{"id":"https://openalex.org/W4412513556","doi":"https://doi.org/10.32604/cmc.2025.065496","title":"Detection of False Data Injection Attacks: A Protected Federated Deep Learning Based on Encryption Mechanism","display_name":"Detection of False Data Injection Attacks: A Protected Federated Deep Learning Based on Encryption Mechanism","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412513556","doi":"https://doi.org/10.32604/cmc.2025.065496"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065496","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065496","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065496","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chenxin Lin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chenxin Lin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113938167","display_name":"Qun Zhou","orcid":"https://orcid.org/0009-0007-6557-6595"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qun Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411930","display_name":"Zhan Wang","orcid":"https://orcid.org/0000-0003-4393-2118"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhan Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058789926","display_name":"Ximing Fan","orcid":"https://orcid.org/0000-0002-5085-4376"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ximing Fan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032885145","display_name":"Yaochang Xu","orcid":"https://orcid.org/0000-0003-2781-3979"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaochang Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5067322850","display_name":"Yijia Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yijia Xu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.2283,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89643378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"84","issue":"3","first_page":"5859","last_page":"5877"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.697210431098938},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6614093780517578},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6238878965377808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.521955668926239},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4155169129371643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.697210431098938},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6614093780517578},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6238878965377808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.521955668926239},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4155169129371643},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065496","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065496","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065496","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065496","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2119866123","https://openalex.org/W2324861975","https://openalex.org/W2525022545","https://openalex.org/W2768174108","https://openalex.org/W2913668118","https://openalex.org/W2944851425","https://openalex.org/W2962835126","https://openalex.org/W3044239919","https://openalex.org/W3140854437","https://openalex.org/W3144087169","https://openalex.org/W3173128495","https://openalex.org/W3212357684","https://openalex.org/W4245937226","https://openalex.org/W4281932789","https://openalex.org/W4285794683","https://openalex.org/W4294068674","https://openalex.org/W4294811472","https://openalex.org/W4308515720","https://openalex.org/W4312258479","https://openalex.org/W4366203286","https://openalex.org/W4377966802","https://openalex.org/W4386766950","https://openalex.org/W4388535601","https://openalex.org/W4391095527","https://openalex.org/W4391228722","https://openalex.org/W4400120751","https://openalex.org/W4400337301","https://openalex.org/W4401892472","https://openalex.org/W4402742257","https://openalex.org/W4402910380","https://openalex.org/W4403758710","https://openalex.org/W4404371035","https://openalex.org/W4405304317","https://openalex.org/W4406047340","https://openalex.org/W4407942121","https://openalex.org/W4408461578"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"False":[0],"Data":[1],"Injection":[2],"Attack":[3],"(FDIA),":[4],"a":[5,57,74],"disruptive":[6],"cyber":[7],"threat,":[8],"is":[9,50],"becoming":[10],"increasingly":[11],"detrimental":[12],"to":[13,28,77,89,102,134],"smart":[14],"grids":[15],"with":[16,129],"the":[17,96],"deepening":[18],"integration":[19],"of":[20],"information":[21],"technology":[22],"and":[23,34,42,94,111],"physical":[24],"power":[25],"systems,":[26],"leading":[27],"system":[29,101],"unreliability,":[30],"data":[31,79],"integrity":[32],"loss":[33],"operational":[35],"vulnerability":[36],"exposure.":[37],"Given":[38],"its":[39],"widespread":[40],"harm":[41],"impact,":[43],"conducting":[44],"in-depth":[45],"research":[46],"on":[47,108],"FDIA":[48,58],"detection":[49,59,123],"vitally":[51],"important.":[52],"This":[53],"paper":[54],"innovatively":[55],"introduces":[56],"scheme:":[60],"A":[61],"Protected":[62],"Federated":[63,69],"Deep":[64],"Learning":[65],"(ProFed),":[66],"which":[67],"leverages":[68],"Averaging":[70],"algorithm":[71],"(FedAvg)":[72],"as":[73],"foundational":[75],"framework":[76],"fortify":[78],"security,":[80],"harnesses":[81],"pre-trained":[82],"enhanced":[83],"spatial-temporal":[84],"graph":[85],"neural":[86],"networks":[87],"(STGNN)":[88],"perform":[90],"localized":[91],"model":[92],"training":[93],"integrates":[95],"Cheon-Kim-Kim-Song":[97],"(CKKS)":[98],"homomorphic":[99],"encryption":[100],"secure":[103],"sensitive":[104],"information.":[105],"Simulation":[106],"tests":[107],"IEEE":[109,112],"14-bus":[110],"118-bus":[113],"systems":[114],"demonstrate":[115],"that":[116],"our":[117],"proposed":[118],"method":[119],"outperforms":[120],"other":[121],"state-of-the-art":[122],"methods":[124],"across":[125],"all":[126],"evaluation":[127],"metrics,":[128],"peak":[130],"improvements":[131],"reaching":[132],"up":[133],"35%.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
