{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T16:59:38Z","timestamp":1763830778260},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T00:00:00Z","timestamp":1484697600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61502347"],"award-info":[{"award-number":["61502347"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10115-016-1019-8","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T03:20:57Z","timestamp":1484709657000},"page":"815-834","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["False data separation for data security in smart grids"],"prefix":"10.1007","volume":"52","author":[{"given":"Hao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Qian","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhenguang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongpeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,18]]},"reference":[{"key":"1019_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","volume-title":"Power system state estimation: theory and implementation","author":"A Abur","year":"2004","unstructured":"Abur A, Exposito A\u00a0G (2004) Power system state estimation: theory and implementation. Marcel Dekker Inc., New York"},{"issue":"3","key":"1019_CR2","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TSG.2013.2294966","volume":"5","author":"S Bi","year":"2014","unstructured":"Bi S, Zhang YJ (2014) Graphical methods for defense against false-data injection attacks on power system state estimation. IEEE Trans Smart Grid 5(3):1216\u20131227","journal-title":"IEEE Trans Smart Grid"},{"key":"1019_CR3","unstructured":"Bobba RB, Rogers KM, Wang Q, Khurana H, Nahrstedt K, Overbye, TJ(2010) Detecting false data injection attacks on dc state estimation. In: Preprints of the First Workshop on Secure Control Systems (SCS\u201910), CPSWEEK\u201910"},{"issue":"1","key":"1019_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000016","volume":"3","author":"S Boyd","year":"2011","unstructured":"Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1\u2013122","journal-title":"Found Trends Mach Learn"},{"issue":"3","key":"1019_CR5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1970392.1970395","volume":"58","author":"EJ Cand\u00e8s","year":"2011","unstructured":"Cand\u00e8s EJ, Li X, Ma Y, Wright J (2011) Robust principal component analysis? J ACM 58(3):11","journal-title":"J ACM"},{"issue":"4","key":"1019_CR6","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1109\/TPWRS.2009.2030385","volume":"24","author":"E Caro","year":"2009","unstructured":"Caro E, Conejo AJ, Minguez R (2009) Power system state estimation considering measurement dependencies. IEEE Trans Power Syst 24(4):1875\u20131885","journal-title":"IEEE Trans Power Syst"},{"key":"1019_CR7","doi-asserted-by":"crossref","unstructured":"Ganeshy A, Wright J, Li X, Candes EJ, Ma Y (2010) Dense error correction for low-rank matrices via principal component pursuit. In: Proceedings of the 2010 IEEE International Symposium on Information Theory (ISIT\u201910), pp. 1513\u20131517","DOI":"10.1109\/ISIT.2010.5513538"},{"issue":"7","key":"1019_CR8","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1109\/LSP.2009.2018223","volume":"16","author":"JP Haldar","year":"2009","unstructured":"Haldar JP, Hernando D (2009) Rank-constrained solutions to linear matrix equations using powerfactorization. IEEE Signal Process Lett 16(7):584\u2013587","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"1019_CR9","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1109\/TSG.2011.2119336","volume":"2","author":"TT Kim","year":"2011","unstructured":"Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326\u2013333","journal-title":"IEEE Trans Smart Grid"},{"key":"1019_CR10","unstructured":"Kosut O, Jia L, Thomas RJ, Tong L (2010) On malicious data attacks on power system state estimation. In: Proceedings of the 45th International Universities Power Engineering Conference (UPEC\u201910), pp. 1\u20136"},{"key":"1019_CR11","volume-title":"Stochastic approximation and recursive algorithms and applications","author":"HJ Kushner","year":"2003","unstructured":"Kushner HJ, Yin GG (2003) Stochastic approximation and recursive algorithms and applications, vol 35. Springer, Berlin"},{"issue":"1","key":"1019_CR12","first-page":"21","volume":"14","author":"Y Liu","year":"2010","unstructured":"Liu Y, Ning P, Reiter MK (2010) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):21\u201332","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"2","key":"1019_CR13","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSG.2013.2284438","volume":"5","author":"L Liu","year":"2014","unstructured":"Liu L, Esmalifalak M, Ding Q, Emesih VE, Han Z (2014) Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans Smart Grid 5(2):612\u2013621","journal-title":"IEEE Trans Smart Grid"},{"issue":"5","key":"1019_CR14","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1049\/iet-gtd.2009.0639","volume":"4","author":"JM Morales","year":"2010","unstructured":"Morales JM, Baringo L, Conejo AJ, M\u00ednguez R (2010) Probabilistic power flow with correlated wind sources. IET Gener Transm Distrib 4(5):641\u2013651","journal-title":"IET Gener Transm Distrib"},{"issue":"3","key":"1019_CR15","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/TIT.2008.2011442","volume":"55","author":"U Niesen","year":"2009","unstructured":"Niesen U, Shah D, Wornell GW (2009) Adaptive alternating minimization algorithms. IEEE Trans Inf Theory 55(3):1423\u20131429","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"1019_CR16","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1080\/10556788.2012.700713","volume":"29","author":"Y Shen","year":"2014","unstructured":"Shen Y, Wen Z, Zhang Y (2014) Augmented Lagrangian alternating direction method for matrix separation based on low-rank factorization. Optim Methods Softw 29(2):239\u2013263","journal-title":"Optim Methods Softw"},{"key":"1019_CR17","unstructured":"Siobhan G (2009) Electricity grid in U.S. penetrated by spies. \n                        http:\/\/online.wsj.com\/articles\/SB123914-805204099085"},{"issue":"4","key":"1019_CR18","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s12532-012-0044-1","volume":"4","author":"Z Wen","year":"2012","unstructured":"Wen Z, Yin W, Zhang Y (2012) Solving a low-rank factorization model for matrix completion by a nonlinear successive over-relaxation algorithm. Math Program Comput 4(4):333\u2013361","journal-title":"Math Program Comput"},{"key":"1019_CR19","doi-asserted-by":"crossref","unstructured":"Xu W, Wang M, Tang A (2011) On state estimation with bad data detection. In: Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC\u201911), pp. 5989\u20135994","DOI":"10.1109\/CDC.2011.6161214"},{"issue":"3","key":"1019_CR20","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TPDS.2013.92","volume":"25","author":"Q Yang","year":"2014","unstructured":"Yang Q, Yang J, Yu W, An D, Zhang N, Zhao W (2014) On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans Parallel Distrib Syst 25(3):717\u2013729","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"1019_CR21","first-page":"1","volume":"9","author":"X Yuan","year":"2009","unstructured":"Yuan X, Yang J (2009) Sparse and low rank matrix decomposition via alternating direction method. Pac J Optim 9(1):1\u201311","journal-title":"Pac J Optim"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-016-1019-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-016-1019-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-016-1019-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T05:56:43Z","timestamp":1501567003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-016-1019-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,18]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["1019"],"URL":"https:\/\/doi.org\/10.1007\/s10115-016-1019-8","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,18]]}}}