{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:18:22Z","timestamp":1774685902588,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["01jS22063"],"award-info":[{"award-number":["01jS22063"]}]},{"name":"German Federal Ministry for Economic Affairs and Climate Action","award":["03EI4028B"],"award-info":[{"award-number":["03EI4028B"]}]},{"name":"Fraunhofer-Institut f\u00fcr Energiewirtschaft und Energiesystemtechnik IEE"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, researchers proposed a variety of deep learning models for wind power forecasting. These models predict the wind power generation of wind farms or entire regions more accurately than traditional machine learning algorithms or physical models. However, latest research has shown that deep learning models can often be manipulated by adversarial attacks. Since wind power forecasts are essential for the stability of modern power systems, it is important to protect them from this threat. In this work, we investigate the vulnerability of two different forecasting models to targeted, semi-targeted, and untargeted adversarial attacks. We consider a long short-term memory (LSTM) network for predicting the power generation of individual wind farms and a convolutional neural network (CNN) for forecasting the wind power generation throughout Germany. Moreover, we propose the Total Adversarial Robustness Score (TARS), an evaluation metric for quantifying the robustness of regression models to targeted and semi-targeted adversarial attacks. It assesses the impact of attacks on the model\u2019s performance, as well as the extent to which the attacker\u2019s goal was achieved, by assigning a score between 0 (very vulnerable) and 1 (very robust). In our experiments, the LSTM forecasting model was fairly robust and achieved a TARS value of over 0.78 for all adversarial attacks investigated. The CNN forecasting model only achieved TARS values below 0.10 when trained ordinarily, and was thus very vulnerable. Yet, its robustness could be significantly improved by adversarial training, which always resulted in a TARS above 0.46.<\/jats:p>","DOI":"10.1007\/s10994-023-06396-9","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:02:34Z","timestamp":1694620954000},"page":"863-889","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Targeted adversarial attacks on wind power forecasts"],"prefix":"10.1007","volume":"113","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1939-501X","authenticated-orcid":false,"given":"Ren\u00e9","family":"Heinrich","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8719-8261","authenticated-orcid":false,"given":"Christoph","family":"Scholz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3230-8822","authenticated-orcid":false,"given":"Stephan","family":"Vogt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0621-1442","authenticated-orcid":false,"given":"Malte","family":"Lehna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"key":"6396_CR1","doi-asserted-by":"crossref","unstructured":"Abdu-Aguye, M. G., Gomaa, W., Makihara, Y., et al. (2020). Detecting adversarial attacks in time-series data. ICASSP 2020\u20132020 IEEE International Conference on Acoustics, IEEE: Speech and Signal Processing (ICASSP), (pp. 3092\u20133096).","DOI":"10.1109\/ICASSP40776.2020.9053311"},{"key":"6396_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadian, S., Malki, H., Han, Z. (2018). Cyber attacks on smart energy grids using generative adverserial networks. In: 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), IEEE, (pp. 942\u2013946)","DOI":"10.1109\/GlobalSIP.2018.8646424"},{"key":"6396_CR3","doi-asserted-by":"publisher","first-page":"155161","DOI":"10.1109\/ACCESS.2021.3127960","volume":"9","author":"N Akhtar","year":"2021","unstructured":"Akhtar, N., Mian, A., Kardan, N., et al. (2021). Advances in adversarial attacks and defenses in computer vision: A survey. IEEE Access, 9, 155161\u2013155196.","journal-title":"IEEE Access"},{"key":"6396_CR4","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P. (2016). Data poisoning attacks against autoregressive models. In: Proceedings of the AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v30i1.10237"},{"issue":"100","key":"6396_CR5","first-page":"060","volume":"4","author":"G Alkhayat","year":"2021","unstructured":"Alkhayat, G., & Mehmood, R. (2021). A review and taxonomy of wind and solar energy forecasting methods based on deep learning. Energy and AI, 4(100), 060.","journal-title":"Energy and AI"},{"issue":"110","key":"6396_CR6","first-page":"992","volume":"144","author":"S Aslam","year":"2021","unstructured":"Aslam, S., Herodotou, H., Mohsin, S. M., et al. (2021). A survey on deep learning methods for power load and renewable energy forecasting in smart microgrids. Renewable and Sustainable Energy Reviews, 144(110), 992.","journal-title":"Renewable and Sustainable Energy Reviews"},{"issue":"9","key":"6396_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3559104","volume":"55","author":"R Bitton","year":"2023","unstructured":"Bitton, R., Maman, N., Singh, I., et al. (2023). Evaluating the cybersecurity risk of real-world, machine learning production systems. ACM Computing Surveys, 55(9), 1\u201336.","journal-title":"ACM Computing Surveys"},{"issue":"8","key":"6396_CR8","doi-asserted-by":"publisher","first-page":"2200289","DOI":"10.1002\/ente.202200289","volume":"10","author":"SB Bosma","year":"2022","unstructured":"Bosma, S. B., & Nazari, N. (2022). Estimating solar and wind power production using computer vision deep learning techniques on weather maps. Energy Technology, 10(8), 2200289.","journal-title":"Energy Technology"},{"key":"6396_CR9","unstructured":"Carlini, N., Athalye, A., Papernot, N., et\u00a0al. (2019). On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705"},{"key":"6396_CR10","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, N., Chattopadhyay, A., Gupta, S.S., et\u00a0al. (2019). Curse of dimensionality in adversarial examples. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, (pp. 1\u20138).","DOI":"10.1109\/IJCNN.2019.8851795"},{"key":"6396_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., Tan, Y., Zhang, B. (2019). Exploiting vulnerabilities of load forecasting through adversarial attacks. In: Proceedings of the Tenth ACM International Conference on Future Energy Systems, (pp. 1\u201311).","DOI":"10.1145\/3307772.3328314"},{"issue":"102","key":"6396_CR12","first-page":"808","volume":"170","author":"L Cui","year":"2020","unstructured":"Cui, L., Qu, Y., Gao, L., et al. (2020). Detecting false data attacks using machine learning techniques in smart grid: A survey. Journal of Network and Computer Applications, 170(102), 808.","journal-title":"Journal of Network and Computer Applications"},{"key":"6396_CR13","unstructured":"Falcon, W., et\u00a0al. (2019). Pytorch lightning. GitHub Note: https:\/\/github com\/PyTorchLightning\/pytorch-lightning 3(6)"},{"key":"6396_CR14","unstructured":"Fawaz, H.I., Forestier, G., Weber, J., et\u00a0al. (2019). Adversarial attacks on deep neural networks for time series classification. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, (pp. 1\u20138)"},{"issue":"1","key":"6396_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TSTE.2020.3009615","volume":"12","author":"C Goncalves","year":"2020","unstructured":"Goncalves, C., Pinson, P., & Bessa, R. J. (2020). Towards data markets in renewable energy forecasting. IEEE Transactions on Sustainable Energy, 12(1), 533\u2013542.","journal-title":"IEEE Transactions on Sustainable Energy"},{"key":"6396_CR16","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"6396_CR17","unstructured":"Harford, S., Karim, F., Darabi, H. (2020). Adversarial attacks on multivariate time series. arXiv preprint arXiv:2004.00410"},{"key":"6396_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et\u00a0al. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, (pp. 770\u2013778)","DOI":"10.1109\/CVPR.2016.90"},{"key":"6396_CR19","doi-asserted-by":"crossref","unstructured":"Hong, T., Pinson, P., Fan, S., et\u00a0al. (2016). Probabilistic energy forecasting: Global energy forecasting competition 2014 and beyond","DOI":"10.1016\/j.ijforecast.2016.02.001"},{"key":"6396_CR20","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1016\/j.rser.2013.12.054","volume":"31","author":"J Jung","year":"2014","unstructured":"Jung, J., & Broadwater, R. P. (2014). Current status and future advances for wind speed and power forecasting. Renewable and Sustainable Energy Reviews, 31, 762\u2013777.","journal-title":"Renewable and Sustainable Energy Reviews"},{"issue":"10","key":"6396_CR21","doi-asserted-by":"publisher","first-page":"3309","DOI":"10.1109\/TPAMI.2020.2986319","volume":"43","author":"F Karim","year":"2020","unstructured":"Karim, F., Majumdar, S., & Darabi, H. (2020). Adversarial attacks on time series. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(10), 3309\u20133320.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"6396_CR22","unstructured":"Kingma, D.P., Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"6396_CR23","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S. (2018). Adversarial examples in the physical world. In: Artificial intelligence safety and security. Chapman and Hall\/CRC, (pp. 99\u2013112)","DOI":"10.1201\/9781351251389-8"},{"issue":"1","key":"6396_CR24","first-page":"6765","volume":"18","author":"L Li","year":"2017","unstructured":"Li, L., Jamieson, K., DeSalvo, G., et al. (2017). Hyperband: A novel bandit-based approach to hyperparameter optimization. The Journal of Machine Learning Research, 18(1), 6765\u20136816.","journal-title":"The Journal of Machine Learning Research"},{"key":"6396_CR25","unstructured":"Liaw, R., Liang, E., Nishihara, R., et\u00a0al. (2018). Tune: A research platform for distributed model selection and training. arXiv preprint arXiv:1807.05118"},{"key":"6396_CR26","doi-asserted-by":"crossref","unstructured":"Lu, K., Sun, W.X., Wang, X., et\u00a0al. (2018). Short-term wind power prediction model based on encoder-decoder LSTM. In: IOP Conference Series: Earth and Environmental Science, IOP Publishing, (pp. 012020)","DOI":"10.1088\/1755-1315\/186\/5\/012020"},{"key":"6396_CR27","unstructured":"Madry, A., Makelov, A., Schmidt, L., et\u00a0al. (2017). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"6396_CR28","unstructured":"Marulli, F., Visaggio, C.A. (2019). Adversarial deep learning for energy management in buildings. In: SummerSim, (pp. 50\u20131)"},{"key":"6396_CR29","unstructured":"Metzen, J.H., Genewein, T., Fischer, V., et\u00a0al. (2017). On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267"},{"key":"6396_CR30","unstructured":"Nguyen, A.T., Raff, E. (2018). Adversarial attacks, regression, and numerical stability regularization. arXiv preprint arXiv:1812.02885"},{"key":"6396_CR31","doi-asserted-by":"crossref","unstructured":"Niazazari, I., Livani, H. (2020). Attack on grid event cause analysis: An adversarial machine learning approach. In: 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), IEEE, (pp. 1\u20135)","DOI":"10.1109\/ISGT45199.2020.9087649"},{"key":"6396_CR32","unstructured":"Paszke, A., Gross, S., Massa, F., et\u00a0al. (2019). Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32"},{"issue":"5","key":"6396_CR33","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/app9050909","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu, S., Liu, Q., Zhou, S., et al. (2019). Review of artificial intelligence adversarial attack and defense technologies. Applied Sciences, 9(5), 909.","journal-title":"Applied Sciences"},{"key":"6396_CR34","unstructured":"Raghunathan, A., Xie, S.M., Yang, F., et\u00a0al. (2019). Adversarial training can hurt generalization. arXiv preprint arXiv:1906.06032"},{"key":"6396_CR35","doi-asserted-by":"crossref","unstructured":"Rathore, P., Basak, A., Nistala, S.H., et\u00a0al. (2020). Untargeted, targeted and universal adversarial attacks and defenses on time series. In: 2020 International Joint Conference on Neural Networks (IJCNN), IEEE, (pp. 1\u20138)","DOI":"10.1109\/IJCNN48605.2020.9207272"},{"key":"6396_CR36","unstructured":"Rauber, J., Bethge, M. (2020). Fast differentiable clipping-aware normalization and rescaling. arXiv preprint arXiv:2007.07677"},{"key":"6396_CR37","unstructured":"Rauber, J., Brendel, W., Bethge, M. (2017). Foolbox: A python toolbox to benchmark the robustness of machine learning models. arXiv preprint arXiv:1707.04131"},{"issue":"112","key":"6396_CR38","first-page":"459","volume":"163","author":"L Richter","year":"2022","unstructured":"Richter, L., Lehna, M., Marchand, S., et al. (2022). Artificial intelligence for electricity supply chain automation. Renewable and Sustainable Energy Reviews, 163(112), 459.","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"6396_CR39","doi-asserted-by":"crossref","unstructured":"Sayghe, A., Zhao, J., Konstantinou, C. (2020). Evasion attacks with adversarial deep learning against power system state estimation. In: 2020 IEEE Power & Energy Society General Meeting (PESGM), IEEE, (pp. 1\u20135)","DOI":"10.1109\/PESGM41954.2020.9281719"},{"key":"6396_CR40","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V. (2014). Sequence to sequence learning with neural networks. Advances in Neural Information Processing Systems 27"},{"key":"6396_CR41","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., et\u00a0al. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"6396_CR42","doi-asserted-by":"crossref","unstructured":"Tang N, Mao S, Nelms RM (2021) Adversarial attacks to solar power forecast. In: 2021 IEEE Global Communications Conference (GLOBECOM), IEEE, (pp. 1\u20136).","DOI":"10.1109\/GLOBECOM46510.2021.9685910"},{"key":"6396_CR43","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., et\u00a0al. (2018). Robustness may be at odds with accuracy. arXiv preprint arXiv:1805.12152"},{"key":"6396_CR44","unstructured":"Umweltbundesamt,. (2022). Renewable Energies in Germany: Data on the Development in 2021. German Environment Agency: Renewable energies in Germany."},{"key":"6396_CR45","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.renene.2021.08.056","volume":"180","author":"JF Unnewehr","year":"2021","unstructured":"Unnewehr, J. F., Jalbout, E., Jung, C., et al. (2021). Getting more with less? why repowering onshore wind farms does not always lead to more wind power generation-a german case study. Renewable Energy, 180, 245\u2013257.","journal-title":"Renewable Energy"},{"issue":"111","key":"6396_CR46","first-page":"799","volume":"198","author":"H Wang","year":"2019","unstructured":"Wang, H., Lei, Z., Zhang, X., et al. (2019). A review of deep learning for renewable energy forecasting. Energy Conversion and Management, 198(111), 799.","journal-title":"Energy Conversion and Management"},{"issue":"2","key":"6396_CR47","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1049\/cit2.12076","volume":"7","author":"Z Wu","year":"2022","unstructured":"Wu, Z., Luo, G., Yang, Z., et al. (2022). A comprehensive review on deep learning approaches in wind forecasting applications. CAAI Transactions on Intelligence Technology, 7(2), 129\u2013143.","journal-title":"CAAI Transactions on Intelligence Technology"},{"issue":"2","key":"6396_CR48","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu, H., Ma, Y., Liu, H. C., et al. (2020). Adversarial attacks and defenses in images, graphs and text: A review. International Journal of Automation and Computing, 17(2), 151\u2013178.","journal-title":"International Journal of Automation and Computing"},{"key":"6396_CR49","unstructured":"Zhang, H., Yu, Y., Jiao, J., et\u00a0al. (2019). Theoretically principled trade-off between robustness and accuracy. In: International conference on machine learning, PMLR, (pp. 7472\u20137482)"},{"issue":"15","key":"6396_CR50","doi-asserted-by":"publisher","first-page":"3780","DOI":"10.3390\/en13153780","volume":"13","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Lin, F., & Wang, K. (2020). Robustness of short-term wind power forecasting against false data injection attacks. Energies, 13(15), 3780.","journal-title":"Energies"},{"key":"6396_CR51","doi-asserted-by":"crossref","unstructured":"Zhou, X., Li, Y., Barreto, C.A., et\u00a0al. (2019). Evaluating resilience of grid load predictions under stealthy adversarial attacks. In: 2019 Resilience Week (RWS), IEEE, (pp. 206\u2013212)","DOI":"10.1109\/RWS47064.2019.8971816"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-023-06396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-023-06396-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-023-06396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T19:08:03Z","timestamp":1705604883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-023-06396-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["6396"],"URL":"https:\/\/doi.org\/10.1007\/s10994-023-06396-9","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"10 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}