{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:18Z","timestamp":1778605818687,"version":"3.51.4"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111167","type":"journal-article","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:27:57Z","timestamp":1776284877000},"page":"111167","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Online incremental learning for detecting false data injection attacks on state estimators handling high renewable penetration and topology changes"],"prefix":"10.1016","volume":"135","author":[{"given":"Farhad","family":"Pirhadi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6186-6906","authenticated-orcid":false,"given":"Hossein","family":"Seifi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4067-8452","authenticated-orcid":false,"given":"Hamed","family":"Delkhosh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111167_bib0001","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/ACCESS.2024.3519328","article-title":"State estimation in power systems under false data injection attack using total least squares","volume":"13","author":"Tausiesakul","year":"2024","journal-title":"IEEe Access"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108638","article-title":"False data injection attack in smart grid cyber physical system: issues, challenges, and future direction","volume":"107","author":"Habib","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2024.111286","article-title":"A survey on coordinated attacks against cyber\u2013physical power systems: attack, detection, and defense methods","volume":"241","author":"Feng","year":"2025","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2022.112423","article-title":"Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts","volume":"163","author":"Reda","year":"2022","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111167_bib0005","doi-asserted-by":"crossref","first-page":"8873","DOI":"10.1109\/TII.2024.3374374","article-title":"Adversarial artificial intelligence in blind false data injection in smart grid AC state estimation","volume":"20","author":"Rahman","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111167_bib0006","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1109\/TII.2020.2999571","article-title":"A graph theory-based approach to detect false data injection attacks in power system AC state estimation","volume":"17","author":"Jorjani","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0007","doi-asserted-by":"crossref","first-page":"18147","DOI":"10.1109\/ACCESS.2024.3361039","article-title":"A comprehensive review on cyber-attacks in power systems: impact analysis, detection, and cyber security","volume":"12","author":"Tatipatri","year":"2024","journal-title":"IEEe Access"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0008","series-title":"IEEE Transactions on Industry Applications","article-title":"Detection of cyber attacks in modern renewable integrated power sector: a matrix separation scheme","author":"Mukherjee","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111167_bib0009","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1109\/TSG.2024.3524629","article-title":"Detection of FDIA in power grid based on hypergraph and attention mechanism","volume":"16","author":"Li","year":"2025","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109863","article-title":"A comprehensive survey on intrusion detection algorithms","volume":"121","author":"Li","year":"2025","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0011","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1016\/j.egyr.2023.12.040","article-title":"A review on machine learning techniques for secured cyber-physical systems in smart grid networks","volume":"11","author":"Hasan","year":"2024","journal-title":"Energy Rep."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.108836","article-title":"A comparative study on online machine learning techniques for network traffic streams analysis","volume":"207","author":"Shahraki","year":"2022","journal-title":"Comput. Netw."},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111167_bib0013","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1038\/s42256-022-00568-3","article-title":"Three types of incremental learning","volume":"4","author":"Van de Ven","year":"2022","journal-title":"Nat. Mach. Intell."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0014","volume":"238","author":"Wang","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0015","doi-asserted-by":"crossref","first-page":"135774","DOI":"10.1109\/ACCESS.2021.3117230","article-title":"Accurate detection of false data injection attacks in renewable power systems using deep learning","volume":"9","author":"Almutairy","year":"2021","journal-title":"IEEe Access"},{"issue":"23","key":"10.1016\/j.compeleceng.2026.111167_bib0016","doi-asserted-by":"crossref","first-page":"37571","DOI":"10.1109\/JIOT.2024.3436520","article-title":"Localization of false data injection attacks in smart grids with renewable energy integration via spatiotemporal network","volume":"11","author":"Yu","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111167_bib0017","doi-asserted-by":"crossref","first-page":"1588","DOI":"10.35833\/MPCE.2020.000686","article-title":"Defense of massive false data injection attack via sparse attack points considering uncertain topological changes","volume":"10","author":"Huang","year":"2021","journal-title":"J. Mod. Power Syst. Clean. Energy"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.energy.2022.125865","article-title":"Graph-based detection for false data injection attacks in power grid","volume":"263","author":"Li","year":"2023","journal-title":"Energy"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109572","article-title":"FDIA localization and classification detection in smart grids using multi-modal data and deep learning technique","volume":"119","author":"Wang","year":"2024","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111167_bib0020","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/TNSM.2021.3102388","article-title":"An incremental learning method based on dynamic ensemble RVM for intrusion detection","volume":"19","author":"Wu","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0021","doi-asserted-by":"crossref","first-page":"3831","DOI":"10.1109\/TIFS.2022.3214099","article-title":"Adversarial RL-based IDS for evolving data environment in 6LoWPAN","volume":"17","author":"Pasikhani","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103413","article-title":"Federated learning for reliable model updates in network-based intrusion detection","volume":"133","author":"dos Santos","year":"2023","journal-title":"Comput. Secur."},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111167_bib0023","first-page":"1697","article-title":"A hybrid method for false data injection attack detection in smart grid based on variational mode decomposition and OS-ELM","volume":"8","author":"Dou","year":"2020","journal-title":"CSEE J. Power Energy Syst."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2023.109682","article-title":"Locational detection of the false data injection attacks via semi-supervised multi-label adversarial network","volume":"155","author":"Feng","year":"2024","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111167_bib0025","first-page":"797","article-title":"Reinforcement learning-empowered graph convolutional network framework for data integrity attack detection in cyber-physical systems","volume":"10","author":"Vincent","year":"2024","journal-title":"CSEE J. Power Energy Syst."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103178","article-title":"Deep learning for online AC false data injection attack detection in smart grids: an approach using LSTM-autoencoder","volume":"193","author":"Yang","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111167_bib0027","doi-asserted-by":"crossref","first-page":"3248","DOI":"10.1109\/TSG.2023.3339975","article-title":"Training a dynamic neural network to detect false data injection attacks under multiple unforeseen operating conditions","volume":"15","author":"Hu","year":"2023","journal-title":"IEEe Trans. Smart. Grid."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111167_bib0028","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s10462-023-10662-6","article-title":"Autoencoders and their applications in machine learning: a survey","volume":"57","author":"Berahmand","year":"2024","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111167_bib0029","article-title":"Adaptive random forest-based algorithm for fast advertisement recommendation","volume":"5","author":"Dupont","year":"2025","journal-title":"Gener. Artif. Intell. Res."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111167_bib0030","first-page":"96","article-title":"Permuted gini importance\u2013PaP impurity measurement for tree-based models","volume":"5","author":"Altaf","year":"2024","journal-title":"J. Soft Comput. Data Min."},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111167_bib0031","doi-asserted-by":"crossref","first-page":"5192","DOI":"10.1109\/TNNLS.2020.2964737","article-title":"Multiclass oblique random forests with dual-incremental learning capacity","volume":"31","author":"Chai","year":"2020","journal-title":"IEEE Trans. Neural Netw Learn Syst"},{"key":"10.1016\/j.compeleceng.2026.111167_bib0032","unstructured":"MATPOWER, IEEE 14 bus test case, [Online]. Available: https:\/\/matpower.org\/docs\/ref\/matpower5.0\/case14.html [Accessed Mar. 2025]."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0033","unstructured":"MATPOWER, IEEE 118 bus test case, 2025. [Online]. Available: https:\/\/matpower.org\/docs\/ref\/matpower5.0\/case118.html [Accessed Mar. 2025]."},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111167_bib0034","doi-asserted-by":"crossref","DOI":"10.1049\/rpg2.70157","article-title":"Enhanced detection of false data injection attacks using hybrid clustering-classification for various penetration and distribution levels of renewables","volume":"19","author":"Pirhadi","year":"2025","journal-title":"IET Renew. Power Gener."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0035","unstructured":"NYISO, Real-time load data, 2025. [Online]. Available: https:\/\/www.nyiso.com\/load-data [Accessed Mar. 2025]."},{"key":"10.1016\/j.compeleceng.2026.111167_bib0036","unstructured":"NREL, Grid Data and tools, 2025. [Online]. Available: https:\/\/www.nrel.gov\/grid\/data-tools.html [Accessed Mar. 2025]."},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111167_bib0037","doi-asserted-by":"crossref","first-page":"6387","DOI":"10.3390\/en15176387","article-title":"Modern techniques for the optimal power flow problem: state of the art","volume":"15","author":"Risi","year":"2022","journal-title":"Energies"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111167_bib0038","doi-asserted-by":"crossref","first-page":"6383","DOI":"10.1007\/s10489-024-05493-z","article-title":"A rehearsal framework for computational efficiency in online continual learning","volume":"54","author":"Davalas","year":"2024","journal-title":"Appl. Intell."}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002399?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002399?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:29:03Z","timestamp":1778603343000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":38,"alternative-id":["S0045790626002399"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111167","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Online incremental learning for detecting false data injection attacks on state estimators handling high renewable penetration and topology changes","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111167","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111167"}}