{"id":"https://openalex.org/W4411203668","doi":"https://doi.org/10.1109/tifs.2025.3578922","title":"Identification and Mitigation of Data Integrity Stealth Attacks in Frequency Regulation of Power Systems","display_name":"Identification and Mitigation of Data Integrity Stealth Attacks in Frequency Regulation of Power Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411203668","doi":"https://doi.org/10.1109/tifs.2025.3578922"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3578922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3578922","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://biblio.ugent.be/publication/01K0CE4YJVM101RXKDQ2MWD8KF/file/01K1TJXB4Y38F8DRJ6PVV1FB4C.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004461342","display_name":"Soroush Oshnoei","orcid":"https://orcid.org/0000-0002-5059-3065"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Soroush Oshnoei","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-5059-3065","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114920753","display_name":"Jalal Heidari","orcid":"https://orcid.org/0000-0002-2872-8904"},"institutions":[{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jalal Heidari","raw_affiliation_strings":["Department of Electromechanical, Systems and Metal Engineering, Ghent University, Ghent, Belgium"],"raw_orcid":"https://orcid.org/0000-0002-2872-8904","affiliations":[{"raw_affiliation_string":"Department of Electromechanical, Systems and Metal Engineering, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004099410","display_name":"Esmaeil Mahboubi-Moghaddam","orcid":"https://orcid.org/0000-0002-8831-7664"},"institutions":[{"id":"https://openalex.org/I4210106585","display_name":"Quchan University of Advanced Technology","ror":"https://ror.org/01bt5mj78","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210106585"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Esmaeil Mahboubi-Moghaddam","raw_affiliation_strings":["Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Quchan University of Technology, Quchan, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Quchan University of Technology, Quchan, Iran","institution_ids":["https://openalex.org/I4210106585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029664350","display_name":"Meysam Gheisarnejad","orcid":"https://orcid.org/0000-0003-1841-8053"},"institutions":[{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]},{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Meysam Gheisarnejad","raw_affiliation_strings":["Department of Ecole de Technologie Superieure, University of Quebec, Montreal, QC, Canada"],"raw_orcid":"https://orcid.org/0000-0003-1841-8053","affiliations":[{"raw_affiliation_string":"Department of Ecole de Technologie Superieure, University of Quebec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106789160","display_name":"Mohammad Hassan Khooban","orcid":"https://orcid.org/0000-0003-0223-4081"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Mohammad-Hassan Khooban","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004461342"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":7.6992,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.97490737,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"6133","last_page":"6148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9574999809265137,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.927299976348877,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7217293977737427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6796174049377441},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5144920349121094},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4732903838157654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41739600896835327}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7217293977737427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6796174049377441},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5144920349121094},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4732903838157654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41739600896835327},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2025.3578922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3578922","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:archive.ugent.be:01K0CE4YJVM101RXKDQ2MWD8KF","is_oa":true,"landing_page_url":"http://hdl.handle.net/1854/LU-01K0CE4YJVM101RXKDQ2MWD8KF","pdf_url":"https://biblio.ugent.be/publication/01K0CE4YJVM101RXKDQ2MWD8KF/file/01K1TJXB4Y38F8DRJ6PVV1FB4C.pdf","source":{"id":"https://openalex.org/S4306400478","display_name":"Ghent University Academic Bibliography (Ghent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32597200","host_organization_name":"Ghent University","host_organization_lineage":["https://openalex.org/I32597200"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 1556-6021","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/7254de5c-c7a2-4cb4-8d60-daf59f83980e","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/7254de5c-c7a2-4cb4-8d60-daf59f83980e","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oshnoei, S, Heidari, J, Mahboubi-Moghaddam, E, Gheisarnejad, M & Khooban, M H 2025, 'Identification and Mitigation of Data Integrity Stealth Attacks in Frequency Regulation of Power Systems', IEEE Transactions on Information Forensics and Security, vol. 20, pp. 6133-6148. https://doi.org/10.1109/TIFS.2025.3578922","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:archive.ugent.be:01K0CE4YJVM101RXKDQ2MWD8KF","is_oa":true,"landing_page_url":"http://hdl.handle.net/1854/LU-01K0CE4YJVM101RXKDQ2MWD8KF","pdf_url":"https://biblio.ugent.be/publication/01K0CE4YJVM101RXKDQ2MWD8KF/file/01K1TJXB4Y38F8DRJ6PVV1FB4C.pdf","source":{"id":"https://openalex.org/S4306400478","display_name":"Ghent University Academic Bibliography (Ghent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32597200","host_organization_name":"Ghent University","host_organization_lineage":["https://openalex.org/I32597200"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 1556-6021","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411203668.pdf","grobid_xml":"https://content.openalex.org/works/W4411203668.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2009498319","https://openalex.org/W2799059726","https://openalex.org/W2980418550","https://openalex.org/W3033672499","https://openalex.org/W3047473664","https://openalex.org/W3084041273","https://openalex.org/W3118456324","https://openalex.org/W3133492944","https://openalex.org/W3189765012","https://openalex.org/W3199647054","https://openalex.org/W3209921861","https://openalex.org/W4205483817","https://openalex.org/W4210337972","https://openalex.org/W4220959163","https://openalex.org/W4225630785","https://openalex.org/W4225993797","https://openalex.org/W4226330340","https://openalex.org/W4226401783","https://openalex.org/W4285207834","https://openalex.org/W4288064477","https://openalex.org/W4293198552","https://openalex.org/W4293202766","https://openalex.org/W4312263998","https://openalex.org/W4313411272","https://openalex.org/W4319068812","https://openalex.org/W4386212313","https://openalex.org/W4386320531","https://openalex.org/W4388691819","https://openalex.org/W4389161420","https://openalex.org/W4389331468","https://openalex.org/W4391454203","https://openalex.org/W4396214229","https://openalex.org/W4396982341","https://openalex.org/W4400032797","https://openalex.org/W4401717815"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Load":[0],"frequency":[1,71,231,237],"control":[2,24,49,223],"(LFC)":[3],"application":[4],"in":[5,12,146,152],"power":[6,77],"systems":[7],"has":[8],"an":[9,75,94,96],"essential":[10],"role":[11],"improving":[13],"the":[14,18,21,28,39,63,70,89,107,113,121,126,138,148,159,169,174,178,183,186,190,193,198,200,205,211,216,229,235,252,264,270],"system\u2019s":[15,64,236,265],"stability.":[16],"However,":[17],"presence":[19],"of":[20,74,88,116,177,185,192],"automatic":[22],"generation":[23],"service":[25],"incorporated":[26],"into":[27],"LFC":[29,40],"application,":[30],"being":[31],"a":[32,83,100,117,133,165],"system":[33,41,78],"dependent":[34],"on":[35,173],"communication":[36,52,127],"networks,":[37,53],"makes":[38],"susceptible":[42],"to":[43,105,189,215,233,269],"cyber":[44],"threats.":[45],"Falsifying":[46],"measurement":[47],"and":[48,99,137,209,242,261],"signals":[50],"through":[51,125],"known":[54],"as":[55,228],"data":[56],"integrity":[57],"attacks":[58],"(DIAs),":[59],"can":[60,180,256],"severely":[61],"affect":[62],"dynamic":[65,90,266],"performance.":[66],"This":[67],"paper":[68],"studies":[69],"regulation":[72],"issue":[73],"interconnected":[76],"under":[79,238,273],"stealth":[80,259],"DIAs.":[81,108],"Accordingly,":[82],"novel":[84],"identification":[85,161],"scheme":[86],"consisting":[87],"multiplicative":[91,166],"watermarking":[92,110,135],"technique,":[93],"estimator,":[95],"anomaly":[97],"detector,":[98],"trigger":[101,202],"mechanism":[102,203],"is":[103,112,140,164,225],"introduced":[104],"identify":[106,258],"The":[109,245],"concept":[111],"intentional":[114],"overlay":[115],"watermark":[118,170],"signal":[119,123,156,208,214],"onto":[120],"source":[122],"transmitted":[124,149],"network.":[128],"Achieving":[129],"this":[130],"requires":[131],"using":[132],"specific":[134],"filter,":[136],"result":[139],"that":[141,251],"operators":[142],"gain":[143],"greater":[144],"flexibility":[145],"regulating":[147],"signals,":[150],"which":[151],"turn":[153],"provides":[154],"improved":[155],"integrity.":[157],"In":[158],"proposed":[160,201],"scheme,":[162],"there":[163],"superimposition,":[167],"where":[168],"equalizing":[171],"filter":[172],"opposite":[175],"end":[176],"network":[179],"cancel":[181],"out":[182],"impact":[184],"watermarking,":[187],"leading":[188],"retrieval":[191],"original":[194],"signal.":[195],"After":[196],"identifying":[197],"attack,":[199],"blocks":[204],"manipulated":[206],"ACE":[207,213],"submits":[210],"estimated":[212],"secondary":[217,230],"controller.":[218],"A":[219],"model-free":[220],"sliding":[221],"mode":[222],"method":[224,255],"also":[226],"implemented":[227],"controller":[232],"regulate":[234],"DIAs,":[239],"load":[240],"disturbances,":[241],"physical":[243],"limitations.":[244],"Speedgoat-based":[246],"real-time":[247],"simulation":[248],"results":[249],"reveal":[250],"developed":[253],"defense":[254],"timely":[257],"DIAs":[260],"significantly":[262],"improve":[263],"responses":[267],"compared":[268],"other":[271],"techniques":[272],"these":[274],"attacks.":[275]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
