4.8 Article

Learning-Based Demand Response for Privacy-Preserving Users

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 15, 期 9, 页码 4988-4998

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2019.2898462

关键词

Differential privacy; incentive-based demand response (DR) program; privacy-preserving demand response; two-timescale reinforcement learning algorithm

资金

  1. U.S. National Science Foundation [IIA-1301726, EEC-1801727, IIS-1838024]
  2. DTRA [HDTRA1-13-1-0029]
  3. Open Project of State Key Laboratory of Industrial Control Technology [ICT1800373]

向作者/读者索取更多资源

Demand response (DR), as a vital component of smart grid, plays an important role in shaping the load profiles in order to improve system reliability and efficiency. Incentive-based DR has been used in many DR programs by incentivizing customers to adapt their loads to supply availability. Note that users' behavior patterns can be easily identified from fine-grained power consumption when interacting with the load serving entity (LSE), giving rise to serious privacy concerns. One common approach to address the privacy threats is to incorporate perturbations in users' load measurements. Although it can protect the users' privacy, yet the usage data modification would degrade the LSE's performance in achieving an optimal incentive strategy due to unknown characteristics of the augmented perturbations. In this paper, we cast the incentive-based DR problem as a stochastic Stackelberg game. To tackle the challenge induced by users' privacy protection behaviors, we propose a two-timescale reinforcement learning algorithm to learn the optimal incentive strategy under users' perturbed responses. The proposed algorithm computes the expected utility cost to mitigate the impacts of the random characteristics of the augmented perturbations and then updates the incentive strategy based on the perceived expected utility costs. We derive the conditions under which the proposed incentive scheme converges almost surely to an epsilon-optimal strategy. The efficacy of the proposed algorithm is demonstrated using extensive numerical simulation using real data.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据