{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:32:44Z","timestamp":1772724764472,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, must be protected as smart grids are vulnerable and subject to various cyberattacks. Various machine learning based classifiers were proposed for intrusion detection in smart grids. However, each of them has respective advantage and disadvantages. Aiming to improve the performance of existing machine learning based classifiers, this paper proposes an adaptive deep learning algorithm with a data pre-processing module, a neural network pre-training module and a classifier module, which work together classify intrusion data types using their high-dimensional data features. The proposed Adaptive Deep Learning (ADL) algorithm obtains the number of layers and the number of neurons per layer by determining the characteristic dimension of the network traffic. With transfer learning, the proposed ADL algorithm can extract the original data dimensions and obtain new abstract features. By combining deep learning models with traditional machine learning-based classification models, the performance of classification of network traffic data is significantly improved. By using the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset, experimental results show that the proposed ADL algorithm improves the effectiveness of existing intrusion detection methods and reduces the training time, indicating a promising candidate to enhance network security in smart grids.<\/jats:p>","DOI":"10.3390\/a16060288","type":"journal-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T01:33:54Z","timestamp":1685669634000},"page":"288","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2241-0767","authenticated-orcid":false,"given":"Xue Jun","family":"Li","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland 1010, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar"}]},{"given":"Yihan","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TSG.2015.2439693","article-title":"Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems","volume":"7","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N., Liu, B.-H., Nguyen, N.P., and Chou, J.-T. (2020, January 7\u201311). Cyber Security of Smart Grid: Attacks and Defenses. Proceedings of the ICC 2020\u20142020 IEEE International Conference on Communications (ICC), Dublin, Ireland.","DOI":"10.1109\/ICC40277.2020.9148850"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Harvey, M., Long, D., and Reinhard, K. (March, January 28). Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security. Proceedings of the 2014 Power and Energy Conference at Illinois (PECI), Champaign, IL, USA.","DOI":"10.1109\/PECI.2014.6804566"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"29641","DOI":"10.1109\/ACCESS.2021.3058628","article-title":"Smart Grid Cyber-Physical Attack and Defense: A Review","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e4062","DOI":"10.1002\/ett.4062","article-title":"Intelligent intrusion detection system in smart grid using computational intelligence and machine learning","volume":"32","author":"Khan","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MNET.2014.6724103","article-title":"Smart grid neighborhood area networks: A survey","volume":"28","author":"Meng","year":"2014","journal-title":"IEEE Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Slimane, H.O., and Kaabouch, N. (2022). A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. arXiv.","DOI":"10.4236\/cn.2022.144009"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ding, J., Qammar, A., Zhang, Z., Karim, A., and Ning, H. (2022). Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions. Energies, 15.","DOI":"10.3390\/en15186799"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., and Mouftah, H.T. (2011, January 9\u201312). Device authentication mechanism for Smart Energy Home Area Networks. Proceedings of the 2011 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bae, H.-S., Lee, H.-J., and Lee, S.-G. (2016, January 5\u20137). Voice recognition based on adaptive MFCC and deep learning. Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, China.","DOI":"10.1109\/ICIEA.2016.7603830"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","article-title":"Efficient Authentication and Key Management Mechanisms for Smart Grid Communications","volume":"8","author":"Nicanfar","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2398","DOI":"10.1109\/TSG.2016.2610582","article-title":"An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers","volume":"9","author":"Hao","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_13","unstructured":"Cui, J., Long, J., Min, E., and Mao, Y. (2018). MDAI 2018: Modeling Decisions for Artificial Intelligence, Springer."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"107212","DOI":"10.1016\/j.compeleceng.2021.107212","article-title":"Intrusion detection based on hybrid classifiers for smart grid","volume":"93","author":"Song","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Hu, H., Doufexi, A., Armour, S., and Kaleshi, D. (2017, January 19\u201322). A Reliable Hybrid Wireless Network Architecture for Smart Grid Neighbourhood Area Networks. Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA.","DOI":"10.1109\/WCNC.2017.7925762"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gobena, Y., Durai, A., Birkner, M., Pothamsetty, V., and Varakantam, V. (2011, January 20\u201323). Practical architecture considerations for Smart Grid WAN network. Proceedings of the 2011 IEEE\/PES Power Systems Conference and Exposition, Phoenix, AZ, USA.","DOI":"10.1109\/PSCE.2011.5772481"},{"key":"ref_17","unstructured":"Mohi-ud-din, G. (2018, December 29). \u201cNSL-KDD\u201d, IEEE Dataport, Published by IEEE, USA. Available online: https:\/\/dx.doi.org\/10.21227\/425a-3e55."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"100379","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"Dong","year":"2022","journal-title":"Comput. Sci. Rev."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","article-title":"Toward a Lightweight Intrusion Detection System for the Internet of Things","volume":"7","author":"Jan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"80778","DOI":"10.1109\/ACCESS.2019.2920326","article-title":"A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids","volume":"7","author":"Karimipour","year":"2019","journal-title":"IEEE Access."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"4106","DOI":"10.1109\/JSYST.2021.3136683","article-title":"Deep Autoencoder-Based Anomaly Detection of Electricity Theft Cyberattacks in Smart Grids","volume":"16","author":"Takiddin","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Inayat, U., Zia, M.F., Mahmood, S., Berghout, T., and Benbouzid, M. (2022). Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects. Electronics, 11.","DOI":"10.3390\/electronics11233854"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhou, F., Wen, G., Ma, Y., Geng, H., Huang, R., Pei, L., Yu, W., Chu, L., and Qiu, R. (2022). A Comprehensive Survey for Deep-Learning-Based Abnormality Detection in Smart Grids with Multimodal Image Data. Appl. Sci., 12.","DOI":"10.3390\/app12115336"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"100547","DOI":"10.1016\/j.ijcip.2022.100547","article-title":"Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects","volume":"38","author":"Berghout","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7157","DOI":"10.1109\/ACCESS.2023.3237554","article-title":"Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach","volume":"11","author":"Jithish","year":"2023","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/6\/288\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:47:33Z","timestamp":1760125653000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/6\/288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":27,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["a16060288"],"URL":"https:\/\/doi.org\/10.3390\/a16060288","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,2]]}}}