Abstract
This paper develops an adaptive two-stage unscented Kalman filter (ATSUKF) to accurately track operation states of the synchronous generator (SG) under cyber attacks. To achieve high fidelity, considering the excitation system of SGs, a detailed
DUE to the development of monitoring, sensing, and communication technologies, a great quantity of intelligent devices are applied to modern power systems, making the information exchange between power systems and cyber systems increasingly frequent. Because of such features, the power system relies on critical cyber infrastructure, making it vulnerable to cyber attacks [
At present, a great quantity of phasor measurement units (PMUs) have been installed in the wide-area measurement system (WAMS), which provides significant measurement data for DSE. The operators can dynamically track operation states of the system [
Moreover, to avoid the error caused by EKF, a derivative-free unscented Kalman filter (UKF) was proposed in [
In an effort to address these problems, an adaptive two-stage unscented Kalman filter (ATSUKF) is developed based on the adaptive noise correction method, which is suitable for the DSE of SGs. The contributions of this work are as follows.
1) To effectively reflect the operation states of SGs, the DSE model is extended based on the consideration of -axis windings and -axis damping windings. Considering the excitation system of SGs, a novel
2) A TSUKF for DSE of SGs is proposed to separate the bias caused by cyber attacks or noise signals, which can estimate the state and the bias in parallel.
3) Considering the influence of unknown noise statistical characteristics caused by uncertainties on the performance of state estimation, an adaptive noise correction method is proposed and the multi-dimensional adaptive factor matrix is derived.
The remainder of this paper is organized as follows. A novel
The detailed SG model can reflect operation states of the generator more comprehensively [
The two mechanical equations can be expressed as:
(1) |
(2) |
where is the rotor position; is the rotor speed in per unit; is the synchronous speed; is the rotor speed deviation in per unit and ; is the electrical torque; is the mechanical torque; is the inertia constant; and is the damping coefficient.
The four electrical equations of the field winding and damper winding fluxes are expressed as [
(3) |
(4) |
(5) |
(6) |
where is the voltage; is the flux; is the leakage reactance; is the resistance; the subscripts , , and represent the field winding, -axis damper winding, and -axis damper winding (), respectively; and the fluxes and can be calculated by:
(7) |
(8) |
(9) |
(10) |
where and are the - and -axis currents, respectively; and and are the saturated values of the - and -axis mutual inductances, respectively [
Then, the electric torque can be expressed as:
(11) |
In addition, the currents can be written in terms of fluxes as:
(12) |
(13) |
(14) |
(15) |
The excitation system model including the power system stabilizer (PSS) and automatic voltage regulator (AVR) is shown in
(16) |
(17) |
(18) |

Fig. 1 Excitation system model of SGs.
where - are the excitation system state variables; is the stabilizer gain; is washout time constant; is the time constant of lead compensator; is the time constant of terminal voltage transducer; is the time constant of lag compensator; and is the generator terminal voltage.
For convenience, the above equations can be written in the following form:
(19) |
where is the system function; is the measurement function; is the state vector; is the input vector; is the measurement vector; and and represent the process and measurement noises, respectively.
(20) |
(21) |
(22) |
Considering the discrete nature of the measured data, (19) can be rewritten in the discrete-time form as:
(23) |
where is a discrete time factor.
To successfully gain access, the attacker needs to know the complete knowledge about the target before attacking [
(24) |
where is the attack/bias vector at time ; is the moment when the attacker successfully accesses the measurement data; is the attack distribution matrix of measurement variables; and is the measurement noise vector at time .
(25) |
where is the measurement function of the
Several common cyber attacks against measurement data can be expressed in the following forms.
FDI, as the most common type of cyber attack, injects false data into real data to affect the operator’s awareness of the system:
(26) |
Consider the nonlinear discrete system with attack/bias, and then (23) can be written as:
(30) |
where is the attack distribution matrix of state variables.
TSUKF is an extension of UKF. The attack-/bias-free estimation and attack/bias estimation processes of TSUKF are as follows:
(31) |
(32) |
where is the coupling matrix; is the state vector of attack-/bias-free estimation; is the variance matrix of attack-/bias-free estimation; and and are the state vector and its variance matrix of attack/bias estimation, respectively.
In the attack-/bias-free estimation, the expected value of the estimator is equal to the true value. There is a deviation between the expected value and the true value of the estimator in the attack/bias estimation. When the measurement is attacked, the results of attack-/bias-free estimation will deviate from the true value. Therefore, it is necessary to estimate the bias caused by cyber attacks through attack/bias estimation to suppress the impact of false measurements.
Similar to UKF, by utilising the unscented transform, the sigma points can be selected as:
(33) |
(34) |
where is the scaling parameter; and is the column vector where the element is 1 and the other elements are 0.
Using the state transfer function to propagate sigma points, the predicted state vector and its corresponding error covariance matrix can be obtained by:
(35) |
(36) |
(37) |
(38) |
(39) |
where and are the coupling matrices that can be obtained through the calculation of the coupling equations; is the process noise variance matrix; and the weights and are defined as:
(40) |
(41) |
where is the scaling factor that can control the range of sigma point sets; and is a constant used to reflect the high-order information characteristics of state information.
After that, using the measurement function to instantiate sigma points, the measurement vector and its corresponding error covariance matrix can be obtained by:
(42) |
(43) |
(44) |
where is the predicted measurement vector; is a coupling matrix; and is the measurement noise variance matrix.
The gain matrix and filtered states and can be calculated by:
(45) |
(46) |
(47) |
Notably, the attack-/bias-free estimation and the attack/bias estimation run in parallel.
(48) |
(49) |
(50) |
(51) |
(52) |
(53) |
(54) |
(55) |
where is the predicted measurement vector of attack/bias estimation; is the predicted measurement covariance matrix; is the coupling matrix in the prediction process of bias estimation; is the gain matrix of attack/bias estimation; and and are the process noise variance matrix and cross-covariance matrix in attack-/bias-free estimation, respectively.
Similar to the Kalman filter, TSUKF has good estimation effects only when accurate knowledge about DSE model can be obtained [
(62) |
(63) |
According to the actual measurement, the covariance matrix can be obtained as:
(64) |
where is the size of the window; and is the residual vector of attack-free estimation at time , and .
Therefore, the equation relationship is as follows:
(65) |
The scaling matrix can be written as:
(66) |
If the noise variance matches the system model, the scaling matrix is the unit matrix. However, the scaling matrix obtained by (66) may not be a diagonal matrix, and the diagonal elements may be less than or equal to 0. To avoid this, the scaling matrix needs to be modified as:
(67) |
where is the diagonal element of the modified scaling matrix, and is the diagonal element of matrix before modification. By using the scaling matrix in (67), the covariance matrix and filter gain matrix can be recalculated.
In addition, the adaptive scaling matrix of the system and the noise variance matrix and can be obtained in the same way. By using (65), the scaling matrix can be expressed as:
(68) |
(69) |
By using matrix operations, (68) can be simplified as:
(70) |
The scaling matrix can be defined as:
(71) |
where is the diagonal element of the modified scaling matrix, and is the diagonal element of matrix before modification.
The covariance matrix can be recalculated as:
(72) |
For the scaling matrix , the residual vector and covariance matrix are defined as:
(73) |
(74) |
(75) |
The adaptive scaling matrix can be obtained by:
(76) |
(77) |
where is the diagonal element of the modified scaling matrix, and is the diagonal element of matrix before modification.
The covariance matrix can be recalculated as:
(78) |
For convenience, the proposed ATSUKF based on adaptive noise correction method can be presented as
Remark 1: in order to track the operation states of SGs, the
Remark 2: generally, in the DSE algorithm based on Kalman filter [
Algorithm 1 : proposed ATSUKF based on adaptive noise correction method |
---|
Initialization: parameter initialization |
Input: , , and the number of iterations |
While to |
Step 1: generate the predicted state of attack-/bias-free estimation by (33)-(39) |
Step 2: calculate the scaling matrix by (68)-(72) and recalculate the covariance matrix |
Step 3: obtain the predicted measurement of attack-/bias-free estimation by (42)-(45) |
Step 4: obtain the scaling matrix by (62)-(67) and recalculate the covariance matrix |
Step 5: complete the attack-/bias-free estimation |
|
|
Step 6: generate the predicted state of attack/bias estimation by (48)-(53) |
Step 7: obtain the scaling matrix by (73)-(78) and recalculate the covariance matrix |
Step 8: complete the attack/bias estimation |
|
|
Step 9: complete the estimation by utilizing the results of attack/bias estimation and attack-/bias-free estimation |
|
|
Step 10: output and and update time instant |
End while |
To access the performance of the proposed ATSUKF under unknown noise statistics and cyber attack interference, extensive simulations are carried out in the IEEE 39-bus system by using the detailed

Fig. 2 Topology of IEEE 39-bus system.
Because of the interference of uncertain factors and the change of system operation state, it is difficult for operators to obtain accurate prior knowledge of noise. Furthermore, malicious cyber attacks against power systems will also lead to the deterioration of DSE performance. Consequently, considering the interference of uncertain factors in the actual power system, simulation scenarios are set up as follows.
Scenario 1: the UKF, TSUKF, and proposed ATSUKF are compared and discussed under normal operation conditions.
Scenario 2: the above-mentioned filters are analyzed and compared in the test system with unknown noise statistics.
Scenario 3: the robustness of above-mentioned filters is discussed under the malicious network attack against the measurement data.
In addition, set the number of Monte Carlo simulations as 200. The average state estimation error index is utilized to appraise the performance of the discussed filters:
(79) |
where is the true value; and is the estimation value.
Without loss of generality, we assume that operators can master the knowledge of system model and accurate prior noise statistics. Assuming that the process noise and measurement noise are zero-mean Gaussian noise, the standard deviations of the process noise and measurement noise are both . At this time, the actual noise variance matches the system model, and the multi-dimensional adaptive factor matrices are all unity matrices.
The estimation results of rotor speed and rotor angle of G8 are shown in

Fig. 3 Estimation results of rotor speed and rotor angle of G8 in Scenario 1.

Fig. 4 Estimation results of field winding and -axis damper winding fluxes of G8 in Scenario 1.

Fig. 5 Estimation results of -axis damper winding fluxes of G8 in Scenario 1.

Fig. 6 Estimation results of SG excitation system state variables of G8 in Scenario 1.
Variable | Average estimation error | ||
---|---|---|---|
UKF | TSUKF | ATSUKF | |
0.000097 | 0.000097 | 0.000097 | |
0.000096 | 0.000096 | 0.000096 | |
0.000368 | 0.000404 | 0.000404 | |
0.000168 | 0.000168 | 0.000169 | |
0.000021 | 0.000021 | 0.000021 | |
0.000713 | 0.000713 | 0.000713 | |
0.000099 | 0.000099 | 0.000099 | |
0.007440 | 0.007444 | 0.007445 | |
0.000102 | 0.000102 | 0.000102 |
In the actual power system, the statistical characteristics of noise are easily disturbed by many factors.
Under the interference of uncertain factors such as network attacks, equipment aging, and environmental changes, the prior statistical information of noise cannot be accurately known by the operator, resulting in the mismatch between noise statistics and model assumptions. In order to simulate the influence of this situation on the performance of estimation, it is assumed that the statistical characteristics of noise do not match the model assumptions. The standard deviations of the process noise and measurement noise are set to be and , respectively, which deviate from the true values and .
The estimation results of field winding fluxes and d-axis damper winding fluxes in Scenario 2 are shown in

Fig. 7 Estimation results of field winding and -axis damper winding fluxes of G8 in Scenario 2.

Fig. 8 Estimation results of SG excitation system state variables of G8 in Scenario 2.
Variable | Average estimation error | ||
---|---|---|---|
UKF | TSUKF | ATSUKF | |
0.000255 | 0.001265 | 0.000101 | |
0.001021 | 0.000111 | 0.000099 | |
0.364208 | 0.544942 | 0.003684 | |
0.000174 | 0.000173 | 0.000173 | |
0.000176 | 0.000091 | 0.000072 | |
0.000708 | 0.000698 | 0.000765 | |
0.001088 | 0.002760 | 0.000101 | |
0.115421 | 0.117418 | 0.008041 | |
0.000813 | 0.001639 | 0.000116 |
Accessing the measurement data has become one of the most common ways to attack power systems. Attackers can compromise the authenticity of data by injecting attack data into the data collected by the measuring device. Once the real measurement is altered, the state estimation results will deviate from the actual state, which will cause the operator to make a wrong decision. The common measurement cyber attack methods include false data injection, scaling attack, data replay attack, and ramp attack. To analyze the effectiveness of state estimation algorithms under cyber attacks, it is assumed that the measurement data are accessed by multiple types of malicious network attacks.
The following four attack conditions are considered.
1) Condition 1: the measurement is successfully accessed by FDI at s and the attack stops at s. Once the attack succeeds, false data injection attacks will inject false data into the measurement.
2) Condition 2: when the measurement device is manipulated by the data replay attack at s, the device will repeatedly transmit the same measurement data.
3) Condition 3: the attacker uses scaling attacks to scale up the measurement after s, and the scaling factor is set to be 1.5.
4) Condition 4: the attacker uses ramp attacks to inject data into the measurement data after s. The data injected through ramp attacks will grow over time and .
The estimation results of under FDI attacks are shown in

Fig. 9 Estimation results of under FDI attack.

Fig. 10 Estimation results of under data replay attack.
For the scaling attacks, suppose that the attacker scales up the measurement by using scaling factor after s, and the result comparison is given in

Fig. 11 Estimation results of under scaling attack.

Fig. 12 Estimation results of under ramp attack.
Attack mode | Average estimation error | ||
---|---|---|---|
UKF | TSUKF | ATSUKF | |
FDI attack | 0.015490 | 0.006696 | 0.000112 |
Data replay attack | 0.019197 | 0.006615 | 0.000132 |
Scaling attack | 0.024678 | 0.006707 | 0.000103 |
Ramp attack | 0.021983 | 0.008893 | 0.000143 |
In order to compare the computational efficiency of different filters discussed under different conditions, simulations are implemented on a system with an Intel i7-7700 CPU and 16 GB of RAM in the MATLAB environment. The execution time of different filters under different conditions is shown in
Condition | Execution time (ms) | ||
---|---|---|---|
UKF | TSUKF | ATSUKF | |
Normal operation condition | 7565 | 7617 | 7693 |
Unknown noise statistics condition | 7670 | 7651 | 7728 |
Condition 1 | 7850 | 7961 | 8014 |
Condition 2 | 7849 | 7919 | 8187 |
Condition 3 | 7992 | 7988 | 8210 |
Condition 4 | 7940 | 7957 | 8203 |
In this study, an adaptive DSE algorithm is proposed against cyber attacks. Considering the nonlinear characteristics of the model equation, a filter is proposed based on the unscented transform technology and two-stage Kalman filtering theory, which can suppress the impact of cyber attacks on the estimation results. On this basis, the adaptive scaling matrix is utilized to modify the error covariance matrix in the estimation process of the TSUKF, which can effectively deal with the problem when the statistical parameters of noise do not match the model assumptions. Compared with other filters, the effectiveness of the proposed ATSUKF is illustrated under cyber attacks.
As it turns out, the proposed ATSUKF can effectively estimate the system state vector and attack vector in parallel. When the statistical parameters of generator model noise are unknown, the proposed ATSUKF is still effective. In the future, we will build more types of cyber attack models and extend the proposed ATSUKF to bound the uncertainty caused by cyber attacks to provide effective information for tracing the source of cyber attacks and formulating defense strategies. In addition, we will design an effective attack detection strategy to distinguish between noise signals and cyber attacks, thereby reducing unnecessary calculations and improving the computational efficiency of the proposed ASUKF.
References
H. Long, Z. Wu, C. Fang et al., “Cyber-attack detection strategy based on distribution system state estimation,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 4, pp. 669-678, Jul. 2020. [Baidu Scholar]
T. Duan and V. Dinavahi, “Starlink space network-enhanced cyber-physical power system,” IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3673-3675, Jul. 2021. [Baidu Scholar]
C. Chen, K. Zhang, M. Ni et al., “Cyber-attack-tolerant frequency control of power systems,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 2, pp. 307-315, Mar. 2021. [Baidu Scholar]
M. Ni, M. Li, J. Li et al., “Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 3, pp. 477-484, May 2021. [Baidu Scholar]
D. Hou, Y. Sun, J. Wang et al., “Dynamic state estimation of power systems with uncertainties based on robust adaptive unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 11, no. 4, pp. 1065-1074, Jul. 2023. [Baidu Scholar]
Y. Chen, Y. Yao, Y. Lin et al., “Dynamic state estimation for integrated electricity-gas systems based on Kalman filter,” CSEE Journal of Power and Energy Systems, vol. 8, no. 1, pp. 293-303, Jan. 2022. [Baidu Scholar]
H. Karimipour and V. Dinavahi, “Extended Kalman filter-based parallel dynamic state estimation,” IEEE Transactions on Smart Grid, vol. 6, no. 3, pp. 1539-1549, May 2015. [Baidu Scholar]
T. Ahmad and N. Senroy, “An information theoretic approach to power-substation level dynamic state estimation with non-Gaussian noise,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1642-1645, Mar. 2020. [Baidu Scholar]
S. Wang, W. Gao, and A. P. S. Meliopoulos, “An alternative method for power system dynamic state estimation based on unscented transform,” IEEE Transactions on Power Systems, vol. 27, no. 2, pp. 942-950, May 2012. [Baidu Scholar]
P. Risbud, N. Gatsis, and A. Taha, “Multi-period power system state estimation with PMUs under GPS spoofing attacks,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 4, pp. 597-606, Jul. 2020. [Baidu Scholar]
B. Tan, J. Zhao, and M. Netto, “A general decentralized dynamic state estimation with synchronous generator magnetic saturation,” IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 960-963, Jan. 2023. [Baidu Scholar]
E. Ghahremani and I. Kamwa, “Dynamic state estimation in power system by applying the extended Kalman filter with unknown inputs to phasor measurements,” IEEE Transactions on Power Systems, vol. 26, no. 4, pp. 2556-2566, Nov. 2011. [Baidu Scholar]
Y. Wang, Y. Wang, Y. Sun et al., “Resilient dynamic state estimation for multi-machine power system with partial missing measurements,” IEEE Transactions on Power Systems. doi: 10.1109/TPWRS.2023. 3287151 [Baidu Scholar]
Y. Wang, Y. Sun, and V. Dinavahi, “Robust forecasting-aided state estimation for power system against uncertainties,” IEEE Transactions on Power Systems, vol. 35, no. 1, pp. 691-702, Jan. 2020. [Baidu Scholar]
Y. Chakhchoukh, H. Lei, and B. K. Johnson, “Diagnosis of outliers and cyber attacks in dynamic PMU-based power state estimation,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1188-1197, Mar. 2020. [Baidu Scholar]
S. Li, Y. Yilmaz, and X. Wang, “Quickest detection of false data injection attack in wide-area smart grids,” IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 2725-2735, Nov. 2015. [Baidu Scholar]
A. S. L. V. Tummala and R. K. Inapakurthi, “A two-stage Kalman filter for cyber-attack detection in automatic generation control system,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50-59, Jan. 2022. [Baidu Scholar]
H. Liu, F. Hu, J. Su et al., “Comparisons on Kalman-filter-based dynamic state estimation algorithms of power systems,” IEEE Access, vol. 8, pp. 51035-51043, Mar. 2020. [Baidu Scholar]
H. Zhao and B. Tian, “Robust power system forecasting-aided state estimation with generalized maximum mixture correntropy unscented Kalman filter,” IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-10, Mar. 2022. [Baidu Scholar]
W. Ma, J. Qiu, X. Liu et al., “Unscented Kalman filter with generalized correntropy loss for robust power system forecasting-aided state estimation,” IEEE Transactions on Industrial Informatics, vol. 15, no. 11, pp. 6091-6100, Nov. 2019. [Baidu Scholar]
Y. Wang, Y. Sun, V. Dinavahi et al., “Robust dynamic state estimation of power systems with model uncertainties based on adaptive unscented filter,” IET Generation, Transmission & Distribution, vol. 13, no. 12, pp. 2455-2463, Jun. 2019. [Baidu Scholar]
G. Anagnostou and B. C. Pal, “Derivative-free Kalman filtering based approaches to dynamic state estimation for power systems with unknown inputs,” IEEE Transactions on Power Systems, vol. 33, no. 1, pp. 116-130, Jan. 2018. [Baidu Scholar]
J. Qi, K. Sun, J. Wang et al., “Dynamic state estimation for multi-machine power system by unscented Kalman filter with enhanced numerical stability,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 1184-1196, Mar. 2018. [Baidu Scholar]
J. Xu, Y. Jing, G. M. Dimirovski et al., “Two-stage unscented Kalman filter for nonlinear systems in the presence of unknown random bias,” in Proceedings of 2008 American Control Conference, Seattle, USA, Jun. 2008, pp. 3530-3535. [Baidu Scholar]
X. Chen, R. Sun, F. Wang et al., “Two-stage unscented Kalman filter algorithm for fault estimation in spacecraft attitude control system,” IET Control Theory & Applications, vol. 12, no. 13, pp. 1781-1791, Sept. 2018. [Baidu Scholar]
Y. Wang, Y. Sun, V. Dinavahi et al., “Adaptive robust cubature Kalman filter for power system dynamic state estimation against outliers,” IEEE Access, vol. 7, pp. 105872-105881, Jul. 2019. [Baidu Scholar]
Y. Wang, Z. Yang, Y. Wang et al., “Robust dynamic state estimation for power system based on adaptive cubature Kalman filter with generalized correntropy loss,” IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-11, May 2022. [Baidu Scholar]
S. Cao, N. Lin, and V. Dinavahi, “Faster-than-real-time hardware emulation of extensive contingencies for dynamic security analysis of large-scale integrated AC/DC grid,” IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 861-871, Jan. 2023. [Baidu Scholar]
S. Cao, N. Lin, and V. Dinavahi, “Damping of subsynchronous control interactions in large-scale PV installations through faster-than-real-time dynamic emulation,” IEEE Access, vol. 9, pp. 128481-128493, Sept. 2021. [Baidu Scholar]
G. Valverde, E. Kyriakides, G. T. Heydt et al., “Nonlinear estimation of synchronous machine parameters using operating data,” IEEE Transactions on Energy Conversion, vol. 26, no. 3, pp. 831-839, Sept. 2011. [Baidu Scholar]
P. Kundur, N. Balu, and M. Lauby, Power System Stability and Control. New York: McGraw-Hill, 1994. [Baidu Scholar]
K. Lu and Z. Wu, “Constrained-differential-evolution-based stealthy sparse cyber-attack and countermeasure in an AC smart grid,” IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5275-5285, Aug. 2022. [Baidu Scholar]
K. Lu and Z. Wu, “Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems,” IEEE Transactions on Instrumentation Measurement, vol. 71, p. 3186360, Jan. 2022. [Baidu Scholar]
L. Dang, B. Chen, S. Wang et al., “Robust power system state estimation with minimum error entropy unscented Kalman filter,” IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 11, pp. 8797-8808, Nov. 2020. [Baidu Scholar]
J. Zhao, J. Qi, Z. Huang et al., “Power system dynamic state estimation: motivations, definitions, methodologies, and future work,” IEEE Transactions on Power Systems, vol. 34, no. 4, pp. 3188-3198, Jul. 2019. [Baidu Scholar]
S. Wang, W. Zhang, Y. Sun et al., “Wind power forecasting in the presence of data scarcity: a very short-term conditional probabilistic modeling framework,” Energy. doi: 10.1016/j.energy.2024.130305 [Baidu Scholar]
C. Hajiyev and H. E. Soken, “Robust adaptive Kalman filter for estimation of UAV dynamics in the presence of sensor/actuator faults,” Aerospace Science and Technology, vol. 28, no. 1, pp. 376-383, Jul. 2013. [Baidu Scholar]
C. Canizares, T. Fernandes, E. Geraldi et al., “Benchmark models for the analysis and control of small-signal oscillatory dynamics in power systems,” IEEE Transactions on Power Systems, vol. 32, no. 1, pp. 715-722, Jan. 2017. [Baidu Scholar]