Fig. 6From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksThe number of a FP and b FN obtained under different attack intensities and degreesBack to article page