Fig. 7From: Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networksComparisons of different models in different attack degrees under a low, b medium and c high attack intensitiesBack to article page