Power grids must be operated, protected, and maintained such that a small number of line failures will not result in significant load shedding. To identify problematic combinations of failures, we consider an N-k interdiction problem that seeks the set of k failed lines (out of N total lines) that result in the largest load shed. This is naturally formulated as a bilevel optimization problem with an upper level representing the attacker that selects line failures and a lower level modeling the defender's generator redispatch to minimize the load shedding. Compounding the difficulties inherent to the bilevel nature of interdiction problems, we consider a nonlinear AC power flow model that makes this problem intractable with traditional solut...
Abstract—This paper addresses the vulnerability analysis of the electric grid under terrorist threat...
International audienceThis article proposes a novel mathematical optimization framework for the iden...
In this paper, we revisit the robustness of machine learning based proxies used to speed up, alone ...
Although there has been notable progress in modeling cascading failures in power grids, few works in...
Machine learning (ML) applications have seen tremendous adoption in power system research and applic...
This paper concerns the potential of corrective actions, such as generation and load dispatch on min...
We address the problem of maintaining high voltage power transmission networks in security at all ti...
International audienceLarge scale outages on real-world critical infrastructures (CIs), although inf...
International audienceWe address the problem of maintaining high voltage power transmission networks...
International audienceWe propose a new method to efficiently compute load-flows (the steady-state of...
Training Neural Networks able to capture the topology changes of the power grid is one of the signif...
Load shedding has always been a commonly adopted method in emergency situations to maintain power sy...
Growing demand for power systems, economic, and environmental issues, lead to power systems operatin...
Given a power grid modeled by a network together with equations describing the power flows, power ge...
Network research tries to give solutions within several areas, beginning from social interconnection...
Abstract—This paper addresses the vulnerability analysis of the electric grid under terrorist threat...
International audienceThis article proposes a novel mathematical optimization framework for the iden...
In this paper, we revisit the robustness of machine learning based proxies used to speed up, alone ...
Although there has been notable progress in modeling cascading failures in power grids, few works in...
Machine learning (ML) applications have seen tremendous adoption in power system research and applic...
This paper concerns the potential of corrective actions, such as generation and load dispatch on min...
We address the problem of maintaining high voltage power transmission networks in security at all ti...
International audienceLarge scale outages on real-world critical infrastructures (CIs), although inf...
International audienceWe address the problem of maintaining high voltage power transmission networks...
International audienceWe propose a new method to efficiently compute load-flows (the steady-state of...
Training Neural Networks able to capture the topology changes of the power grid is one of the signif...
Load shedding has always been a commonly adopted method in emergency situations to maintain power sy...
Growing demand for power systems, economic, and environmental issues, lead to power systems operatin...
Given a power grid modeled by a network together with equations describing the power flows, power ge...
Network research tries to give solutions within several areas, beginning from social interconnection...
Abstract—This paper addresses the vulnerability analysis of the electric grid under terrorist threat...
International audienceThis article proposes a novel mathematical optimization framework for the iden...
In this paper, we revisit the robustness of machine learning based proxies used to speed up, alone ...