the proposed scheme determines a FDI in 13.4 ms after it the system with the NN scheme has a smaller impact on the bus voltage due to
occurs, which is less than one line cycle. the corrective action taken by the supervisory controller after the fault.
studies involving the original 14 bus system, the LSTM-MPC is [10] R. Peuget, S. Courtine, and J.-P. Rognon, “Fault detection and isolation
capable of detecting both anomalies in less than one line cycle. on a PWM inverter by knowledge-based model,” IEEE Trans. Ind. Appl.,
vol. 34, no. 6, pp. 1318–1326, Nov./Dec. 1998.
The fault is mitigated after 11.10 ms and the FDI after 11.26 ms. [11] K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults and
These results support the premise that the topology of the power attacks including false data injection attack in smart grid using Kalman
system is of little impact to the well trained LSTM-MPC. If the filter,” IEEE Trans. Control Netw. Syst., vol. 1, no. 4, pp. 370–379,
Dec. 2014.
DER is connected to a bus where training data is collected with [12] W. Ao, Y. Song, and C. Wen, “Adaptive cyber-physical system attack
appropriately, the system can be scaled easily to detect these detection and reconstruction with application to power systems,” IET
anomalies locally. Control Theory Appl., vol. 10, no. 12, pp. 1458–1468, 2016.
[13] A. Abdullah, “Ultrafast transmission line fault detection using a DWT-
based ANN,” IEEE Trans. Ind. Appl., vol. 54, no. 2, pp. 1182–1193,
V. CONCLUSION Mar./Apr. 2018.
This article presents an anomaly detection and correction [14] M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor,
“Machine learning methods for attack detection in the smart grid,” IEEE
scheme for PEDG. The proposed MADC and corrective action Trans. Neural Netw. Learn. Syst., vol. 27, no. 8, pp. 1773–1786, Aug. 2016.
is based on an integration of LSTM and MPC, which features [15] J. Yan, H. He, X. Zhong, and Y. Tang, “Q-learning-based vulnerability
real-time solutions for enhancing the resiliency of PEDG when analysis of smart grid against sequential topology attacks,” IEEE Trans.
Inf. Forensics Secur., vol. 12, no. 1, pp. 200–210, Jan. 2017.
anomalies occurs. In the proposed scheme, when an anomaly [16] S. A. Foroutan and F. R. Salmasi, “Detection of false data injection
is detected, the supervisory layer controller can implement attacks against state estimation in smart grids based on a mixture Gaussian
corrective action to ensure the power system continues proper distribution learning method,” IET Cyber-Phys. Syst., Theory Appl., vol. 2,
no. 4, pp. 161–171, 2017.
operation. The data collection technique and training process of [17] F. Li et al., “Detection and identification of cyber and physical attacks on
the long short-term memory network is described as well as the distribution power grids with PVs: An online high-dimensional data-driven
methodology of selecting proper hyperparameters. The training approach,” IEEE J. Emerg. Sel. Topics Power Electron., vol. 10, no. 1,
pp. 1282–1291, Feb. 2022.
data is selected to increase scalability of the LSTM-MPC should [18] O. Boyaci et al., “Graph neural networks based detection of stealth false
the network topology expand as more DERs are integrated into data injection attacks in smart grids,” IEEE Syst. J., vol. 16, no. 2,
the PEDG. An optimal LSTM network is used to test and validate pp. 2946–2957, Jun. 2022.
[19] H. M. Khalid and J. C.-H. Peng, “Immunity toward data-injection attacks
the operation of the network. The case studies verify the system using multisensor track fusion-based model prediction,” IEEE Trans.
ability to allow robust deployment after anomalies occur, and the Smart Grid, vol. 8, no. 2, pp. 697–707, Mar. 2017.
impact of the corrective actions by the supervisory controller is [20] Z.-H. Yu and W.-L. Chin, “Blind false data injection attack using PCA
approximation method in smart grid,” IEEE Trans. Smart Grid, vol. 6,
demonstrated. no. 3, pp. 1219–1226, May 2015.
[21] R. Deng, G. Xiao, and R. Lu, “Defending against false data injection
ACKNOWLEDGMENT attacks on power system state estimation,” IEEE Trans. Ind. Inform.,
vol. 13, no. 1, pp. 198–207, Feb. 2017.
The statements made herein are solely the responsibility of [22] S. Zhang, Y. Wang, M. Liu, and Z. Bao, “Data-based line trip fault
the authors. prediction in power systems using LSTM networks and SVM,” IEEE
Access, vol. 6, pp. 7675–7686, 2018.
REFERENCES [23] H. Goyel and K. S. Swarup, “Data integrity attack detection using ensemble
based learning for cyber physical power systems,” IEEE Trans. Smart Grid,
[1] A. Khan, M. Hosseinzadehtaher, M. B. Shadmand, S. Bayhan, and to be published, Aug. 2022.
H. Abu-Rub, “On the stability of the power electronics-dominated grid: A [24] G. Abdelmoumin, D. B. Rawat, and A. Rahman, “On the performance of
new energy paradigm,” IEEE Ind. Electron. Mag., vol. 14, no. 4, pp. 65–78, machine learning models for anomaly-based intelligent intrusion detection
Dec. 2020. systems for the Internet of Things,” IEEE Internet Things J., vol. 9, no. 6,
[2] O. H. Abu-Rub, A. Y. Fard, M. F. Umar, M. Hosseinzadehtaher, and pp. 4280–4290, Mar. 2022.
M. B. Shadmand, “Towards intelligent power electronics-dominated grid [25] J. Yan, B. Tang, and H. He, “Detection of false data attacks in smart grid
via machine learning techniques,” IEEE Power Electron. Mag., vol. 8, with supervised learning,” in Proc. Int. Joint Conf. Neural Netw., Jul. 2016,
no. 1, pp. 28–38, Mar. 2021. pp. 1395–1402.
[3] A. S. Musleh, G. Chen, and Z. Y. Dong, “A survey on the detection [26] F. Almutairy, L. Scekic, R. Elmoudi, and S. Wshah, “Accurate detection
algorithms for false data injection attacks in smart grids,” IEEE Trans. of false data injection attacks in renewable power systems using deep
Smart Grid, vol. 11, no. 3, pp. 2218–2234, May 2020. learning,” IEEE Access, vol. 9, pp. 135774–135789, 2021.
[4] R. Das, G. Karmakar, J. Kamruzzaman, and A. Chowdhury, “Measuring [27] M. Easley, M. Baker, A. Khan, M. B. Shadmand, and H. Abu-Rub, “Self-
trustworthiness of smart meters leveraging household energy consump- healing model predictive controlled cascaded multilevel inverter,” in Proc.
tion profile,” IEEE J. Emerg. Sel. Topics Ind. Electron., vol. 3, no. 2, IEEE Energy Convers. Congr. Expo., 2019, pp. 239–244.
pp. 289–297, Apr. 2022. [28] M. W. Baker, H. Althuwaini, and M. B. Shadmand, “Artificial intelligence
[5] A. Sargolzaei, A. Abbaspour, M. A. Al Faruque, A. Salah Eddin, and based anomaly detection and classification for grid-interactive cascaded
K. Yen, “Security challenges of networked control systems,” in Sustainable multilevel inverters,” in Proc. 3rd Int. Conf. Smart Grid Renewable Energy,
Interdependent Networks. Berlin, Germany: Springer, 2018, pp. 77–95. Mar. 2022, pp. 1–6.
[6] K. Xiahou, Y. Liu, and Q. H. Wu, “Decentralized detection and mitigation [29] V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, “Efficient processing of
of multiple false data injection attacks in multiarea power systems,” IEEE deep neural networks: A tutorial and survey,” Proc. IEEE, vol. 105, no. 12,
J. Emerg. Sel. Topics Ind. Electron., vol. 3, no. 1, pp. 101–112, Jan. 2022. pp. 2295–2329, Dec. 2017.
[7] B. Lu and S. K. Sharma, “A literature review of IGBT fault diagnostic and [30] N. A. Rahim, M. F. M. Elias, and W. P. Hew, “Transistor-clamped H-bridge
protection methods for power inverters,” IEEE Trans. Ind. Appl., vol. 45, based cascaded multilevel inverter with new method of capacitor voltage
no. 5, pp. 1770–1777, Sep./Oct. 2009. balancing,” IEEE Trans. Ind. Electron., vol. 60, no. 8, pp. 2943–2956,
[8] A. M. S. Mendes and A. J. Marques Cardoso, “Voltage source inverter Aug. 2013.
fault diagnosis in variable speed AC drives, by the average current park’s [31] S. Yang, D. Xiang, A. Bryant, P. Mawby, L. Ran, and P. Tavner, “Con-
vector approach,” in Proc. IEEE Int. Electric Mach. Drives Conf., 1999, dition monitoring for device reliability in power electronic converters: A
pp. 704–706. review,” IEEE Trans. Power Electron., vol. 25, no. 11, pp. 2734–2752,
[9] K. Rothenhagen and F. W. Fuchs, “Performance of diagnosis methods Nov. 2010.
for IGBT open circuit faults in three phase voltage source inverters for [32] Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on smart grid commu-
AC variable speed drives,” in Proc. Eur. Conf. Power Electron. Appl., nication infrastructures: Motivations, requirements and challenges,” IEEE
Sep. 2005, Paper 10. Commun. Surv. Tut., vol. 15, no. 1, pp. 5–20, First Quarter 2013.
BAKER et al.: REAL-TIME AI-BASED ANOMALY DETECTION AND CLASSIFICATION IN POWER 559
[33] US Department of Energy, “Communications requirements of smart Hassan Althuwaini (Student Member, IEEE) re-
grid technology,” 2010. [Online]. Available: https://www.energy.gov/ ceived the B.S. degree in electrical engineering from
sites/default/files/gcprod/documents/Smart_Grid_Communications_ Kansas State University, Manhattan, KS, USA, in
Requirements_Report_10-05-2010.pdf 2019.
[34] M. Ghorbanian, S. H. Dolatabadi, M. Masjedi, and P. Siano, “Communi- He was a Research Assistant with JKLab.org from
cation in smart grids: A comprehensive review on the existing and future 2018 to 2019. He was with the Department of Elec-
communication and information infrastructures,” IEEE Syst. J., vol. 13, trical and Computer Engineering, The University of
no. 4, pp. 4001–4014, Dec. 2019. Illinois Chicago in Jan. 2021 to continue his M.S
[35] S. Vazquez et al., “Model predictive control: A review of its applications studies under the supervision of Prof. M. Shadmand.
in power electronics,” IEEE Ind. Electron. Mag., vol. 8, no. 1, pp. 16–31, His research interests include smart microgrids, en-
Mar. 2014. ergy storage system, characterization of SiC, and GaN
[36] C. R. D. Osório et al., “Modulated model predictive control applied to power devices.
LCL-filtered grid-tied inverters: A convex optimization approach,” IEEE
Open J. Ind. Appl., vol. 2, pp. 366–377, 2021.