Open Access
ARTICLE
Mitigating the Dynamic Load Altering Attack on Load Frequency Control with Network Parameter Regulation
1 Electric Power Dispatching and Control Center, Guizhou Power Grid Co., Ltd., Guiyang, 550002, China
2 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China
* Corresponding Author: Zhenyong Zhang. Email:
Computers, Materials & Continua 2026, 86(2), 1-19. https://doi.org/10.32604/cmc.2025.070577
Received 19 July 2025; Accepted 24 September 2025; Issue published 09 December 2025
Abstract
Load frequency control (LFC) is a critical function to balance the power consumption and generation. The grid frequency is a crucial indicator for maintaining balance. However, the widely used information and communication infrastructure for LFC increases the risk of being attacked by malicious actors. The dynamic load altering attack (DLAA) is a typical attack that can destabilize the power system, causing the grid frequency to deviate from its nominal value. Therefore, in this paper, we mathematically analyze the impact of DLAA on the stability of the grid frequency and propose the network parameter regulation (NPR) to mitigate the impact. To begin with, the dynamic LFC model is constructed by highlighting the importance of the network parameter. Then, we model the DLAA and analyze its impact on LFC using the theory of second-order dynamic systems. Finally, we model the NPR and prove its effect in mitigating the DLAA. Besides, we construct a least-effort NPR considering its infrastructure cost and aim to reduce the operation cost. Finally, we carry out extensive simulations to demonstrate the impact of the DLAA and evaluate the mitigation performance of NPR. The proposed cost-benefit NPR approach can not only mitigate the impact of DLAA with 100% and also save 41.18 $/MWh in terms of the operation cost.Keywords
Load frequency control (LFC) plays a crucial role in maintaining the grid’s frequency at a nominal value. Through the Supervisory Control and Data Acquisition (SCADA) system, LFC can efficiently handle frequency issues in a wide area. However, as more and more devices are operated through the open communication network, the number of exposed vulnerabilities increases at an unexpected rate. Therefore, the LFC is facing cyber threats from different attack entry points. The power loads on the consumer side can be maliciously modified due to the widespread deployment of charging stations [1]. The attack events indicate that the attacker has the capability to take over the electricity equipment and disrupt the system’s regular operation. The researcher at Argonne National Laboratory destroyed a generator within 100 lines of code [2]. The attacker can modify vulnerable loads, such as intelligent appliances based on the Internet of Things (e.g., air conditioners and electric vehicles), to cause frequency deviation or transmission line overloading [3,4].
The attack on power loads can be divided into two types: load measurement attack and load altering attack. For the load measurement attack, only the load measurements are compromised, while the actual loads remain unchanged. The goal of the load measurement attack is to bypass bad data detection, such as the load redistribution attack [5] and the false data injection attack [6]. This attack aims to cheat the operator into redistributing the generation and cause an increase or decrease in the nodal price [7]. The load redistribution attack maintains the sum of loads unchanged, which corresponds to the generation cost for both the pre- and post-real-time dispatch [8]. The dummy data attack enhances the stealthiness of the load measurement attack by concealing the measurements among normal measurements [9]. This attack can bypass the cluster-based and machine learning-based detectors. As for the load-altering attack, the actual power load is physically altered. The goal of the load-altering attack is to destabilize the power system. The static load-altering attack modifies the frequency-insensitive load to cause frequency excursion [10]. The dynamic load altering attack (DLAA) corrupts the frequency-sensitive loads to cause frequency deviation [11]. By analyzing the trajectory of the frequency change, the attacker can manipulate the load by changing the price signals in price-based demand response programs. The electronic vehicles can also be used as targets of the DLAA [4]. Although the DLAA has been revealed to be vulnerable, its principle in affecting system stability, especially grid frequency, still needs to be analyzed in depth.
To defend against the attack on power loads, various approaches exist from the aspects of detection, identification, and mitigation. The sliding model observer is used to estimate the system states to detect the abnormal states [12]. A robust sliding mode observer can detect the DLAA with the signal residual [13]. The low-rank Kalman filter can be used to estimate the attack parameter using the rank-1 method [14]. The physics-informed machine learning algorithm is a data-driven approach that can detect and localize the abnormal load measurements [15]. The Fast Fourier Transform can be used to analyze the spectral and further localize the attacked load measurements [16]. A significant and robust machine learning model was proposed to mitigate the false data injection attack (FDIA) in dynamic line rating systems, focusing on statistical data processing, feature ranking, selection, training, validation, and evaluation [17]. Multiple metrics were proposed in this reference to evaluate the detection performance of FDIAs with BGLM-LR, Gaussian naive Bayes (GNB), linear support vector machine (LSVM), wide neural network (WNN), and decision tree (DT). As a precise measurement device, the data collected from the phasor measurement unit (PMU) can be used to localize the abnormal load measurements and states combined with a convolutional neural network. From the perspective of information security, unauthorized load control signals are prevented by minimizing access permissions based on the edge-computing infrastructure [18]. The generation-consumption imbalance can be captured by the fast-acting inverter [19]. The charge and discharge actions of the electric vehicles can be used to compensate for the DLAA impact [20]. Although the above approaches are practical in defending against the attacks on the power loads, they work reactively. However, the mitigation strategy should be proactive and mitigate the impact of DLAA on the physical side.
As a proactive defense strategy, the network parameter regulation (NPR) approach leverages the physical property. Compared to cyber defense, NPR focuses on the physical side, enhancing the integration of cyber and physical systems. In this paper, the NPR is realized using a series capacitor compensator (SCC), a typical device designed to stabilize the system. Since the power system must operate close to its limits to meet high demand and profit goals, the SCC device is used to maintain the grid’s safety when it is on a large scale and distributed renewable energies are highly penetrated. Since the SCC has the capability to modify capacitance injection, it can be used to create a proactive defense mechanism from the physical side.
Therefore, with a special emphasis on the DLAA, we propose an NPR strategy to mitigate the impact of the attack on the stability of the grid frequency. To reveal the insight why the DLAA can cause grid frequency divergence, we model the DLAA and analyze its effect on the stability of the grid frequency with a second-order dynamic system. For NPR, it is designed to alleviate the DLAA by maintaining the stable modes. As the deployment of NPR may introduce additional costs, an optimization problem is formulated to develop a cost-effective defense strategy. In summary, the contributions are as follows: (1) First, we model the DLAA using both the first-order and second-order dynamic systems. The DLAA’s impact on the stability of the grid frequency is analyzed with the eigenvalue sensitivity; (2) Second, we theoretically reveal the effect of NPR to mitigate the DLAA by guaranteeing the Lyapunov criteria; (3) Third, we conduct extensive simulations to demonstrate the impact of the DLAA and evaluate the defense performance of NPR.
The power system operates stably by balancing the generation and load. To represent the power network, the power facilities are described by generation buses and load buses. The generation bus is equipped with a generator, and the load bus has a load consumption. The generation buses are included in the set
where
Considering the overall power transmission network, the power flow model according to (1) is described as follows:
where
Suppose the load buses are numbered with the first
where
Next, we introduce the system’s dynamic model for maintaining the grid frequency. The swing equation for the generator is
where the roof mark
The input of the PI controller is the area control error (ACE) signal. The ACE is a reference to draw the deviations of the grid frequency and the power flow of the tie line to zero. The
For each load, it can be categorized into two types: frequency-sensitive and constant. That is, the
Considering the overall power system, we obtain the following relationship:
where
where
where,
Our use of a linearized second-order model is intentional and aligns with standard practices in power system stability analysis, especially for frequency stability studies in LFC contexts. This approximation is valid around the system’s equilibrium operating point, where perturbations (such as those induced by dynamic load altering attacks, or DLAAs) are assumed to be small enough that higher-order terms can be neglected. The model enables us to analytically derive the impact of DLAA on system eigenvalues and the mitigating effects of network parameter regulation (NPR) using tools such as eigenvalue sensitivity and Lyapunov criteria, providing clear theoretical insights into stability margins. Similar linearizations are commonly employed in the LFC literature (e.g., [10,11,20]) to facilitate a tractable analysis without compromising essential dynamics for frequency regulation scenarios.
To validate the model’s applicability, our extensive simulations in Section 4 incorporate more realistic system conditions, including time-domain responses to DLAA perturbations in multi-area power systems (e.g., IEEE 39-bus test case). These simulations demonstrate that the linear model’s predictions hold well for the attack magnitudes and system stresses considered, where frequency deviations remain within ranges typical for LFC (e.g.,
2.3 Dynamic Load Altering Attack
Recently, cyberattacks on power systems have increased due to the tense relationship between countries. The smart infrastructure introduces plenty of uncertainties into the power system operation [22,23]. Electric vehicles and distributed generators impact the security and safety of the smart grid. As a great economic system, targeting the power system is attractive to attackers. Especially, the smart and IP-enabled power load infrastructure is vulnerable to intrusions [24]. Smart home appliances have been proven vulnerable to botnet attacks [25]. Since the load is on the user’s side, it can be easily altered by the attacker. Considering the adversarial loads, the dynamic load altering attack (DLAA) is constructed like
where
According to the Lyapunov stability theory, the system is asymptotically stable if and only if all eigenvalues of the matrix
Therefore, once the matrix
To defend against the DLAA and maintain the stability of the grid frequency, we propose a network parameter regulation (NPR) approach by changing the line parameter (i.e., the susceptance). Hence, in the following, we first introduce the principle of NPR. Then, we model the system as a second-order dynamic system. Based on this model, we analyze the impact of DLAA and the mitigation effect of NPR.
3.1 Network Parameter Regulation
The implementation of NPR depends on the capacitor compensation device, which can actively change the line parameters, such as reactance. For example, the thyristor-controlled series capacitor device is remotely controlled and monitored by the supervisory control and data acquisition (SCADA) system. Therefore, the line parameter can be changed flexibly.
The modified susceptance is modelled as
where
3.2 Second-Order Description of the Dynamic System
To clearly describe the effect of NPR against DLAA, we transform the first-order dynamic model into a second-order dynamic model, which is given by
To be concise, the transformed matrices are represented with
With the second-order dynamic model, the eigenvalues also represent the system’s stability. The stability issue can be solved using the right and left eigenvalue problems, which are described with the following equations:
where
First, we analyze the impact of DLAA on the eigenvalues. Under the adversarial case, the matrix
Since the matrices
Suppose the set of vulnerable loads is
Therefore, under the DLAA, the
The second term is the impact of DLAA on the eigenvalue. By quantifying the impact of DLAA, the
where

Figure 1: The flowcharts for the attack process of the DLAA and the defense process of the NPR
Next, we evaluate the effect of NPR on mitigating the impact of the DLAA. With NPR, by changing the line parameter
Since the matrices
Therefore, the
If the NPR includes a set
From the defender’s perspective,
Next, if the NPR is used to mitigate the DLAA, then we have
Therefore, the mitigation effect of the NPR for defending against the DLAA is given by
The goal of NPR is to make
From above, we have proved that the NPR can mitigate the impact of DLAA. However, a random NPR might introduce additional operational and infrastructure costs. Therefore, the NPR should be strategically designed to save on defense costs. As for NPR, the infrastructure cost can be defined by the difference of the reference susceptance injected into the capacitor compensation device, that is,
where
where
To reduce the operation cost, the optimization of NPR is formulated by
where
Furthermore, we conduct extensive simulations to evaluate the impact of DLAA and the effect of NPR. The 39-bus power system is used as an example. The system parameters, configurations, and network structure are obtained from the New England test case [30]. The first 30 buses are load buses, while the rest are all generation buses. As shown in Fig. 2, it is a diagram of the 39-bus power system. The simulation is conducted on MATLAB R2019b. The code is written in the MATLAB script language. The computation platform is a Lenovo Thinkpad laptop with 11th Gen Intel(R) Core(TM) i7-1165 G7 2.80 GHz (2.80 GHz) and 32 G RAM.

Figure 2: The IEEE 39-bus power system
First, we analyze the impact of DLAA on the stability of the grid frequency. We define the eigenvalue sensitivity of the

Figure 3: The eigenvalue sensitivity against the DLAA on each load

Figure 4: The eigenvalue sensitivity (the relative value) against the DLAA on each load
For the adversarial setting, the DLAA targets the 2nd, 19th, and 27th loads. That is, the frequencysensitive loads contained in the 2nd, 19th, and 27th loads are maliciously modified. The attack parameters corresponding to them are set in two cases, as shown in Table 1. The DLAAs on the grid frequencies of the 9 generation buses are shown in Fig. 5. Fig. 6 shows the grid frequencies of the generations of buses without any attack. For the attack case 1, the grid frequencies of the 9 generation buses converge to 0s, although there are oscillations before the convergence. For the attack case 2, the grid frequencies of the 9 generation buses diverge from the nominal value (i.e., 60 Hz). The real parts of the eigenvalues given in Fig. 7 show that two eigenvalues have non-negative real parts in the attack case 2, which is the reason for the divergence of the grid. The results indicate that not all DLAAs are successful in destabilizing the grid frequencies. The DLAA should be carefully designed to affect the stability of the grid frequency.


Figure 5: The grid frequency under the DLAA

Figure 6: The grid frequency without the DLAA

Figure 7: The real parts of the eigenvalues under different attack cases
Next, we evaluate the performance of MTD to mitigate the DLAA. The DLAA setting is like the attack case 2. The NPR parameters for the mitigation cases are given in Table 2. The set of transmission lines for NPR contains lines 9, 19, 26, 29, and 33. For the mitigation case 1 and mitigation case 2, the frequencies of the generation buses are shown in Fig. 8. We can see that the grid frequency still diverges from the nominal value in mitigation case 1, indicating that the NPR parameter does not effectively mitigate the DLAA. However, the grid frequency converges to the nominal value in mitigation case 2, indicating that the NPR is effective. The same effect can be obtained with the mitigation cases from 2 to 12. Therefore, the NPR parameters should be appropriately set to mitigate the impact of the DLAA.


Figure 8: Mitigating the impact of the DLAA with NPR
To optimize the NPR, we test several cases to evaluate the cost change with different line change parameters. The attack is set as


The generation costs without NPR and with NPR are given in Table 5. Compared with the generation cost without NPR, the generation cost with NPR changes under different NPR parameters. The generation cost increases with the mitigation cases 2, 3, 4, 5, 6, 9, 10, and 12, while the generation cost is reduced with the mitigation cases 7, 8, and 11. The results indicate that in most cases, the NPR will introduce additional operational costs. The reason is that the NPR causes tight power flows for the system operation. Due to the nonlinear and non-convex properties of the optimization problem for OPF, the derivation of the essential implications of the additional cost caused by the NPR is out of the scope of this paper. From Fig. 9, with the mitigation case 8, the generation cost is 5764.24 $ MWh, which saves 41.18 $ MWh. Therefore, the NPR can be optimized to mitigate the DLAA. The cost-benefit NPR can be constructed to consider the defense effect and the operational cost simultaneously.


Figure 9: The cost-benefit using NPR to mitigate the DLAA
In this paper, we propose a network parameter regulation (NPR) strategy to defend against the dynamic load altering attack (DLAA) in the scenario of load frequency control. To begin with, we transformed the first-order dynamic model into a second-order dynamic model. By analyzing the eigenvalue sensitivity, the impact of the DLAA was modeled, and the effect of NPR was revealed. The deployment cost of NPR was optimized to realize a cost-effective defense strategy. Finally, the attack impact and defense performance were validated through extensive simulations. In future work, we can incorporate the prediction method as given in [31] to improve the performance of the mitigation approach in defending against the DLAA on the LFC. Besides, we will consider extending the analysis to non-linear models, such as full AC power flow simulations or hybrid automaton approaches for significant disturbances. This could involve tools like MATPOWER or PSAT for non-linear validation. We believe this addresses the concern while strengthening the paper’s rigor.
Acknowledgement: We express our gratitude to the members of our research group, i.e., the Intelligent System Security Lab (ISSLab) of Guizhou University, and Guizhou Power Grid Co., Ltd. Electric Power Dispatching and Control Center, for their invaluable support and assistance in this investigation. We also extend our thanks to our university for providing essential facilities and environment.
Funding Statement: This paper is supported by the project Major Scientific and Technological Special Project of Guizhou Province ([2024]014).
Author Contributions: Conceptualization, Yunhao Yu, Boda Zhang, Meiling Dizha, Ruibin Wen, Fuhua Luo, Xiang Guo, Zhenyong Zhang; methodology, Yunhao Yu and Zhenyong Zhang; software, Yunhao Yu and Zhenyong Zhang; validation, Yunhao Yu and Zhenyong Zhang; formal analysis, Yunhao Yu and Zhenyong Zhang; investigation, Yunhao Yu and Zhenyong Zhang; resources, Yunhao Yu and Zhenyong Zhang; data curation,Yunhao Yu and Zhenyong Zhang; writing—original draft preparation, Yunhao Yu and Zhenyong Zhang; writing—review and editing, Yunhao Yu and Zhenyong Zhang; visualization, Yunhao Yu and Zhenyong Zhang; supervision, Zhenyong Zhang; project administration, Zhenyong Zhang; funding acquisition, Zhenyong Zhang. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: Not applicable. This article does not involve data availability, and this section is not applicable.
Ethics Approval: Not applicable for studies not involving humans or animals.
Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.
References
1. Jeong S, Choi D-H. Electric vehicle user data-induced cyber attack on electric vehicle charging station. IEEE Access. 2022;10:55856–67. doi:10.1109/access.2022.3177842. [Google Scholar] [CrossRef]
2. Meserve J. Staged cyber attack reveals vulnerability in power grid [Internet]. [cited 2007 Sep 26]. Available from: http://edition.cnn.com/2007/US/09/26/power.at.risk/. [Google Scholar]
3. Zhang Z, Deng R, Tian Y, Cheng P, Ma J. SPMA: Stealthy physics-manipulated attack and countermeasures in cyber-physical smart grid. IEEE Trans Inf Forensics Secur. 2022;18:581–96. doi:10.1109/tifs.2022.3226868. [Google Scholar] [CrossRef]
4. Amini S, Pasqualetti F, Mohsenian-Rad H. Dynamic load altering attacks against power system stability: attack models and protection schemes. IEEE Trans Smart Grid. 2018;9(4):2862–72. doi:10.1109/tsg.2016.2622686. [Google Scholar] [CrossRef]
5. Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Trans Smart Grid. 2011;2(2):382–90. doi:10.1109/tsg.2011.2123925. [Google Scholar] [CrossRef]
6. Zhang Z, Deng R, Yau D, Cheng P. Zero-parameter-information data integrity attacks and countermeasures in IoT-based smart grid. IEEE Internet Things J. 2021;8(8):6608–23. doi:10.1109/jiot.2021.3049818. [Google Scholar] [CrossRef]
7. Alsharif G, Anagnostopoulos C, Marnerides A. Energy market manipulation via false-data injection attacks: a review. IEEE Access. 2025;13(2):42559–73. doi:10.1109/access.2025.3548914. [Google Scholar] [CrossRef]
8. Yuan Y, Li Z, Ren K. Quantitative analysis of load redistribution attacks in power systems. IEEE Trans Parallel Distrib Syst. 2012;23(9):1731–8. doi:10.1109/tpds.2012.58. [Google Scholar] [CrossRef]
9. Liu X, Song Y, Li Z. Dummy data attacks in power systems. IEEE Trans Smart Grid. 2019;10(2):1792–5. doi:10.1109/tsg.2019.2929702. [Google Scholar] [CrossRef]
10. Lakshminarayana S, Adhikari S, Maple C. Analysis of IoT-based load altering attacks against power grids using the theory of second-order dynamical systems. IEEE Trans Smart Grid. 2021;12(5):4415–25. doi:10.1109/tsg.2021.3070313. [Google Scholar] [CrossRef]
11. Zhang Z, Deng R, Yau D. Vulnerability of the load frequency control against the network parameter attack. IEEE Trans Smart Grid. 2021;10(1):921–33. [Google Scholar]
12. Meluccci C, Menon P, Edwards C, Ferrara A. Load alteration fault detection and reconstruction for power networks modeled with descriptor differential algebraic equation form. IEEE Trans Autom Control. 2021;66(2):489–503. doi:10.1109/acc.2015.7172254. [Google Scholar] [CrossRef]
13. Su Q, Li S, Gao Y, Huang X, Li J. Observer-based detection and reconstruction of dynamic load altering attack in smart grid. J Franklin Inst. 2021;358(7):4013–27. doi:10.1016/j.jfranklin.2021.02.008. [Google Scholar] [CrossRef]
14. Izbicki M, Amini S, Shelton CR, Mohsenian-Rad H. Identification of destabilizing attacks in power systems. In: 2017 American Control Conference (ACC); 2017 May 24–26; Seattle, WA, USA. p. 3424–9. [Google Scholar]
15. Lakshminarayana S, Sthapit S, Jahangir H, Maple C, Poor HV. Data-driven detection and identification of IoT-enabled load-altering attacks in power grids. IET Smart Grid. 2022;5(3):203–18. doi:10.1049/stg2.12066. [Google Scholar] [CrossRef]
16. Amini S, Pasqualetti F, Mohsenian-Rad H. Detecting dynamic load altering attacks: a data-driven time-frequency analysis. In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm); 2015 Nov 2–5; Miami, FL, USA. p. 503–8. [Google Scholar]
17. Lawal O, Teh J, Alharbi B, Lai C. Data-driven learning-based classification model for mitigating false data injection attacks on dynamic line rating systems. Sustain Energy Grids Netw. 2024;38:101347. doi:10.1016/j.segan.2024.101347. [Google Scholar] [CrossRef]
18. Shrestha B, Lin H. Data-centric edge computing to defend power grids against IoT-based attacks. Computer. 2020;53(5):35–43. doi:10.1109/mc.2020.2972228. [Google Scholar] [CrossRef]
19. Chu Z, Lakshminarayana S, Chaudhuri B, Teng F. Mitigating load-altering attacks against power grids using cyber-resilient economic dispatch. IEEE Trans Smart Grid. 2023;14(4):3164–75. doi:10.1109/tsg.2022.3231563. [Google Scholar] [CrossRef]
20. Sayed MA, Ghafouri M, Atallah R, Debbabi M, Assi C. Protecting the future grid: an electric vehicle robust mitigation scheme against load altering attacks on power grids. Appl Energy. 2023;350:121769. doi:10.1016/j.apenergy.2023.121769. [Google Scholar] [CrossRef]
21. Qi Y, Shi D, Tylavsky D. Impact of assumptions on DC power flow model accuracy. In: 2012 North American Power Symposium (NAPS); 2012 Sep 9–11; Champaign, IL, USA. p. 1–6. [Google Scholar]
22. Alhasnawi B, Zanker M, Bures V. A new smart charging electric vehicle and optimal DG placement in active distribution networks with optimal operation of batteries. Results Eng. 2025;25:104521. doi:10.1016/j.rineng.2025.104521. [Google Scholar] [CrossRef]
23. Alhasnawi B, Hashim H, Zanker M, Bures V. The rising, applications, challenges, and future prospects of energy in smart grids and smart cities systems. Energy Convers Manag X. 2025;27:101162. doi:10.1016/j.ecmx.2025.101162. [Google Scholar] [CrossRef]
24. Nasr T, Torabi S, Bou-Harb E, Fachkha C, Assi C. Power jacking your station: in-depth security analysis of electric vehicle charging station management systems. Comput Secur. 2022;112:102511. doi:10.1016/j.cose.2021.102511. [Google Scholar] [CrossRef]
25. Chen Y, Luo B. S2A: secure smart household appliances. In: CODASPY ’12: Proceedings of the Second ACM Conference on Data and Application Security and Privacy; 2012 Feb 7–9; San Antonio, TX, USA. p. 217–28. [Google Scholar]
26. Khalil HK. Lyapunov stability. In: Control systems, robotics, and automation. Manchester, UK: EOLSS; 2009. [Google Scholar]
27. Nelson RB. Simplified calculation of eigenvector derivatives. AIAA J. 1976;14(9):1201–5. [Google Scholar]
28. Friswell MI, Adhikari S. Derivatives of complex eigenvectors using Nelson’s method. AIAA J. 2000;38(12):2355–6. doi:10.2514/2.907. [Google Scholar] [CrossRef]
29. Monticelli A. Electric power system state estimation. Proc IEEE. 2000;88(2):262–82. [Google Scholar]
30. DESL-EPFL. IEEE 39-bus power system [Internet]. [cited 2025 Sep 2]. Available from: https://github.com/DESL-EPFL/IEEE-39-bus-power-system39busref. [Google Scholar]
31. Shi J, Teh J, Lai CM. Wind power prediction based on improved self-attention mechanism combined with bi-directional temporal convolutional network. Energy. 2025;322:135666. doi:10.1016/j.energy.2025.135666. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools