{"id":"https://openalex.org/W7092181958","doi":"https://doi.org/10.1109/tsg.2025.3622228","title":"Robust Demand-Side Resource Management Scheme Against State-Altering Attacks","display_name":"Robust Demand-Side Resource Management Scheme Against State-Altering Attacks","publication_year":2025,"publication_date":"2025-10-16","ids":{"openalex":"https://openalex.org/W7092181958","doi":"https://doi.org/10.1109/tsg.2025.3622228"},"language":null,"primary_location":{"id":"doi:10.1109/tsg.2025.3622228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2025.3622228","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yimeng Sun","orcid":"https://orcid.org/0000-0001-9790-6439"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yimeng Sun","raw_affiliation_strings":["State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-9790-6439","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiayao Chen","orcid":"https://orcid.org/0000-0001-8621-0022"},"institutions":[{"id":"https://openalex.org/I4210126065","display_name":"Shanghai Electric (China)","ror":"https://ror.org/0314qy595","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210126065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayao Chen","raw_affiliation_strings":["State Grid Zhejiang Electric Power Company Ltd., Taizhou Power Supply Company, Taizhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8621-0022","affiliations":[{"raw_affiliation_string":"State Grid Zhejiang Electric Power Company Ltd., Taizhou Power Supply Company, Taizhou, China","institution_ids":["https://openalex.org/I4210126065"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhaohao Ding","orcid":"https://orcid.org/0000-0002-7085-260X"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaohao Ding","raw_affiliation_strings":["State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-7085-260X","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mingyang Sun","orcid":"https://orcid.org/0000-0002-5790-5025"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyang Sun","raw_affiliation_strings":["Peking University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5790-5025","affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I153473198"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66541999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"1","first_page":"666","last_page":"677"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10785","display_name":"Economic Theory and Institutions","score":0.04320000112056732,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10785","display_name":"Economic Theory and Institutions","score":0.04320000112056732,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12231","display_name":"Contemporary Sociological Theory and Practice","score":0.022099999710917473,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11895","display_name":"Social and Cultural Dynamics","score":0.01850000023841858,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7946000099182129},{"id":"https://openalex.org/keywords/smoothing","display_name":"Smoothing","score":0.6593000292778015},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5566999912261963},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.553600013256073},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5358999967575073},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.47679999470710754},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.46639999747276306},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3824999928474426}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7946000099182129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7175999879837036},{"id":"https://openalex.org/C3770464","wikidata":"https://www.wikidata.org/wiki/Q775963","display_name":"Smoothing","level":2,"score":0.6593000292778015},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5566999912261963},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.553600013256073},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5358999967575073},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.47679999470710754},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.46639999747276306},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41040000319480896},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C31531917","wikidata":"https://www.wikidata.org/wiki/Q915157","display_name":"Robust control","level":3,"score":0.3653999865055084},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.36469998955726624},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.33180001378059387},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C17098449","wikidata":"https://www.wikidata.org/wiki/Q176814","display_name":"Partially observable Markov decision process","level":4,"score":0.3025999963283539},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2840999960899353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28369998931884766},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2655999958515167},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26330000162124634},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.25619998574256897},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsg.2025.3622228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2025.3622228","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4690753304","display_name":null,"funder_award_id":"2023YFE0119800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7319110271","display_name":null,"funder_award_id":"52277095","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1542941925","https://openalex.org/W2010161926","https://openalex.org/W2014381275","https://openalex.org/W2162783010","https://openalex.org/W2324338818","https://openalex.org/W2619800344","https://openalex.org/W2793153958","https://openalex.org/W2962755762","https://openalex.org/W3037631072","https://openalex.org/W3088811657","https://openalex.org/W3093806473","https://openalex.org/W3135527034","https://openalex.org/W3135537813","https://openalex.org/W3170196437","https://openalex.org/W3196624513","https://openalex.org/W3200885897","https://openalex.org/W3206784639","https://openalex.org/W4225127185","https://openalex.org/W4285213529","https://openalex.org/W4285222966","https://openalex.org/W4288679739","https://openalex.org/W4289792178","https://openalex.org/W4291653176","https://openalex.org/W4297095258","https://openalex.org/W4379382292","https://openalex.org/W4381786264","https://openalex.org/W4387665626","https://openalex.org/W4396909923","https://openalex.org/W4400768335","https://openalex.org/W4402450660","https://openalex.org/W4402509373","https://openalex.org/W4403636055","https://openalex.org/W4404579522","https://openalex.org/W4409572491","https://openalex.org/W4413156238"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"reinforcement":[1,82],"learning":[2,83],"(DRL)":[3],"has":[4],"become":[5],"a":[6,78,110,118,138,147],"promising":[7],"approach":[8],"for":[9,22,142],"sequential":[10],"decision-making":[11,29],"in":[12,55],"large-scale,":[13],"complex,":[14],"and":[15,49,62,104,132,157],"dynamic":[16,133],"environments,":[17],"offering":[18],"an":[19],"effective":[20],"solution":[21],"demand-side":[23],"resource":[24],"(DSR)":[25],"control.":[26],"However,":[27],"the":[28,37,87,99,105,143,160,164],"process":[30,101],"of":[31,39,89,150,166],"DRL":[32],"is":[33,53],"highly":[34],"dependent":[35],"on":[36,64],"accuracy":[38],"its":[40],"input":[41],"data,":[42],"making":[43],"it":[44],"vulnerable":[45],"to":[46,69,85,126],"data":[47],"manipulation":[48],"perturbations.":[50],"This":[51],"vulnerability":[52],"exacerbated":[54],"DSR":[56,90,106,168],"systems,":[57],"where":[58],"large-scale":[59],"distributed":[60],"deployment":[61],"reliance":[63],"communication":[65],"networks":[66],"expose":[67],"them":[68],"widespread":[70],"cybersecurity":[71],"threats.":[72],"In":[73],"this":[74],"paper,":[75],"we":[76,97,116,136],"propose":[77],"robust":[79,119],"smoothing":[80,125],"adversarial":[81,120],"algorithm":[84,145],"enhance":[86,127],"robustness":[88,140,165],"control":[91,107,169],"systems":[92,170],"under":[93,171],"malicious":[94],"attacks.":[95,134,173],"First,":[96],"model":[98],"interaction":[100],"between":[102],"attackers":[103],"center":[108],"as":[109],"partially":[111],"observable":[112],"Markov":[113],"game.":[114],"Then,":[115],"develop":[117],"training":[121],"framework,":[122],"incorporating":[123],"randomized":[124],"defense":[128],"capability":[129],"against":[130],"unknown":[131],"Furthermore,":[135],"provide":[137],"theoretical":[139],"guarantee":[141],"proposed":[144,161],"across":[146],"wide":[148],"range":[149],"attack":[151],"scenarios.":[152],"Finally,":[153],"comparison":[154],"studies":[155],"illustrate":[156],"verify":[158],"that":[159],"scheme":[162],"enhances":[163],"DRL-based":[167],"state-altering":[172]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-17T00:00:00"}
