{"id":"https://openalex.org/W4415398343","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204629","title":"Drift-aware Unsupervised Detection of Stealthy FDIA Towards Energy Market","display_name":"Drift-aware Unsupervised Detection of Stealthy FDIA Towards Energy Market","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415398343","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204629"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.gla.ac.uk/view/author/67861.html>,","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116535266","display_name":"Ghadeer O. Alsharif","orcid":"https://orcid.org/0009-0004-9136-2775"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ghadeer O. Alsharif","raw_affiliation_strings":["University of Glasgow,School of Computing Science,UK"],"affiliations":[{"raw_affiliation_string":"University of Glasgow,School of Computing Science,UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001331936","display_name":"Christos Anagnostopoulos","orcid":"https://orcid.org/0000-0003-1517-6757"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Christos Anagnostopoulos","raw_affiliation_strings":["University of Glasgow,School of Computing Science,UK"],"affiliations":[{"raw_affiliation_string":"University of Glasgow,School of Computing Science,UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021412159","display_name":"Angelos K. Marnerides","orcid":"https://orcid.org/0000-0002-7996-6216"},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Angelos K. Marnerides","raw_affiliation_strings":["University of Cyprus,KIOS CoE,Dept. of Electrical &amp; Computer Engineering,Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Cyprus,KIOS CoE,Dept. of Electrical &amp; Computer Engineering,Cyprus","institution_ids":["https://openalex.org/I34771391"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116535266"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39414282,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11059","display_name":"Market Dynamics and Volatility","score":0.9495000243186951,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11059","display_name":"Market Dynamics and Volatility","score":0.9495000243186951,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11326","display_name":"Stock Market Forecasting Methods","score":0.9447000026702881,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6399000287055969},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5446000099182129},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5108000040054321},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.3977999985218048},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.38040000200271606},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.376800000667572},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.3698999881744385},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.3411000072956085}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6399000287055969},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5741000175476074},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5446000099182129},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5108000040054321},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4408000111579895},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.3977999985218048},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.38040000200271606},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.376800000667572},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.3698999881744385},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.336899995803833},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3319999873638153},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31360000371932983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3075999915599823},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2847999930381775},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C2780299701","wikidata":"https://www.wikidata.org/wiki/Q475000","display_name":"Stock market","level":3,"score":0.2782000005245209},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C2776849302","wikidata":"https://www.wikidata.org/wiki/Q1239166","display_name":"Energy market","level":3,"score":0.2703999876976013},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2671000063419342},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C2780021719","wikidata":"https://www.wikidata.org/wiki/Q282283","display_name":"Prediction market","level":2,"score":0.2549000084400177},{"id":"https://openalex.org/C3020493868","wikidata":"https://www.wikidata.org/wiki/Q55631277","display_name":"Real world data","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.gla.ac.uk:358325","is_oa":true,"landing_page_url":"https://eprints.gla.ac.uk/view/author/67861.html>,","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:eprints.gla.ac.uk:358325","is_oa":true,"landing_page_url":"https://eprints.gla.ac.uk/view/author/67861.html>,","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,43],"energy":[1,10,70,188],"market":[2,62],"has":[3],"undergone":[4],"significant":[5],"evolution,":[6],"driven":[7],"by":[8,73,142],"modern":[9,187],"systems.":[11],"Nonetheless,":[12],"the":[13,66,84,90,158,179],"underlying":[14],"infrastructure":[15],"remains":[16],"vulnerable":[17],"to":[18,38,52,61,83,101,113,126,144,169],"stealthy":[19,44,103],"attack":[20,122],"vectors":[21],"and":[22,78,129,153,192],"exploits,":[23],"particularly":[24],"False":[25],"Data":[26],"Injection":[27],"Attacks":[28],"(FDIAs).":[29],"Profit-oriented":[30],"FDIAs":[31],"strategically":[32],"manipulate":[33],"Locational":[34],"Marginal":[35],"Prices":[36],"(LMPs)":[37],"achieve":[39],"long-term":[40],"financial":[41],"gains.":[42],"nature":[45,68],"of":[46,69,86,121,160,181],"such":[47],"manipulations":[48],"makes":[49],"them":[50],"difficult":[51],"distinguish":[53],"from":[54],"normal":[55],"price":[56],"fluctuations,":[57],"posing":[58],"severe":[59],"threats":[60],"stability.":[63],"In":[64,124],"parallel,":[65],"dynamic":[67],"markets":[71,189],"shaped":[72],"seasonal":[74],"variations,":[75],"demand":[76],"shifts,":[77],"generation":[79],"changes":[80],"adds":[81],"complexity":[82],"detection":[85,111],"these":[87],"attacks.":[88],"Given":[89],"aforementioned":[91],"constraints,":[92],"we":[93,136,173],"introduce":[94],"a":[95,138],"novel":[96],"market-level":[97],"unsupervised":[98,183],"model":[99],"designed":[100],"detect":[102],"LMP":[104,155],"manipulations.":[105],"We":[106],"thus":[107],"leverage":[108],"non-parametric":[109],"change-point":[110],"principles":[112],"identify":[114],"anomalous":[115],"pricing":[116],"behaviors":[117],"without":[118],"prior":[119],"knowledge":[120],"patterns.":[123],"order":[125],"enhance":[127],"robustness":[128],"higher":[130],"confidence":[131],"on":[132,151],"our":[133,161,176],"anomaly":[134],"diagnosis,":[135],"propose":[137],"drift":[139],"adaptive":[140,182],"mechanism":[141],"adapting":[143],"evolving":[145],"data":[146],"distributions.":[147],"Our":[148],"extensive":[149],"experiments":[150],"synthetic":[152],"real-world":[154],"datasets,":[156],"showcase":[157],"effectiveness":[159],"approach":[162],"in":[163,185],"reducing":[164],"false":[165],"alarm":[166],"rates":[167],"compared":[168],"state-of-the-art":[170],"methods.":[171],"Hence,":[172],"justify":[174],"through":[175],"experimental":[177],"outcomes":[178],"potential":[180],"models":[184],"safeguarding":[186],"against":[190],"sophisticated":[191],"financially":[193],"motivated":[194],"cyber":[195],"threat":[196],"vectors.":[197]},"counts_by_year":[],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-22T00:00:00"}
