Fig. 4From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksComparison under a normal sample and b compromised sampleBack to article page