{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:06:08Z","timestamp":1774677968401,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007053","name":"Korea Institute of Energy Technology Evaluation and Planning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007053","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Trade, Industry and Energy (MOTIE) of Republic of Korea","award":["RS2022-KP002883"],"award-info":[{"award-number":["RS2022-KP002883"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3636184","type":"journal-article","created":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T19:01:12Z","timestamp":1764010872000},"page":"203558-203585","source":"Crossref","is-referenced-by-count":3,"title":["Large Language Models for Power System Security: A Novel Multi-Modal Approach for Anomaly Detection in Energy Management Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9052-1851","authenticated-orcid":false,"given":"Aydin","family":"Zaboli","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5035-8260","authenticated-orcid":false,"given":"Junho","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4707-7948","authenticated-orcid":false,"given":"Alexandru","family":"\u015etefanov","sequence":"additional","affiliation":[{"name":"Department of Electrical Sustainable Energy, Technische Universiteit Delft, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8941-7958","authenticated-orcid":false,"given":"Chen-Ching","family":"Liu","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7729-8966","authenticated-orcid":false,"given":"Chul-Sang","family":"Hwang","sequence":"additional","affiliation":[{"name":"Smart Grid Research Division, System Reliability Research Team, Korea Electrotechnology Research Institute (KERI), Gwangju-si, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/en15217833"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921106"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230868"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3317237"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2172\/1996392"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.2172\/2477920","article-title":"Generative AI for power grid operations","author":"Choi","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3571881"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM52009.2025.11225695"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2025.3567209"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM51994.2024.10688863"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3580439"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2763746"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2172\/2352232"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3187218"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2022.100702"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101994"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2023.3255583"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3332660"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123441"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2024.124596"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.36922\/ijamd.3681"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Egypt66095.2025.11186643"},{"key":"ref27","article-title":"G-anomaly: A pyramid graph transformer-based vision-language model for general industrial anomaly detection","author":"Li","year":"2025","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3618094"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-96235-6_24"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2025.3534459"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2024.3372973"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2023.3328850"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2024.101335"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3336608"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2024.3406505"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224915"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994961"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI62032.2023.00152"},{"key":"ref39","volume-title":"Anthropic Claude Pro","year":"2023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104951"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RWS62797.2024.10799283"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT58121.2023.10174485"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2987688"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632283"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3286401"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2024.109870"},{"key":"ref47","article-title":"GridGPT: Trustworthy AI in the control room","author":"Choi","year":"2024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2021.08550"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3364231"},{"key":"ref50","volume-title":"Reliability Guideline: Reactive Power Planning","year":"2016"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2021.3125013"},{"key":"ref52","volume-title":"IEEE 14-Bus System","year":"2024"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/EnergyVis63885.2024.00007"},{"key":"ref54","article-title":"Set-of-mark prompting unleashes extraordinary visual grounding in GPT-4 V","author":"Yang","year":"2023","journal-title":"arXiv:2310.11441"},{"key":"ref55","doi-asserted-by":"crossref","DOI":"10.15607\/RSS.2024.XX.062","article-title":"MOKA: Open-world robotic manipulation through mark-based visual prompting","volume-title":"Proc. 1st Workshop Vision-Lang. Models Navigat. Manipulation (ICRA)","author":"Fang"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/cae.22420"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO55190.2022.9803465"},{"key":"ref58","volume-title":"Control Room of the Future","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3333850"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1541\/ieejpes1990.110.4_241"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2023.3236429"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11264487.pdf?arnumber=11264487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:42:03Z","timestamp":1765219323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11264487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3636184","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}