{"id":"https://openalex.org/W2990267353","doi":"https://doi.org/10.1109/smartgridcomm.2019.8909811","title":"Real-time Detection of False Data Injection Attacks Based on Load Forecasting in Smart Grid","display_name":"Real-time Detection of False Data Injection Attacks Based on Load Forecasting in Smart Grid","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2990267353","doi":"https://doi.org/10.1109/smartgridcomm.2019.8909811","mag":"2990267353"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm.2019.8909811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2019.8909811","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043183563","display_name":"Yueyu Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yueyu Deng","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000861569","display_name":"Kun Zhu","orcid":"https://orcid.org/0000-0001-6784-5583"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Zhu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100447486","display_name":"Ran Wang","orcid":"https://orcid.org/0000-0001-5601-0513"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ran Wang","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000188601","display_name":"Yong Wan","orcid":"https://orcid.org/0000-0001-5768-4966"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Wan","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043183563"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.8404,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.74823522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.7645462155342102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6686687469482422},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.5737749338150024},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.47813165187835693},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4776826500892639},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4731496572494507},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43935006856918335},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.430299311876297},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34333527088165283},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3371846079826355},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.328826367855072},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2817017436027527},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21734854578971863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21235930919647217},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16491088271141052}],"concepts":[{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.7645462155342102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6686687469482422},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.5737749338150024},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.47813165187835693},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4776826500892639},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4731496572494507},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43935006856918335},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.430299311876297},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34333527088165283},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3371846079826355},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.328826367855072},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2817017436027527},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21734854578971863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21235930919647217},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16491088271141052},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm.2019.8909811","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2019.8909811","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2038651258","https://openalex.org/W2057843061","https://openalex.org/W2076175645","https://openalex.org/W2127691571","https://openalex.org/W2154663898","https://openalex.org/W2308438456","https://openalex.org/W2313114883","https://openalex.org/W2332912277","https://openalex.org/W2615509641","https://openalex.org/W2905600196"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Application":[0],"of":[1,12,34,71,140,146,166,217],"computing":[2],"and":[3,10,54,74,136,193],"communications":[4],"intelligence":[5],"has":[6,43],"increase":[7],"the":[8,49,59,67,77,129,133,137,141,144,147,163,182,190,194,198,225],"openness":[9],"complexity":[11],"smart":[13,24,149],"grid":[14,60,150],"to":[15,28,103,127,132,180],"a":[16,31,110,120,175],"higher":[17],"degree.":[18],"However,":[19,62],"this":[20,83,167],"shift":[21],"also":[22,202],"makes":[23],"grids":[25],"more":[26],"vulnerable":[27],"cyber-attacks.":[29],"Recently,":[30],"new":[32],"type":[33],"invisible":[35],"attack":[36,41],"called":[37],"false":[38,56],"data":[39,52,57],"injection":[40,199],"(FDIA)":[42],"been":[44],"proposed,":[45],"which":[46],"can":[47,151,210],"bypass":[48],"existing":[50,64],"bad":[51],"detection":[53,220],"inject":[55],"into":[58],"measurements.":[61],"most":[63],"work":[65],"ignore":[66],"potential":[68,183],"different":[69,92],"purposes":[70],"FDIA":[72,88,117,184,208],"attacks,":[73,107],"simply":[75],"assuming":[76],"purpose":[78],"as":[79],"power":[80,142,155],"theft.":[81],"In":[82,101],"paper,":[84],"we":[85,108,173],"model":[86,139],"two":[87,106],"attacks":[89,185,209],"based":[90,113,186],"on":[91,187],"purposes,":[93],"one":[94],"for":[95,99,115],"economic":[96],"interests,":[97],"another":[98],"destruction.":[100],"order":[102],"detect":[104,181],"these":[105],"propose":[109],"load":[111],"forecasting":[112,160],"technique":[114],"real-time":[116],"detection.":[118],"Firstly,":[119],"support":[121,176],"vector":[122,177],"regression":[123],"(SVR)":[124],"is":[125,169,201,222],"exploit":[126],"forecast":[128],"load.":[130],"According":[131],"predicted":[134],"results":[135],"system":[138],"grid,":[143],"measurements":[145,161,192],"entire":[148],"be":[152,211],"calculate":[153],"by":[154,227],"flow":[156],"algorithm.":[157],"Compared":[158],"with":[159],"directly,":[162],"computation":[164],"cost":[165],"method":[168],"very":[170],"small.":[171],"Then":[172],"train":[174],"machine":[178],"(SVM)":[179],"deviation":[188],"between":[189],"deduced":[191],"true":[195],"value.":[196],"Besides,":[197],"process":[200],"considered":[203],"in":[204,213],"training":[205],"phase,":[206],"thus":[207],"captured":[212],"advance.":[214],"The":[215],"performance":[216],"our":[218],"proposed":[219],"mechanism":[221],"illustrated":[223],"through":[224],"simulation":[226],"IEEE":[228],"57-bus":[229],"test":[230],"system.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
