{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T09:10:30Z","timestamp":1762938630093,"version":"3.45.0"},"reference-count":27,"publisher":"Wiley","issue":"25-26","license":[{"start":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:00:00Z","timestamp":1759017600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>In open\u2010network environments, two\u2010area load frequency control (LFC) systems are exposed to potential threats from false data injection attacks (FDIAs). Conventional model\u2010based detection and control methods exhibit poor adaptability to unstructured disturbances, making it difficult to ensure system stability and robustness. To address this issue, a two\u2010tier defense mechanism is proposed, in which both the front\u2010end detection and the back\u2010end control components are designed in a model\u2010free manner. The detection module adopts recursive estimation and model\u2010free disturbance observation, while the control module employs a feedback optimal bounded error learning (FOBEL) strategy built on reinforcement learning. The detection module identifies attacks through state residual analysis and signal disturbance estimation, while the control module implements dynamic compensation using a controller that integrates fractional\u2010order structures with reinforcement learning. Compared with traditional methods, this approach demonstrates significant improvements in disturbance rejection and control accuracy. Simulation studies under two representative attack scenarios validate the superiority and effectiveness of the proposed method in terms of frequency deviation suppression, power fluctuation mitigation, and estimation accuracy.<\/jats:p>","DOI":"10.1002\/cpe.70312","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T01:07:41Z","timestamp":1759108061000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Two\u2010Tier Model\u2010Free Defense Approach Against False Data Injection Attacks in Two\u2010Area Load Frequency Control Systems"],"prefix":"10.1002","volume":"37","author":[{"given":"Weixun","family":"Li","sequence":"first","affiliation":[{"name":"State Grid Hebei Electric Power Co. Ltd.  Shijiazhuang China"}]},{"given":"Libo","family":"Yang","sequence":"additional","affiliation":[{"name":"State Grid Hebei Electric Power Co. Ltd.  Shijiazhuang China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1457-6559","authenticated-orcid":false,"given":"Huifeng","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Hebei Electric Power Research Institute  Shijiazhuang China"}]},{"given":"Feng","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shijiazhuang Electric Power Supply Company, State Grid Hebei Electric Power Co. Ltd.  Shijiazhuang China"}]},{"given":"Yajun","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Hebei Electric Power Co. Ltd.  Shijiazhuang China"}]}],"member":"311","published-online":{"date-parts":[[2025,9,28]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2025.3552639"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3178418"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20360-2_1"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/en18061479"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100665"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3534798"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2024.3354228"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3452202"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2025.3550178"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3307821"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2025.3567970"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3205176"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2024.3442923"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2024.131809"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115288"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/acs.3668"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12555\u2010022\u20100242\u20101"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2025.3549020"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2024.125251"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2025.3546173"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2024.08.077"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2023.3348775"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/en16052323"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2024.123996"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/15567036.2022.2078444"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2023.3321983"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3274646"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T09:05:45Z","timestamp":1762938345000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,28]]},"references-count":27,"journal-issue":{"issue":"25-26","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1002\/cpe.70312"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70312","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2025,9,28]]},"assertion":[{"value":"2025-05-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70312"}}