{"id":"https://openalex.org/W2799155122","doi":"https://doi.org/10.1109/smartgridcomm.2017.8340659","title":"Real-time detection of false data injection attack using residual prewhitening in smart grid network","display_name":"Real-time detection of false data injection attack using residual prewhitening in smart grid network","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2799155122","doi":"https://doi.org/10.1109/smartgridcomm.2017.8340659","mag":"2799155122"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm.2017.8340659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2017.8340659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036535909","display_name":"Qiaomu Jiang","orcid":"https://orcid.org/0000-0002-7538-725X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiaomu Jiang","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100613609","display_name":"Huifang Chen","orcid":"https://orcid.org/0000-0002-1366-1030"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huifang Chen","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101450371","display_name":"Lei Xie","orcid":"https://orcid.org/0000-0002-7706-8711"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Xie","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103176652","display_name":"Kuang Wang","orcid":"https://orcid.org/0000-0001-8542-8441"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kuang Wang","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036535909"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.8046,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.75916008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"83","last_page":"88"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.6985756754875183},{"id":"https://openalex.org/keywords/cusum","display_name":"CUSUM","score":0.6972325444221497},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.657893717288971},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.6480200886726379},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5637389421463013},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.4610651135444641},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.43563514947891235},{"id":"https://openalex.org/keywords/test-statistic","display_name":"Test statistic","score":0.42154091596603394},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.41302067041397095},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40908247232437134},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32027900218963623},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31604036688804626},{"id":"https://openalex.org/keywords/statistical-hypothesis-testing","display_name":"Statistical hypothesis testing","score":0.3038040101528168},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2643066346645355},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.20060494542121887},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1820700764656067},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14759835600852966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09050098061561584}],"concepts":[{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.6985756754875183},{"id":"https://openalex.org/C178518018","wikidata":"https://www.wikidata.org/wiki/Q1024555","display_name":"CUSUM","level":2,"score":0.6972325444221497},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.657893717288971},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.6480200886726379},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5637389421463013},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.4610651135444641},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.43563514947891235},{"id":"https://openalex.org/C169857963","wikidata":"https://www.wikidata.org/wiki/Q1461038","display_name":"Test statistic","level":3,"score":0.42154091596603394},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.41302067041397095},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40908247232437134},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32027900218963623},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31604036688804626},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.3038040101528168},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2643066346645355},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.20060494542121887},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1820700764656067},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14759835600852966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09050098061561584},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm.2017.8340659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2017.8340659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W391578156","https://openalex.org/W1525535255","https://openalex.org/W1970225669","https://openalex.org/W2005028112","https://openalex.org/W2022229650","https://openalex.org/W2028239856","https://openalex.org/W2033939184","https://openalex.org/W2061207936","https://openalex.org/W2064111006","https://openalex.org/W2071992589","https://openalex.org/W2075565671","https://openalex.org/W2079428693","https://openalex.org/W2089662742","https://openalex.org/W2106424475","https://openalex.org/W2117255788","https://openalex.org/W2121202969","https://openalex.org/W2132637896","https://openalex.org/W2157148515","https://openalex.org/W2313114883","https://openalex.org/W2610857016","https://openalex.org/W3099514962"],"related_works":["https://openalex.org/W2056974159","https://openalex.org/W2753583628","https://openalex.org/W2138199368","https://openalex.org/W1788036421","https://openalex.org/W2127322318","https://openalex.org/W2946248804","https://openalex.org/W3204945059","https://openalex.org/W2032188264","https://openalex.org/W4205294552","https://openalex.org/W4283210029"],"abstract_inverted_index":{"State":[0],"estimation":[1],"plays":[2],"a":[3,20,71,101,109],"critical":[4,45],"role":[5],"in":[6,79,137],"the":[7,29,34,48,51,60,66,77,80,88,92,116,121,125,130,134,140,144,155,162],"smart":[8,52],"grid":[9,53],"systems.":[10,54],"However,":[11],"according":[12],"to":[13,46,75],"recent":[14],"researches,":[15],"it":[16],"is":[17,44,87,94],"evident":[18],"that":[19,154],"well-designed":[21],"false":[22],"data":[23],"injection":[24],"attack":[25,42],"(FDIA)":[26],"can":[27,160],"bypass":[28],"security":[30],"system":[31],"and":[32,107,143],"mislead":[33],"state":[35],"estimator.":[36],"Therefore,":[37],"detecting":[38],"such":[39],"kind":[40],"of":[41,50,91,120,129,133,139],"efficiently":[43],"ensuring":[47],"reliability":[49],"In":[55,65],"this":[56],"paper,":[57],"we":[58,69,99],"study":[59],"real-time":[61,82,110,157],"FDIA":[62,83,111,163],"detection":[63,84,112,131,146,158],"mechanism.":[64],"proposed":[67,135,156],"mechanism,":[68,85],"use":[70],"residual":[72,93],"prewhitening":[73],"procedure":[74],"resolve":[76],"problem":[78],"existing":[81],"which":[86],"covariance":[89],"matrix":[90],"not":[95],"full":[96],"rank.":[97],"Then,":[98],"construct":[100],"two-sided":[102],"vector":[103],"parameter":[104],"test":[105],"statistic,":[106],"propose":[108],"method":[113,159],"based":[114],"on":[115],"cumulative":[117],"sum":[118],"(CUSUM)":[119],"one-shot":[122],"statistic.":[123],"Moreover,":[124],"asymptotic":[126],"closed-form":[127],"expressions":[128],"performance":[132],"method,":[136],"terms":[138],"false-alarm":[141],"period":[142],"average":[145],"delay,":[147],"are":[148],"theoretically":[149],"derived.":[150],"Numerical":[151],"results":[152],"validate":[153],"detecte":[161],"efficiently.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
