{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:00:35Z","timestamp":1767319235700,"version":"3.48.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105530","type":"print"},{"value":"9783032105547","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10554-7_15","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:58:21Z","timestamp":1767319101000},"page":"275-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AI Robust Anomaly Localization for\u00a0DC Microgrid Using Adversarial Autoencoder"],"prefix":"10.1007","author":[{"given":"Jieqi","family":"Rong","sequence":"first","affiliation":[]},{"given":"Weirong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lisen","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/TII.2018.2881540","volume":"15","author":"MN Alam","year":"2019","unstructured":"Alam, M.N., Chakrabarti, S., Ghosh, A.: Networked microgrids: state-of-the-art and future perspectives. IEEE Trans. Industr. Inf. 15(3), 1238\u20131250 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"7","key":"15_CR2","doi-asserted-by":"publisher","first-page":"7574","DOI":"10.1109\/TPEL.2019.2957071","volume":"35","author":"S Sahoo","year":"2020","unstructured":"Sahoo, S., Peng, J.C.-H., Mishra, S., Dragicevic, T.: Distributed screening of hijacking attacks in DC microgrids. IEEE Trans. Power Electron. 35(7), 7574\u20137582 (2020)","journal-title":"IEEE Trans. Power Electron."},{"issue":"5","key":"15_CR3","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/TSG.2015.2432013","volume":"6","author":"R Liu","year":"2015","unstructured":"Liu, R., Vellaithurai, C., Biswas, S.S., Gamage, T.T., Srivastava, A.K.: Analyzing the cyber-physical impact of cyber events on the power grid. IEEE Trans. Smart Grid 6(5), 2444\u20132453 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Doroudi, R., Lavassani, S. H. H., Shahrouzi, M.: Optimal tuning of three deep learning methods with signal processing and anomaly detection for multi-class damage detection of a large-scale bridge. Structural Health Monitoring, no. 14759217231216694 (2024)","DOI":"10.1177\/14759217231216694"},{"issue":"10","key":"15_CR5","doi-asserted-by":"publisher","first-page":"4348","DOI":"10.1109\/TAC.2019.2956021","volume":"65","author":"P Cheng","year":"2019","unstructured":"Cheng, P., et al.: An event-based stealthy attack on remote state estimation. IEEE Trans. Autom. Control 65(10), 4348\u20134355 (2019)","journal-title":"IEEE Trans. Autom. Control"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s13349-020-00435-y","volume":"11","author":"R Kromanis","year":"2021","unstructured":"Kromanis, R., Kripakaran, P.: Performance of signal processing techniques for anomaly detection using a temperature-based measurement interpretation approach. J. Civ. Struct. Heal. Monit. 11, 15\u201334 (2021)","journal-title":"J. Civ. Struct. Heal. Monit."},{"issue":"8","key":"15_CR7","doi-asserted-by":"publisher","first-page":"9637","DOI":"10.1109\/TPEL.2021.3055215","volume":"36","author":"J Zhang","year":"2021","unstructured":"Zhang, J., et al.: Mitigating concurrent false data injection attacks in cooperative DC microgrids. IEEE Trans. Power Electron. 36(8), 9637\u20139647 (2021)","journal-title":"IEEE Trans. Power Electron."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Tirulo, A., Chauhan, S., Issac, B.: Ensemble LOF-based detection of false data injection in smart grid demand response system. Comput. Electr. Eng. vol. 116, no. 109188 (2024)","DOI":"10.1016\/j.compeleceng.2024.109188"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Gallo, A. J., et al.: Distributed cyber-attack detection in the secondary control of DC microgrids. In: 2018 European Control Conference (ECC), IEEE, pp. 344-349 (2018)","DOI":"10.23919\/ECC.2018.8550549"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Mavikumbure, H. S., et al.: Cy-Phy ADS: cyber physical anomaly detection framework for EV charging systems. IEEE Trans. Transp. Electr. (2024)","DOI":"10.1109\/TTE.2024.3363672"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Guan. Q., et al.: Exploiting the potential anomaly detection in automobile safety data with multi-type neural network. International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. Cham: Springer Nature Switzerland: 489-501 (2023)","DOI":"10.1007\/978-3-031-63989-0_26"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Lafleni, S. P., Sumbwanyambe, M., Hlalel, T. S.: Multi-class fault analysis using quadratic svm classifier fault detection technique for micro-grid. In: 2024 32nd Southern African Universities Power Engineering Conference (SAUPEC), IEEE, pp. 1-6 (2024)","DOI":"10.1109\/SAUPEC60914.2024.10445052"},{"issue":"4","key":"15_CR13","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIT.2018.2866257","volume":"65","author":"B Huang","year":"2019","unstructured":"Huang, B., Cohen, K., Zhao, Q.: Active anomaly detection in heterogeneous processes. IEEE Trans. Inf. Theory 65(4), 2284\u20132301 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TSP.2022.3159388","volume":"70","author":"B Huang","year":"2022","unstructured":"Huang, B., Salgia, S., Zhao, Q.: Disagreement-based active learning in online settings. IEEE Trans. Signal Process. 70, 1947\u20131958 (2022)","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"6097","DOI":"10.1109\/JSYST.2022.3183140","volume":"16","author":"A Takiddin","year":"2022","unstructured":"Takiddin, A., et al.: Data-driven detection of stealth cyber-attacks in DC microgrids. IEEE Syst. J. 16(4), 6097\u20136106 (2022)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"4106","DOI":"10.1109\/JSYST.2021.3136683","volume":"16","author":"A Takiddin","year":"2022","unstructured":"Takiddin, A., et al.: Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids. IEEE Syst. J. 16(3), 4106\u20134117 (2022)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/TNNLS.2018.2852738","volume":"30","author":"A Creswell","year":"2018","unstructured":"Creswell, A., Bharath, A.A.: Denoising adversarial autoencoders. IEEE Trans. Neural Netw. Learn. Syst. 30(4), 968\u2013984 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"15_CR18","unstructured":"Ghojogh. B., et al.: Generative adversarial networks and adversarial autoencoders: tutorial and survey[J]. arXiv preprint arXiv:2111.13282 (2021)"},{"key":"15_CR19","unstructured":"Pidhorskyi, S., Almohsen, R., Doretto, G.: Generative probabilistic novelty detection with adversarial autoencoders. Adv. Neural Inf. Proc. Syst. vol. 31 (2018)"},{"key":"15_CR20","unstructured":"Di Mattia. F., et al.: A survey on GANs for anomaly detection[J]. arXiv preprint arXiv:1906.11632 (2019)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Yu. Z., et al.: RADEAN: a resource allocation model based on deep reinforcement learning and generative adversarial networks in edge computing. International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. Cham: Springer Nature Switzerland, 2023: 257-277","DOI":"10.1007\/978-3-031-63989-0_13"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10554-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:58:23Z","timestamp":1767319103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10554-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105530","9783032105547"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10554-7_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}