Offense and defence against adversarial sample: A reinforcement learning method in energy trading market

被引:2
作者
Li, Donghe [1 ]
Yang, Qingyu [1 ,2 ]
Ma, Linyue [3 ]
Peng, Zhenhua [1 ]
Liao, Xiao [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Automat Sci & Engn, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian, Peoples R China
[3] State Grid Informat & Telecommun Grp Co LTD, Beijing, Peoples R China
基金
中国博士后科学基金; 美国国家科学基金会;
关键词
double auction; markov decision process; reinforcement learning; adversarial example; fast gradient sign method; adversarial example detection; DEMAND RESPONSE; SMART; MANAGEMENT; MODEL; PRIVACY;
D O I
10.3389/fenrg.2022.1071973
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The energy trading market that can support free bidding among electricity users is currently the key method in smart grid demand response. Reinforcement learning is used to formulate optimal strategies for them to obtain optimal strategies. Non-etheless, the security problem raised by artificial intelligence technology has been paid more and more attention. For example, the neural network has been proved to be able to resist adversarial example attacks, thus affecting its training results. Considering that reinforcement learning is also widely used for training by neural networks, the security problem can not be ignored, especially in scenarios with high security requirements such as smart grids. To this end, we study the security issues in reinforcement learning-based bidding strategy method facing by the adversarial example. First of all, regarding to the electric vehicle double auction market, we formalize the bidding decision problem of EVs into a Markov Decision Process, so that reinforcement learning is used to solve this problem. Secondly, from the perspective of attackers, we have designed a local Fast Gradient Sign Method which affects the environment and the results of reinforcement learning by changing its own bidding. Then, from the perspective of the defender, we designed a reinforcement learning training network containing an attack identifier based on the deep neural network, so as to identify malicious injection attacks to resist against adversarial attacks. Finally, comprehensive simulations are conducted to verify our proposed method. The results shows that, our proposed attack method will reduce the auction profit by influencing reinforcement learning algorithm, and the protect method will be able to completely resist such attacks.
引用
收藏
页数:14
相关论文
共 43 条
  • [21] Lange S, 2010, IEEE IJCNN
  • [22] Lin Y.-C., 2017, arXiv
  • [23] Experimental investigation on the heat transfer enhancement in a novel latent heat thermal storage equipment
    Liu, Yang
    Duan, Jianguo
    He, Xiufen
    Wang, Yaxiong
    [J]. APPLIED THERMAL ENGINEERING, 2018, 142 : 361 - 370
  • [24] Coordinated Control Strategy of Wind Turbine Generator and Energy Storage Equipment for Frequency Support
    Miao, Lu
    Wen, Jinyu
    Xie, Hailian
    Yue, Chengyan
    Lee, Wei-Jen
    [J]. IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2015, 51 (04) : 2732 - 2742
  • [25] Mnih V, 2013, Arxiv, DOI [arXiv:1312.5602, DOI 10.48550/ARXIV.1312.5602]
  • [26] Mohan S, 2014, AAAI CONF ARTIF INTE, P387
  • [27] Direct load control - A profit-based load management using linear programming
    Ng, KH
    Sheble, GB
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 1998, 13 (02) : 688 - 695
  • [28] Peng Liu, 2005, ACM Transactions on Information and Systems Security, V8, P78, DOI 10.1145/1053283.1053288
  • [29] Pyka A., 2002, European Journal of Innovation Management, V5, P152, DOI 10.1108/14601060210436727
  • [30] Minimalistic Attacks: How Little It Takes to Fool Deep Reinforcement Learning Policies
    Qu, Xinghua
    Sun, Zhu
    Ong, Yew-Soon
    Gupta, Abhishek
    Wei, Pengfei
    [J]. IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, 2021, 13 (04) : 806 - 817