{"id":"https://openalex.org/W2796062341","doi":"https://doi.org/10.1109/tnet.2018.2823325","title":"Attack Vulnerability of Power Systems Under an Equal Load Redistribution Model","display_name":"Attack Vulnerability of Power Systems Under an Equal Load Redistribution Model","publication_year":2018,"publication_date":"2018-04-20","ids":{"openalex":"https://openalex.org/W2796062341","doi":"https://doi.org/10.1109/tnet.2018.2823325","mag":"2796062341"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2018.2823325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2018.2823325","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1804.01351","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032432450","display_name":"Talha Cihad G\u00fclc\u00fc","orcid":"https://orcid.org/0000-0002-8841-8617"},"institutions":[{"id":"https://openalex.org/I198068145","display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","ror":"https://ror.org/04w9kkr77","country_code":"TR","type":"government","lineage":["https://openalex.org/I198068145"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Talha Cihad Gulcu","raw_affiliation_strings":["TUBITAK Software Technologies Research Institute, Ankara, Turkey"],"raw_orcid":"https://orcid.org/0000-0002-8841-8617","affiliations":[{"raw_affiliation_string":"TUBITAK Software Technologies Research Institute, Ankara, Turkey","institution_ids":["https://openalex.org/I198068145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054031027","display_name":"Vaggos Chatziafratis","orcid":"https://orcid.org/0000-0002-4475-4504"},"institutions":[{"id":"https://openalex.org/I1743320","display_name":"Palo Alto University","ror":"https://ror.org/04f812k67","country_code":"US","type":"education","lineage":["https://openalex.org/I1743320"]},{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vaggos Chatziafratis","raw_affiliation_strings":["Computer Science Department, Stanford University, Palo Alto, CA, USA"],"raw_orcid":"https://orcid.org/0000-0002-4475-4504","affiliations":[{"raw_affiliation_string":"Computer Science Department, Stanford University, Palo Alto, CA, USA","institution_ids":["https://openalex.org/I1743320","https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038329766","display_name":"Yingrui Zhang","orcid":"https://orcid.org/0000-0002-6350-5132"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingrui Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"],"raw_orcid":"https://orcid.org/0000-0002-6350-5132","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064066193","display_name":"Osman Ya\u011fan","orcid":"https://orcid.org/0000-0002-7057-2966"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Osman Yagan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"],"raw_orcid":"https://orcid.org/0000-0002-7057-2966","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032432450"],"corresponding_institution_ids":["https://openalex.org/I198068145"],"apc_list":null,"apc_paid":null,"fwci":1.5633,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.84744071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"26","issue":"3","first_page":"1306","last_page":"1319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redistribution","display_name":"Redistribution (election)","score":0.8549317121505737},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.613295316696167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4039709270000458},{"id":"https://openalex.org/keywords/environmental-science","display_name":"Environmental science","score":0.3664788007736206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28201115131378174},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.187816321849823}],"concepts":[{"id":"https://openalex.org/C74080474","wikidata":"https://www.wikidata.org/wiki/Q7305975","display_name":"Redistribution (election)","level":3,"score":0.8549317121505737},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.613295316696167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4039709270000458},{"id":"https://openalex.org/C39432304","wikidata":"https://www.wikidata.org/wiki/Q188847","display_name":"Environmental science","level":0,"score":0.3664788007736206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28201115131378174},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.187816321849823},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnet.2018.2823325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2018.2823325","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1804.01351","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.01351","pdf_url":"https://arxiv.org/pdf/1804.01351","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1804.01351","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.01351","pdf_url":"https://arxiv.org/pdf/1804.01351","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3930880895","display_name":null,"funder_award_id":"CCF 1422165","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"}],"funders":[{"id":"https://openalex.org/F4320312422","display_name":"Persistent Systems","ror":"https://ror.org/03pekdw43"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1968164782","https://openalex.org/W1969382049","https://openalex.org/W1983940960","https://openalex.org/W1990144930","https://openalex.org/W2010478496","https://openalex.org/W2010912338","https://openalex.org/W2027367074","https://openalex.org/W2028823879","https://openalex.org/W2032107708","https://openalex.org/W2061820396","https://openalex.org/W2068385014","https://openalex.org/W2068899084","https://openalex.org/W2076206580","https://openalex.org/W2080731084","https://openalex.org/W2082183509","https://openalex.org/W2083420849","https://openalex.org/W2088621938","https://openalex.org/W2098619215","https://openalex.org/W2102341323","https://openalex.org/W2102428370","https://openalex.org/W2106034715","https://openalex.org/W2106253517","https://openalex.org/W2106433410","https://openalex.org/W2111416445","https://openalex.org/W2112949599","https://openalex.org/W2114696370","https://openalex.org/W2129352817","https://openalex.org/W2168283238","https://openalex.org/W2169338999","https://openalex.org/W2283085788","https://openalex.org/W2602111229","https://openalex.org/W2751864168","https://openalex.org/W2769051030","https://openalex.org/W3099285864","https://openalex.org/W3102413836","https://openalex.org/W4232212779"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2080866340","https://openalex.org/W2390279801","https://openalex.org/W2519031001","https://openalex.org/W2002725676","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W3125527999"],"abstract_inverted_index":{"This":[0,120],"paper":[1],"studies":[2],"the":[3,62,66,93,98,108,114,125,130,165,171,177,180,198,203],"vulnerability":[4,128],"of":[5,25,81,96,110,129,150,179,223],"flow":[6,68],"networks":[7],"against":[8],"adversarial":[9],"attacks.":[10],"In":[11],"particular,":[12],"consider":[13,159],"a":[14,21,160,220],"power":[15],"system":[16,19,131],"(or,":[17],"any":[18],"carrying":[20],"physical":[22],"flow)":[23],"consisting":[24],"N":[26],"transmission":[27],"lines":[28,83,101,112],"with":[29],"initial":[30,181],"loads":[31],"L":[32,41],"<sub":[33,42,48,57],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[34,43,49,58],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[35,50],",":[36,40,51,55,60],".":[37,38,39,52,53,54],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</sub>":[44,59],"and":[45,184,205],"capacities":[46],"C":[47,56,64],"respectively;":[61],"capacity":[63],"defines":[65],"maximum":[67],"allowed":[69],"on":[70],"line":[71],"i.":[72],"Under":[73],"an":[74],"equal":[75],"load":[76,80,173],"redistribution":[77],"model,":[78],"where":[79,164],"failed":[82],"is":[84,121,167,189],"redistributed":[85],"equally":[86],"among":[87],"all":[88],"remaining":[89],"lines,":[90],"we":[91,192,211],"study":[92],"optimization":[94,162],"problem":[95,163,188],"finding":[97],"best":[99],"k":[100],"to":[102,106,123,135,176],"attack":[103,127,144,182,199],"so":[104],"as":[105,132,134],"minimize":[107],"number":[109],"alive":[111],"at":[113],"steady-state":[115],"(i.e.,":[116],"when":[117],"cascades":[118],"stop).":[119],"done":[122],"reveal":[124,136],"worst-case":[126],"well":[133],"its":[137],"most":[138],"vulnerable":[139],"lines.":[140],"We":[141,157],"derive":[142],"optimal":[143],"strategies":[145],"in":[146],"several":[147],"special":[148],"cases":[149],"load-capacity":[151],"distributions":[152],"that":[153,186,213],"are":[154],"practically":[155],"relevant.":[156],"then":[158],"modified":[161,206],"adversary":[166],"also":[168],"constrained":[169],"by":[170],"total":[172],"(in":[174],"addition":[175],"number)":[178],"set,":[183],"prove":[185],"this":[187],"NP-hard.":[190],"Finally,":[191],"develop":[193],"heuristic":[194],"algorithms":[195,218],"for":[196,201],"selecting":[197],"set":[200],"both":[202],"original":[204],"problems.":[207],"Through":[208],"extensive":[209],"simulations,":[210],"show":[212],"these":[214],"heuristics":[215],"outperform":[216],"benchmark":[217],"under":[219],"wide":[221],"range":[222],"settings.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2018-04-13T00:00:00"}
