Fig. 5From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksOutput visualization of the intermediate layersBack to article page