Mobile QR Code QR CODE

2024

Acceptance Ratio

21%


  1. (Guangdong Power Grid Co., Ltd, Guangzhou, 510308, China)



YOLOv8, Intrusion detection algorithms, Attention mechanism, Transmission lines, Network security

1. Introduction

As the power system continues to improve, inspectors have increasingly high requirements for the power system's safety and stability. Transmission lines are not only an important component of the power system but also a guarantee for the continuous and stable power supply of the power grid [1]. Therefore, preventing external damage to transmission lines, eliminating external interference, and ensuring the safe and stable operation of transmission lines are necessary conditions for social production and people's lives [2]. The You Only Look Once (YOLO) series of algorithms have attracted attention due to their advantages of simple structure, strong real-time performance, efficiency, and accuracy. YOLO has been widely applied in image anomaly detection and has experienced rapid development in recent years [3, 4]. Liu et al. proposed a deep learning method using YOLO to address the difficulty of detecting insulators in complex aviation environments. YOLOv3-dense and YOLOv3 achieved an average detection accuracy of 94.47% and 90.31% for common aviation image insulators, respectively [5]. Sunduijav et al. proposed an improved YOLOv3-dense image detection model to successfully detect insulators and shock absorbers on transmission lines. The accuracy of YOLOv3 and YOLOv2 was 94% and 87%, respectively [6]. Li et al. put forward a small modulus worm surface defect detecting method using YOLOv7 deep learning to address the low efficiency and accuracy of small modulus worm surface defect detection. A dual-camera worm image acquisition system was designed using the geometric and material characteristics of small modulus worms. This system's performance was superior to other means, with a detecting accuracy of 95.7% [7]. Yuan et al. proposed an energy-saving system using YOLOv3. This system extended the service life of lighting fixtures and reduced the financial cost of schools [8].

However, at present, in addition to manual inspections, there are also drone inspections in the inspection of transmission lines, which can easily lead to network security issues. Therefore, it is necessary to introduce appropriate detection algorithms to detect threats and malicious attacks [9]. Intrusion Detection Algorithm (IDA) is an efficient and limitless potential technology. With the extensive research of scholars and continuous development, IDA has gradually become a new force in maintaining network security [10]. Sadeghizadeh et al. proposed a lightweight IDA using signal strength indicator readings for information reception, targeting Sybil attacks that were prone to occur in sensors and ad hoc networks. This proposed system had the characteristics of high detection accuracy, low false alarm rate, and low energy consumption [11]. Sirisha A et al. introduced IDA to deal with the rapidly expanding network threat of the Internet. The researchers examined the efficacy of various machine learning algorithms in classification and anomaly recognition tasks. In terms of supervised learning, the proposed method outperformed other methods, and the K-means method was also superior to other methods [12]. The characteristics of audit data were constantly increasing. Artificial intelligence intrusion detection systems had low classification accuracy and long training time. In response, Aljanabi M et al. put forward a new classifying IDA. This method achieved an accuracy of 100% on the KDD CUP 99 dataset [13]. Al Ghathami et al. tested the impact of noise on intrusion detection systems based on machine learning algorithms through a series of different experiments. Intrusion detection systems using machine learning algorithms were susceptible to the influence of datasets, outliers and extrema, mislabeled instances, and integrated learning techniques [14].

In conclusion, the current research on the design of external force damage prevention systems for transmission lines is still relatively limited in scope and lacks sufficient depth. It is challenging to process and detect foreign object image information and complex and diverse network attack methods involving a large number of transmission lines. For example, the YOLO series of image detection models perform poorly in detecting small objects and precise positioning, affecting their efficiency and accuracy in physical and network threat detection. However, existing IDAs mostly focus on specific types of network attacks, and research on composite attacks is not deep enough. In addition, machine learning-based systems are susceptible to datasets and outliers, limiting their robustness. Although the improved YOLO model has improved detection speed and accuracy, it still has limitations in providing comprehensive solutions and customization for specific scenarios. Therefore, it is particularly urgent to develop more efficient and intelligent inspection and network security protection techniques. Based on this status quo, the study innovatively integrates the respective advantages of the YOLOv8 network and IDAs and proposes a novel external damage prevention system model for transmission lines. This novel approach aims to enhance the detection capability of foreign objects and network attacks on transmission lines, while simultaneously improving the robustness and practicality of the system. The objective is to provide a more robust guarantee for the safe operation of transmission lines. This study consists of three parts in total. Firstly, it introduces how YOLOv8 is improved and how the external force damage prevention system for transmission lines is established. The second part is the performance testing of the new model. Finally, the article is summarized.

2. Methods and Materials

To efficiently and accurately detect and process transmission lines' external damage forms, this paper first introduces the Convolutional Block Attention Module (CBAM) to improve YOLOv8. Then, a transmission line image detection model based on improved YOLOv8 is constructed, namely YOLOv8-CBAM. Finally, a new transmission line external force damage prevention system integrating YOLOv8 and IDA is proposed by combining the YOLOv8-CBAM-PCA transmission line image detection model with IDA.

2.1. Transmission Line Image Detection Model Based on YOLOv8-CBAM

Traditional image recognition mostly uses edge detection operators, such as Prewitt, Sobel, and Canny. These methods often rely heavily on the design of Softmax and are not universally applicable to solving computable problems [15]. YOLOv8 is a single-stage detecting algorithm using regression thinking, which can directly convolve the obtained image data and label the category of the image [16]. YOLOv8 not only has good recognition accuracy but also has high real-time performance, which can better adapt to image detection of transmission lines. Therefore, this study introduces YOLOv8 to detect foreign object images in transmission lines. Fig. 1 shows the structure of YOLOv8.

Fig. 1. Network structure of YOLOv8.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig1.png

In Fig. 1, first, the input layer is responsible for inputting the foreign object image information of the transmission line to be detected into the network backbone module (CSPDarkNet-53). Then, the CSPDarkNet-53 module layer extracts features from the foreign object image information of the transmission line. Secondly, the feature enhancement module layer is responsible for pooling and fusing the input transmission line feature foreign object image information. Finally, the output layer outputs abnormal image information. The CSPDarkNet-53 module layer of YOLOv8 includes four modules: feature extraction layer (Focus), convolutional layer (Conv), Spatial Pyramid Pooling Fast (SPPF), and BottleneckCSP. Fig. 2 shows the CSPDarkNet-53 module layer of YOLOv8.

Fig. 2. CSPDarkNet-53 module.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig2.png

In Fig. 2, the Focus module mainly consists of a 3×3 sized Conv, which is responsible for cutting the input transmission line foreign object image data into 4 parts and performing channel dimension concatenation and feature map convolution operations. The Focus module serves to reduce spatial resolution while simultaneously increasing the number of channels. This is achieved by reducing the costs associated with convolution computations and employing tensor reshaping operations. The Conv module is responsible for 2D convolution, Batch Normalization (BN), and parity functions. The BottleneckCSP module is responsible for extracting deep semantic information from transmission line images. SPPF is mainly composed of three 5×5 convolutional kernels, responsible for increasing receptive fields and separating important contextual features. BN calculation is represented by Eq. (1).

(1)
$ x_{i}^{*} = \frac{x_{i} - \mu_{B}}{\sqrt{\sigma_{B}^{2} + \varepsilon}} $

In Eq. (1), $\mu_{B}$ and $\sigma_{B}^{2}$ correspond to tensors to calculate the mean and variance, respectively. $x_{i}^{*}$ represents the normalized output value. $x_{i}$ represents the values of the elements in the input feature map. $\varepsilon$ is a value that prevents variance from being 0. However, the values after performing BN operations will be concentrated around 0. Therefore, to enhance the nonlinearity of the network, the BN calculation equation is scaled and translated. The BN calculation after scaling and translation is represented by Eq. (2).

(2)
$ y_{i} = \gamma x_{i}^{*} + \beta $

In Eq. (2), $\gamma$ and $\beta$ represent the scaling ratio and offset, respectively. The maximum pooling operation is represented by Eq. (3).

(3)
$ y_{m,n}^{d} = \max_{i \in R_{m,n}^{d}} x_{i} $

In Eq. (3), $y_{m,n}^{d}$ refers to the maximum output transmission line characteristic map value. $R_{m,n}^{d}$ refers to the area of the transmission line characteristic map. The calculation of Conv is represented by Eq. (4).

(4)
$ N = \frac{M - F + 2P}{S} + 1 $

In Eq. (4), $N$ represents the size of the output transmission line characteristic map. $M$, $F$, $P$, and $S$ correspond to the input image size, convolution kernel size, fill factor, and convolution kernel movement step in the transmission line, respectively. However, YOLOv8 still cannot meet the detection requirements for foreign object images on transmission lines. The attention mechanism can facilitate YOLOv8 to successfully extract feature image information from transmission line diagrams and suppress irrelevant image features, greatly improving image recognition efficiency [17, 18]. As a lightweight attention module, CBAM can effectively reduce the number of parameters and computational resources required while improving the overall performance of the model. This enables YOLOv8 to identify and locate targets with greater accuracy when processing images. Accordingly, the study introduces the CBAM into the YOLOv8 network algorithm, enhancing the CSPDarkNet-53 layer within the CBAM module and the C2f module within the Neck layer. Furthermore, it proposes a transmission line image detection model based on the improved YOLOv8 network algorithm. Fig. 3 shows the proposed YOLOv8-CBAM transmission line image detection model.

Fig. 3. The YOLOv8-CBAM transmission line image detection model.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig3.png

In Fig. 3, the proposed YOLOv8-CBAM transmission line image detection model mainly consists of four parts: CSPDarkNet-53, SPPF, multi-scale fusion structure, and YOLO v8 detection head. Firstly, the model extracts transmission line image features from the CSPDarkNet-53 layer and fixes the image size. The improved C2f module extracts channel information and spatial information from the input transmission line feature map. This can further enhance the ability of multi-scale feature fusion, better capture feature expressions at different levels, and improve the accuracy and stability of object detection networks. Then, a fixed image size feature map is used to construct a feature pyramid and transmit semantic information forward. Finally, the deep features will be upsampled and fused with the features of the previous layer, resulting in higher resolution and richer feature representations. This improved process not only enhances the resolution of the features but also leads to a richer and more comprehensive feature representation, which provides more accurate target localization and classification information for the final detector head. The output feature value is represented by Eq. (5).

(5)
$ y(p_{0}) = \sum_{p_{n} \in R} w(p_{n}) \bullet x(p_{0} + p_{n} + \triangle p_{n}) $

In Eq. (5), $w$ represents the convolutional kernel's weight value. $x$ and $R$ correspond to the characteristic map and sampling point interval positions of the transmission line to be tested, respectively. $p_{0}$ and $p_{n}$ correspond to output feature values at a certain sampling point, respectively. $R$ is a positional element. The overall implementation process of CBAM is represented by Eq. (6).

(6)
$ v_{ca} = sigmoid(f(M_{x}(x)) + f(A_{x}(x))) $

In Eq. (6), $M_{x}$ and $A_{x}$ represent maximum pooling and average pooling, respectively. $f$ represents the fully connected layer.

2.2. Construction of External Force Damage Prevention System for Transmission Lines

The transmission line image detection model based on YOLOv8-CBAM can recognize the damage caused by foreign objects in transmission line equipment through image recognition. However, it is not yet sufficient to address the prevention of transmission line network security issues. Therefore, a transmission line image detecting model using YOLOv8-CBAM is utilized as the basic framework. A new transmission line external force damage prevention system integrating YOLOv8 and IDA is constructed using IDA. Fig. 4 shows the basic process of IDA.

Fig. 4. Basic flow of intrusion detection algorithms.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig4.png

In Fig. 4, IDA mainly includes the stages of information analysis, response decision-making, and information collection. Firstly, in the information collection stage, the network raw data information is collected and preprocessed according to the set rules, providing data level support for the subsequent information analysis. Secondly, in the information analysis stage, in-depth analysis is conducted on the data processed in the information collection stage to make accurate judgments on intrusion behavior. Finally, during the response decision stage, intrusion behavior is immediately prevented in accordance with IDA's pre-set methods, such as prohibiting IP access, forcing shutdown, etc. Fig. 5 shows the proposed transmission line external force damage prevention system.

Fig. 5. Structure of the transmission line external damage prevention system.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig5.png

In Fig. 5, the proposed transmission line external force damage prevention system structure mainly consists of four parts, namely data preprocessing, mixed sampling, improved YOLOv8 transmission line image detection model, and classification results. Firstly, the transmission line foreign object image dataset is used as the test data source. The data preprocessing part is responsible for merging the input data information to ensure that the transmission line foreign object damage prevention system model can learn adequately. This includes cropping, scaling, and color correction of the image data to fit the model inputs. To better train the transmission line external damage prevention system model as well as not affecting the classification results, the study also uses the Maximum-Minimum (Max-Min) method for numerical and normalization operations to newly divide the data. This step is designed to eliminate the effect of different scales, thereby facilitating the comparison of data at a uniform scale. This, in turn, enhances the efficiency and effectiveness of model training. At the same time, the image data are enhanced by rotating, scaling, and shearing techniques to increase the diversity of the dataset and the generalization ability of the model. Due to the possible imbalance between the various types of samples in the transmission line foreign object image dataset, a mixed sampling method is used to balance the dataset to ensure that the model is not biased against a particular category. Moreover, the Principal Component Analysis (PCA) algorithm is used to downscale the data information to reduce the dimensionality of the data and retain the most important features. Subsequently, the processed data are fed into the YOLOv8 network for model training. During the training process, the model is evaluated using a validation set to monitor the performance of the model and prevent overfitting. Finally, the classification results are obtained through the transmission line image detection model. The calculation of Max-Min is represented by Eq. (7).

(7)
$ x^{'} = \frac{x - M_{min}}{M_{max} - M_{min}} $

In Eq. (7), $x^{'}$ represents the result of normalizing the characteristics of the transmission line data. $M_{min}$ and $M_{max}$ correspond to the minimum and maximum values after feature processing, respectively. PCA information content is generally measured by removing mean, calculating contribution rate, mean deviation, and covariance matrix. The mean removal of data feature decentralization is represented by Eq. (8).

(8)
$ \mu = \frac{1}{n} \sum_{i=1}^{n} x_{i} $

In Eq. (8), $\mu$ and $n$ represent mean removal and sample data quantity, respectively. The mean deviation is represented by Eq. (9).

(9)
$ \phi_{i} = x_{i} - \mu $

In Eq. (9), $\phi_{i}$ represents the deviation from the mean $\mu$ for each sample $x_{i}$. The covariance matrix is represented by Eq. (10).

(10)
$ S = \frac{1}{n} \sum_{i=1}^{n} (x_{i} - \mu)(x_{i} - \mu)^{T} = \frac{1}{n} \sum_{i=1}^{n} \phi_{i}\phi_{i}^{T} $

In Eq. (10), $S$ represents the dataset sample's covariance matrix. $T$ represents matrix. The calculation contribution rate $\eta$ is represented by Eq. (11).

(11)
$ \eta = \frac{\sum_{i=1}^{k} \alpha_{i}}{\sum_{i=1}^{m} \alpha_{i}} $

In Eq. (11), $m$ and $k$ represent matrix positions. $\alpha_{i}$ represents an eigenvector. $n$ represents the number of samples. Fig. 6 shows the training of the proposed transmission line external force damage prevention system.

Fig. 6. Training process.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig6.png

In Fig. 6, the proposed system mainly has 5 training processes. Firstly, the input data are processed using mixed sampling and PCA, with an 8*8 grayscale image as the input layer. Then, Conv is used to extract features from grayscale images. BN performs batch normalization on the extracted feature data to accelerate the convergence speed. Secondly, maximum pooling is used to pool the processed data. The fully connected layer is used to recombine the output features to reduce feature loss. Finally, the data information is output using Softmax.

3. Results

Firstly, a dataset of foreign object images of transmission lines was constructed to validate the proposed new transmission line external force damage prevention system that incorporates YOLOv8 and IDA. A comparative experiment was conducted between commonly used image detection models and the proposed model's detecting accuracy. Secondly, the model's classification performance was tested using classification accuracy as an indicator. Finally, the optimized model's feasibility was verified through simulation experiments.

3.1. Performance Testing of Transmission Line Image Detection Model

A suitable experimental environment was established to test the proposed transmission line external force damage prevention system. The Windows 10 operating system and Python language were used. TensorFlow was used to build a network model. The CPU was Intel Core i7, the GPU was NVIDIA GeForce, and the memory was 64GB. The iterations were 80, the learning rate was $10^{-3}$, the batch size was 6, and the IoU threshold was 0.3. The dataset of foreign object images on transmission lines was divided into training and testing sets in an 8:2 ratio. Table 1 shows the specific quantity of various foreign object images in the transmission line foreign object image dataset.

Table 1. Transmission line foreign object image dataset.

Type of foreign object Bird nest Kites Balloons Leaves
Number of training sets 1258 957 657 468
Number of test sets 315 240 164 117
Type of foreign object Plastic bags Ice and snow Advertising ribbons Banners
Number of training sets 489 389 374 214
Number of test sets 123 98 93 54

In Table 1, a batch of 6010 images were collected using image processing techniques as a dataset of foreign object images, including 8 types of foreign object images of transmission lines. The foreign object images in the dataset mainly include: plastic bags, ice and snow, bird nests, advertising ribbons, kites, balloons, leaves, and banners. In addition, the study also introduced commonly used image detection models and compared their accuracy with the proposed YOLOv8-CBAM image detection model, such as YOLOv8, YOLOv5, and YOLOv5-CBAM image detection models. Fig. 7 shows foreign object images' detecting accuracy on transmission lines using four different models.

Fig. 7. Model detection accuracy of kite and balloon foreign object images.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig7.png

Fig. 7(a) shows the variation curve of foreign object image detecting accuracy in transmission lines for four models under the training set. Fig. 7(b) shows the variation curve of the accuracy for four models under the test set. As the sample size continued to increase, the detection accuracy of all four models showed a trend of slowly increasing first and then stabilizing. The detection accuracy of YOLOv8, YOLOv5, YOLOv5-CBAM and the proposed YOLOv8-CBAM on the training set was 88.15%, 82.31%, 91.24%, and 98.88%, respectively. The detection accuracy in the test set was 87.24%, 79.87%, 90.58%, and 97.64%, respectively. By comparison, the proposed YOLOv8-CBAM image detection model performed the best. Compared with the unimproved YOLOv8, the proposed model's detecting accuracy in two sets was improved by 10.73% and 10.40%, respectively. Therefore, the improvement of YOLOv8 had a positive effect on the model's overall performance, with significant effect. In addition, the study conducted classification tests on foreign object images of bird nests, balloons, kites, and leaves using classification accuracy as a test indicator to verify YOLOv8-CBAM's classification effect on foreign object images. Fig. 8 shows the test results.

Fig. 8. Model classification accuracy.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig8.png

Figs. 8(a) and 8(b) show the YOLOv8 and YOLOv8-CBAM image detection model's classification accuracy for foreign objects images: bird nests, balloons, kites, and leaves. The highest classification accuracy of the YOLOv8 image detection model for images of bird nests, balloons, kites, and leaves was 86.79%, 87.12%, 79.58%, and 88.12%, respectively. The highest classification accuracy of the YOLOv8-CBAM-PCA image detection model for images of bird nests, balloons, kites, and leaves was 95.45%, 89.78%, 90.02%, and 96.03%, respectively. Overall, the proposed YOLOv8-CBAM image detection model had higher classification accuracy for images of bird nests, balloons, kites, and leaves compared to the YOLOv8 image detection model. The proposed YOLOv8-CBAM test curve was also closer to the ideal curve, which was more in line with the current detection of foreign object images in transmission lines, having certain feasibility and effectiveness.

3.2. Simulation Testing of External Force Damage Prevention System for Transmission Lines

The study used DD Cup 99 and NSL-KDD datasets as testing data sources. DD Cup 99 is a well-known dataset in the field of network security, which contains a large number of network connection records. Each record has a detailed feature description, including time and content-based features and labels indicating whether each connection belongs to an attack. NSL-KDD includes over 20,000 pieces of network attack data information, including DOS, U2R, R2L, etc. The study selected four types of network attacks as inputs: Normal, Denial of Service (DOS), illegal access from remote machines (R2L), and illegal access from local superuser privileges by ordinary users (U2R). The classification performance of network attack types for four models was tested in Fig. 9.

Fig. 9. Effectiveness of the model in categorizing types of network attacks.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig9.png

Figs. 9(a) and 9(b) show the classification test results of four transmission line external force damage prevention systems against Normal, DOS, R2L, and U2R attacks in DD Cup 99 and NSL-KDD. After multiple tests, the proposed new YOLOv8-CBAM-PCA-intrusion transmission line external force damage prevention system had a higher accuracy in network attack classification. The highest classification accuracy of YOLOv8-CBAM-PCA-intrusion for four network attacks: Normal, DOS, R2L, and U2R was 97.36%, 95.23%, 96.31%, and 95.01%, respectively. Compared with the unimproved YOLOv8, the classification accuracy increased by 28.59%, 16.32%, 18.13%, and 8.85%, respectively. In addition, the study also conducted comparative experiments on the predicted and actual values' differences of these four network attacks mentioned above in Fig. 10.

Fig. 10. Discrepancy between the predicted and true values.

../../Resources/ieie/IEIESPC.2026.15.1.137/fig10.png

Figs. 10(a) and 10(b) show the difference between the predicted and true values of the four network attacks of YOLOv8 and YOLOv8-CBAM-PCA-intrusion. In Fig. 10, the difference between the predicted and actual values of the four types of network attacks on the YOLOv8-BAM-PCA intrusion transmission line external force damage protection system was lower than that of YOLOv8. The predicted and true values' difference of the Normal, DOS, R2L, and U2R network attack modes of YOLOv8-CBAM-PCA-intrusion was only 0.2%, 1.1%, 0.9%, and 0.1%, respectively. The above data indicate that the proposed model has good robustness and is more adaptable to changes in data. Finally, the study also conducted a multi-indicator test on the YOLOv8-CBAM-PCA-intrusion system using Precision (P), Recall (R), F1 value, and average detection time as indicators. The results are shown in Table 2.

Table 2. Metrics test results for different models.

Data set Model P/% R/% F1/% Average detection time/s
DD Cup 99 YOLOv8 86.56 85.48 86.07 7.58
YOLOv8-CBAM 89.97 89.63 88.96 5.22
YOLOv8-CBAM-PCA 93.57 93.54 94.06 4.38
YOLOv8-CBAM-PCA-intrusion 96.41 96.28 95.85 2.74
FTA 88.35 89.67 86.15 4.08
MCS 86.87 87.34 88.98 3.96
FLM 85.66 83.65 84.38 3.85
NSL-KDD YOLO v8 90.08 88.76 88.35 5.53
YOLOv8-CBAM 92.52 93.85 92.69 4.65
YOLOv8-CBAM-PCA 95.43 95.79 96.11 3.98
YOLOv8-CBAM-PCA-intrusion 98.15 98.73 98.02 2.53
FTA 90.02 90.32 89.48 3.88
MCS 90.10 90.19 90.77 3.55
FLM 90.23 90.78 90.65 3.26

In Table 2, among these four indicators detected, the performance of the YOLOv8 system without improvement was the worst, followed by YOLOv8-CBAM, YOLOv8-CBAM-PCA, and YOLOv8-CBAM-PCA-intrusion systems. The highest P of YOLOv8 was 90.08%, the highest R was 88.76%, the highest F1 value was 88.35%, and the average detection time was 5.53s. The proposed new transmission line external force damage prevention system had a maximum P of 98.15%, a maximum R of 98.73%, a maximum F1 value of 98.02%, and an average detection time of 2.53 s. In addition, it is also the research model that performs best when compared to the rest of the commonly used transmission line external damage prevention models. Therefore, the proposed YOLOv8-CBAM-PCA-intrusion had relatively good performance and was more suitable for the current prevention of external damage to transmission lines.

4. Conclusion

The current transmission lines are prone to difficulties in foreign object image recognition and network security in complex environments. In this regard, the study introduced YOLOv8 for real-time detection of foreign object images in transmission lines. CBAM was used for algorithm improvement. A transmission line image detection model based on improved YOLOv8-CBAM was proposed. Compared with other common image detection models, the proposed YOLOv8-CBAM transmission line image detection model performed the best, with detection accuracy improvements of 10.73% and 10.40% in the training and testing sets, respectively. The highest classification accuracy of YOLOv8-CBAM for images of bird nests, balloons, kites, and leaves was 95.45%, 89.78%, 90.02%, and 96.03%, respectively. To better handle and detect complex and diverse transmission line network attack methods, the study combined the YOLOv8-CBAM-PCA model with IDA. Therefore, a new YOLOv8-CBAM-PCA-intrusion transmission line external force damage prevention system was proposed. The highest classification accuracy of this new system for four network attacks: Normal, DOS, R2L, and U2R was 97.36%, 95.23%, 96.31%, and 95.01%, respectively. In summary, the proposed optimization model's performance exceeds that of existing transmission line external force damage prevention models. It has advantages such as high accuracy in image recognition, good robustness, and obvious classification effects. However, compared to the current network situation, the NSL-KDD dataset is no longer able to represent the current complex network situation. The dataset can be updated in the future to further explore and enrich the research comprehensiveness. To further improve the real-time detection capability or energy efficiency of the model, it can be deployed on edge devices in the future to process data up close. Thus, data transmission time can be reduced, response time can be accelerated, and overall system latency can be lowered.

Fundings

The research is supported by: Technology projects of Guangdong Power Grid Co., Ltd, Research on spatial distance measurement and external force damage prevention technology based on the fusion of images and 3D point cloud models. Project number (No. 031000KK52220005).

References

1 
Qi J. , Cui Q. , Zhang L. , 2023, Solution structures of an electrical transmission line model with bifurcation and chaos in Hamiltonian dynamics, International Journal of Bifurcation and Chaos, Vol. 33, No. 9, pp. 65-78DOI
2 
Hibi S. , Kawabe K. , Masuta T. , 2023, Estimation method for transmission line overloads due to renewable energy source output forecast errors in daily supply and demand planning, IEEJ Transactions on Electrical and Electronic Engineering, Vol. 18, No. 9, pp. 12-24DOI
3 
Ahmed A. , Garg J. , Charate R. , 2022, Are mobile cardiac outpatient monitors reliable to monitor QTc in comparison to 12-lead ECG, Circulation, Vol. 146, No. 1, pp. 140-148Google Search
4 
Chao C. , Mei X. , Wei Y. , 2023, A balanced walking-clamp mechanism for inspection robot of transmission line, Industrial Robot, Vol. 8, No. 4, pp. 50-62DOI
5 
Liu C. , Wu Y. , Liu J. , 2021, Improved YOLOv3 network for insulator detection in aerial images with diverse background interference, Electronics, Vol. 10, No. 7, pp. 771-798DOI
6 
Sunduijav C. , Hardt W. , Bayasgalan Z. , 2021, Image processing of insulator and vibration damper by YOLO algorithm, Proceedings of the XV International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering, pp. 375-379Google Search
7 
Li Y. , Zheng P. , Yu M. , 2024, Small-modulus worms surface defect detection method based on YOLOv7, Measurement Science and Technology, Vol. 8, No. 5, pp. 35-43DOI
8 
Yuan B. , Li J. , Liu Z. , 2021, Research on classroom lighting energy saving system based on YOLOv3, Journal of Physics: Conference Series, Vol. 18, No. 1, pp. 12-27DOI
9 
Nagarajan G. , Sushmitha G. V. , Susmitha R. , 2022, Design of an enterprise cloud-based intrusion detection system model using back propagation network based on particle swarm optimisation algorithm, International Journal of Enterprise Network Management, Vol. 6, No. 1, pp. 13-21DOI
10 
Kumar M. D. , Nagalakshmi T. J. , 2023, Design of intrusion detection system for wireless ad hoc network in the detection of DoS attack using one-class SVM with wrapper approach feature selection comparing with information gain algorithm, Proceedings of the International Conference on Advances in Computing, Communication and Applied Informatics, pp. 1-6Google Search
11 
Sadeghizadeh M. , 2022, A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks, International Journal of Nonlinear Analysis and Applications, Vol. 13, No. 9, pp. 305-320Google Search
12 
Sirisha A. , Chaitanya K. , Krishna K. V. S. S. R. , 2021, Intrusion detection models using supervised and unsupervised algorithms: a comparative estimation, International Journal of Safety and Security Engineering, Vol. 11, No. 1, pp. 51-58DOI
13 
Aljanabi M. , Ismail M. , 2021, Improved intrusion detection algorithm based on TLBO and GA algorithms, International Arab Journal of Information Technology, Vol. 18, No. 2, pp. 170-179DOI
14 
Al-Gethami K. M. , Al-Akhras M. T. , Alawairdhi M. , 2021, Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets, Security and Communication Networks, Vol. 7, No. 5, pp. 1-28DOI
15 
Xu W. , Cui C. , Ji Y. , 2024, YOLOv8-MPEB small target detection algorithm based on UAV images, Heliyon, Vol. 10, No. 8, pp. 29-38DOI
16 
Zhou Y. , Zhu W. , He Y. , 2023, YOLOv8-based spatial target part recognition, Proceedings of the IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, pp. 1684-1687Google Search
17 
Mokayed H. , Quan T. Z. , Alkhaled L. , Sivakumar V. , 2023, Real-time human detection and counting system using deep learning computer vision techniques, Artificial Intelligence and Applications, Vol. 1, No. 4, pp. 221-229Google Search
18 
Manibharathi D. , Vasanthanayaki C. , 2023, Integration of deep direction distribution feature extraction and optimized attention based double hidden layer GRNN models for robust cursive handwriting recognition, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17, No. 8, pp. 37-43DOI
DuanJiao Li
../../Resources/ieie/IEIESPC.2026.15.1.137/au1.png

DuanJiao Li received her master's degree in high voltage technology from Huazhong University of Science and Technology in 1997. She is currently the Deputy General Manager of the Production Technology Department of Guangdong Power Grid Co., Ltd. and the Director of the Machine Inspection Management Center of Guangdong Power Grid Co., Ltd. Her research focuses on high voltage technology and unmanned aerial vehicle intelligent inspection.

Gao Liu
../../Resources/ieie/IEIESPC.2026.15.1.137/au2.png

Gao Liu received his master's degree in intelligent operation and maintenance from Three Gorges University in 2008. He is currently a manager of the Technology Application Promotion Department at the Machine Inspection Management Center of Guangdong Power Grid Co., Ltd. He research focuses on artificial intelligence, intelligent inspection, and transmission and distribution lines.

Ruchao Liao
../../Resources/ieie/IEIESPC.2026.15.1.137/au3.png

Ruchao Liao received his master's degree in mechanical engineering from the Department of Mechanical Engineering at Tsinghua University in 2016.He is currently a top-level professional technical expert in the Technical Application Promotion Department of the Machine Inspection Management Center of Guangdong Power Grid Co., Ltd. He research focuses on transmission lines and intelligent inspection of drones.

ChangYu Li
../../Resources/ieie/IEIESPC.2026.15.1.137/au4.png

ChangYu Li received his master's degree in computer engineering from the Department of Electrical and Computer Engineering at the University of California, San Diego in 2020.He is currently a Senior Data Engineer in the Technology Application Promotion Department of the Machine Patrol Management Center of Guangdong Power Grid Co., Ltd. He research focuses on artificial intelligence and data management.

JunSheng Lin
../../Resources/ieie/IEIESPC.2026.15.1.137/au5.png

JunSheng Lin received his bachelor's degree in water resources and hydropower engineering from Sichuan University in 2019. He is currently a specific responsibility in the Technical Application Promotion Department of the Machine Inspection Management Center of Guangdong Power Grid Co., Ltd. He research focuses on transmission lines and artificial intelligence.

Feng Zhang
../../Resources/ieie/IEIESPC.2026.15.1.137/au6.png

Feng Zhang received his master's degree in electric power engineering from Wuhan University of Water Resources and Electric Power in 2002. He is currently a Manager of the Transmission Motor Patrol Management Department at the Machinery Patrol Management Center of Guangdong Power Grid Co., Ltd. He research focuses on transmission lines.