Fig. 2From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksStructure of GECCNBack to article page