{"id":"https://openalex.org/W7118382494","doi":"https://doi.org/10.48550/arxiv.2601.00873","title":"Quantum Machine Learning Approaches for Coordinated Stealth Attack Detection in Distributed Generation Systems","display_name":"Quantum Machine Learning Approaches for Coordinated Stealth Attack Detection in Distributed Generation Systems","publication_year":2025,"publication_date":"2025-12-30","ids":{"openalex":"https://openalex.org/W7118382494","doi":"https://doi.org/10.48550/arxiv.2601.00873"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00873","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117639383","display_name":"Osasumwen Cedric Ogiesoba-Eguakun","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ogiesoba-Eguakun, Osasumwen Cedric","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122112551","display_name":"Suman Rath","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rath, Suman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5117639383"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.7264999747276306,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.7264999747276306,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.01759999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.6480000019073486},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6223999857902527},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5447999835014343},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.45080000162124634},{"id":"https://openalex.org/keywords/quantum-machine-learning","display_name":"Quantum machine learning","score":0.4415999948978424},{"id":"https://openalex.org/keywords/quantum-system","display_name":"Quantum system","score":0.4009999930858612},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.37389999628067017},{"id":"https://openalex.org/keywords/quantum-algorithm","display_name":"Quantum algorithm","score":0.36309999227523804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6668999791145325},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.6480000019073486},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6223999857902527},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5447999835014343},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5056999921798706},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.45080000162124634},{"id":"https://openalex.org/C2779094486","wikidata":"https://www.wikidata.org/wiki/Q18811578","display_name":"Quantum machine learning","level":4,"score":0.4415999948978424},{"id":"https://openalex.org/C2778926657","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum system","level":3,"score":0.4009999930858612},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C137019171","wikidata":"https://www.wikidata.org/wiki/Q2623817","display_name":"Quantum algorithm","level":3,"score":0.36309999227523804},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36079999804496765},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.3601999878883362},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.3427000045776367},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3418000042438507},{"id":"https://openalex.org/C15706264","wikidata":"https://www.wikidata.org/wiki/Q230883","display_name":"Quantum state","level":3,"score":0.34139999747276306},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Coordinated":[0],"stealth":[1,45],"attacks":[2,46],"are":[3],"a":[4,48,53,62,104,114,131,140],"serious":[5],"cybersecurity":[6],"threat":[7],"to":[8,22,28,60,77,151],"distributed":[9,49],"generation":[10,50],"systems":[11],"because":[12],"they":[13],"modify":[14],"control":[15],"and":[16,81,93,136,154,167],"measurement":[17],"signals":[18],"while":[19],"remaining":[20],"close":[21],"normal":[23],"behavior,":[24],"making":[25],"them":[26],"difficult":[27],"detect":[29],"using":[30,67],"standard":[31],"intrusion":[32,175],"detection":[33,176],"methods.":[34],"This":[35],"study":[36],"investigates":[37],"quantum":[38,90,95,106,110,146,170,180],"machine":[39,86,119],"learning":[40,87,181],"approaches":[41],"for":[42],"detecting":[43],"coordinated":[44],"on":[47,125],"unit":[51],"in":[52,134],"microgrid.":[54],"High-quality":[55],"simulated":[56],"measurements":[57],"were":[58,98],"used":[59],"create":[61],"balanced":[63],"binary":[64],"classification":[65],"dataset":[66],"three":[68],"features:":[69],"reactive":[70],"power":[71],"at":[72],"DG1,":[73],"frequency":[74],"deviation":[75],"relative":[76],"the":[78,121],"nominal":[79],"value,":[80],"terminal":[82],"voltage":[83],"magnitude.":[84],"Classical":[85],"baselines,":[88],"fully":[89,179],"variational":[91],"classifiers,":[92],"hybrid":[94,105,162],"classical":[96,107,115,142],"models":[97,147,163],"evaluated.":[99],"The":[100],"results":[101],"show":[102],"that":[103,169],"model":[108],"combining":[109],"feature":[111,171],"embeddings":[112],"with":[113,130],"RBF":[116],"support":[117],"vector":[118],"achieves":[120],"best":[122],"overall":[123],"performance":[124],"this":[126],"low":[127],"dimensional":[128],"dataset,":[129],"modest":[132],"improvement":[133],"accuracy":[135],"F1":[137],"score":[138],"over":[139],"strong":[141],"SVM":[143],"baseline.":[144],"Fully":[145],"perform":[148],"worse":[149],"due":[150],"training":[152],"instability":[153],"limitations":[155],"of":[156],"current":[157],"NISQ":[158],"hardware.":[159],"In":[160],"contrast,":[161],"train":[164],"more":[165],"reliably":[166],"demonstrate":[168],"mapping":[172],"can":[173],"enhance":[174],"even":[177],"when":[178],"is":[182],"not":[183],"yet":[184],"practical.":[185]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
