{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:10:38Z","timestamp":1777011038555,"version":"3.51.4"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-NA0004109"],"award-info":[{"award-number":["DE-NA0004109"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3543751","type":"journal-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:57:49Z","timestamp":1739991469000},"page":"33783-33798","source":"Crossref","is-referenced-by-count":11,"title":["A Hybrid Machine Learning-Based Framework for Data Injection Attack Detection in Smart Grids Using PCA and Stacked Autoencoders"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6469-015X","authenticated-orcid":false,"given":"Shahid","family":"Tufail","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5930-025X","authenticated-orcid":false,"given":"Hasan","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5162-7626","authenticated-orcid":false,"given":"Mohd","family":"Tariq","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1179-438X","authenticated-orcid":false,"given":"Arif I.","family":"Sarwat","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5022"},{"key":"ref2","volume-title":"Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid","year":"2023"},{"issue":"18","key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/en14185894","article-title":"A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid","volume":"14","author":"Tufail","year":"2021","journal-title":"Energies"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08587-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2993338"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.compeleceng.2018.01.015","article-title":"Cyber-security in smart grid: Survey and challenges","volume":"67","author":"Mrabet","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.jnca.2016.10.003","article-title":"A survey of smart grid architectures, applications, benefits and standardization","volume":"76","author":"Nafi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2012.6257525"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NPSC.2016.7858950"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon48659.2022.9764139"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795462"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100567"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247193"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3326751"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2023.100271"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3032618"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3099371"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36007-7_7"},{"issue":"5","key":"ref21","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.3390\/en14051380","article-title":"Emerging challenges in smart grid cybersecurity enhancement: A review","volume":"14","author":"Mohammadi","year":"2021","journal-title":"Energies"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42726-9_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"issue":"9","key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/en14092657","article-title":"Enhancing cybersecurity in smart grids: False data injection and its mitigation","volume":"14","author":"Unsal","year":"2021","journal-title":"Energies"},{"issue":"8","key":"ref25","doi-asserted-by":"crossref","first-page":"1789","DOI":"10.3390\/electronics12081789","article-title":"Advancements and challenges in machine learning: A comprehensive review of models, libraries, applications, and algorithms","volume":"12","author":"Tufail","year":"2023","journal-title":"Electronics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107679"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1032604.1032616"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.042"},{"issue":"5786","key":"ref29","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"Hinton","year":"2006","journal-title":"Science"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110510"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985769"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC.2019.8662186"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108380"},{"issue":"15","key":"ref34","doi-asserted-by":"crossref","DOI":"10.3390\/en13153974","article-title":"Smart grid monitoring by wireless sensors using binary logistic regression","volume":"13","author":"Manoharan","year":"2020","journal-title":"Energies"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12706"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon48659.2022.9764108"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR49608.2020.9122320"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956599"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SCIOT50840.2020.9250194"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS56150.2022.10012172"},{"issue":"2","key":"ref42","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/electronics8020122","article-title":"Electricity price and load forecasting using enhanced convolutional neural network and enhanced support vector regression in smart grids","volume":"8","author":"Zahid","year":"2019","journal-title":"Electronics"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2020.118866"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15032-7_1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061478"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon45413.2021.9401940"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech48523.2021.00012"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.05.007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref50","volume-title":"Industrial Control System Cyber Attack Data Set","year":"2014"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10820123\/10892133-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10892133.pdf?arnumber=10892133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:06:40Z","timestamp":1740596800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10892133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3543751","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}