{"id":"https://openalex.org/W4416513184","doi":"https://doi.org/10.1109/tcyb.2025.3632113","title":"Learning to Match Prototype for Few-Shot Classification of Attacks and Faults in Smart Grids","display_name":"Learning to Match Prototype for Few-Shot Classification of Attacks and Faults in Smart Grids","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416513184","doi":"https://doi.org/10.1109/tcyb.2025.3632113","pmid":"https://pubmed.ncbi.nlm.nih.gov/41269843"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2025.3632113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3632113","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048527206","display_name":"Kaiyao Miao","orcid":"https://orcid.org/0000-0001-8579-1750"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiyao Miao","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103052743","display_name":"Meng Zhang","orcid":"https://orcid.org/0000-0002-6498-6951"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100664324","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-3591-4238"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]},{"id":"https://openalex.org/I4392738113","display_name":"China Electric Power Research Institute","ror":"https://ror.org/05ehpzy81","country_code":null,"type":"facility","lineage":["https://openalex.org/I17442442","https://openalex.org/I4392738113"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["China Electric Power Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Electric Power Research Institute, Beijing, China","institution_ids":["https://openalex.org/I153473198","https://openalex.org/I4392738113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064768159","display_name":"Y. Li","orcid":"https://orcid.org/0000-0002-4604-0468"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuanzhi Li","raw_affiliation_strings":["State Grid Anhui Electric Power Research Institute, Hefei, China"],"affiliations":[{"raw_affiliation_string":"State Grid Anhui Electric Power Research Institute, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103016801","display_name":"Zhan Xiong","orcid":"https://orcid.org/0000-0001-7793-5662"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Zhan","raw_affiliation_strings":["State Grid Corporation of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Grid Corporation of China, Beijing, China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048527206"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47065859,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"56","issue":"2","first_page":"1131","last_page":"1140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.006099999882280827,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.517799973487854},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.49889999628067017},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.48260000348091125},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47600001096725464},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4302000105381012},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.40950000286102295},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4090000092983246},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.40139999985694885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073000073432922},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.557699978351593},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.517799973487854},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47600001096725464},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4659999907016754},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4090000092983246},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.40139999985694885},{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34459999203681946},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.34439998865127563},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.3197999894618988},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C3309286","wikidata":"https://www.wikidata.org/wiki/Q4907693","display_name":"Bilevel optimization","level":3,"score":0.29589998722076416},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.2565000057220459}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcyb.2025.3632113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2025.3632113","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:41269843","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41269843","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1977555035","https://openalex.org/W2786918196","https://openalex.org/W2791629522","https://openalex.org/W2906103050","https://openalex.org/W3003436024","https://openalex.org/W3044239919","https://openalex.org/W3120795858","https://openalex.org/W3129701133","https://openalex.org/W4205277845","https://openalex.org/W4285116599","https://openalex.org/W4291653176","https://openalex.org/W4312559803","https://openalex.org/W4312862955","https://openalex.org/W4312910489","https://openalex.org/W4313174820","https://openalex.org/W4313378981","https://openalex.org/W4320005739","https://openalex.org/W4386083137","https://openalex.org/W4387299784","https://openalex.org/W4387623752","https://openalex.org/W4389383434","https://openalex.org/W4390482210","https://openalex.org/W4392902508","https://openalex.org/W4394862604","https://openalex.org/W4396613334","https://openalex.org/W4400679044","https://openalex.org/W4400728137","https://openalex.org/W4402557630","https://openalex.org/W4403183251","https://openalex.org/W4405270678","https://openalex.org/W4407468113","https://openalex.org/W4409763102","https://openalex.org/W4409796758","https://openalex.org/W4410949846","https://openalex.org/W4410949995","https://openalex.org/W4412129356"],"related_works":[],"abstract_inverted_index":{"The":[0,46],"rapid":[1],"deployment":[2],"of":[3,10,24,33,48,104,172],"advanced":[4],"metering":[5],"infrastructure":[6],"facilitates":[7],"the":[8,71,125,141],"development":[9],"data-driven":[11,54],"attack":[12,150],"detection":[13,64],"methods":[14,55],"in":[15,196],"smart":[16,179],"grids,":[17],"which":[18,102],"typically":[19],"rely":[20],"on":[21,178],"large":[22],"amounts":[23],"labeled":[25,117],"data":[26],"for":[27,53,133],"training.":[28],"However,":[29],"when":[30],"new":[31],"types":[32,153],"attacks":[34],"or":[35],"faults":[36],"emerge,":[37],"security":[38],"analysts":[39],"may":[40],"only":[41,155],"intercept":[42],"limited":[43,79],"malicious":[44],"samples.":[45],"scarcity":[47],"samples":[49,80,86,130,158],"makes":[50],"it":[51],"difficult":[52],"to":[56,62,83,98,139,146,148,168],"learn":[57],"effective":[58],"decision":[59],"boundaries,":[60],"leading":[61],"degraded":[63],"performance.":[65],"In":[66],"this":[67],"work,":[68],"we":[69,91,162],"bridge":[70],"gap":[72],"by":[73,113],"learning":[74,82,190],"class":[75],"prototype":[76,111],"representations":[77,112],"from":[78,116],"and":[81,119,131,151,192],"match":[84],"unlabeled":[85,129],"with":[87,154],"corresponding":[88],"prototypes.":[89],"Specifically,":[90],"propose":[92],"a":[93,105,120,156,164],"meta-learning-based":[94],"framework":[95],"termed":[96],"Learning":[97],"Match":[99],"Prototype":[100],"(L2MP),":[101],"consists":[103],"prototypical":[106],"network":[107,122],"(ProtoNet)":[108],"that":[109,123,183],"learns":[110,145],"aggregating":[114],"features":[115],"samples,":[118],"matching":[121,126],"assesses":[124],"degree":[127],"between":[128],"prototypes":[132],"classification.":[134],"Through":[135],"episodic":[136],"training":[137,171],"designed":[138],"simulate":[140],"few-shot":[142],"setting,":[143],"L2MP":[144,184],"adapt":[147],"novel":[149],"fault":[152],"few":[157],"per":[159],"class.":[160],"Moreover,":[161],"utilize":[163],"bilevel":[165],"optimization":[166],"strategy":[167],"ensure":[169],"efficient":[170],"both":[173],"networks.":[174],"Extensive":[175],"case":[176],"studies":[177],"grid":[180],"datasets":[181],"demonstrate":[182],"achieves":[185],"robust":[186],"performance":[187],"under":[188],"harsh":[189],"conditions":[191],"has":[193],"practical":[194],"utility":[195],"real-world":[197],"scenarios.":[198]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
