{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:50:12Z","timestamp":1761562212328,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/acssc.2016.7869600","type":"proceedings-article","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T22:12:32Z","timestamp":1488838352000},"page":"1370-1374","source":"Crossref","is-referenced-by-count":3,"title":["Robust false data injection attacks in electricity markets by limited adversaries"],"prefix":"10.1109","author":[{"given":"Mengheng","family":"Xue","sequence":"first","affiliation":[]},{"given":"Ali","family":"Tajer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"760","article-title":"On false data injection attack against multistep electricity price in electricity market in smart grid","author":"lin","year":"2013","journal-title":"Proc IEEE Global Communications Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2228508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.313"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"key":"ref14","first-page":"1","article-title":"On the nonlinearity effects on malicious data attack on power system","author":"jia","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31863-9_13"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970791"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2009.5282237"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.810698"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref8","first-page":"5952","article-title":"Malicious data attack on realtime electricity market","author":"jia","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"journal-title":"Power Generation Operation and Control","year":"2012","author":"wood","key":"ref2"},{"key":"ref1","volume":"146","author":"hunt","year":"2002","journal-title":"Making Competition Work in Electricity"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/iCECE.2010.1000"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2037518"},{"article-title":"CVX: Matlab software for disciplined convex programming, version 2.1","year":"2014","author":"grant","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"}],"event":{"name":"2016 50th Asilomar Conference on Signals, Systems and Computers","start":{"date-parts":[[2016,11,6]]},"location":"Pacific Grove, CA, USA","end":{"date-parts":[[2016,11,9]]}},"container-title":["2016 50th Asilomar Conference on Signals, Systems and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7859055\/7868973\/07869600.pdf?arnumber=7869600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T12:00:19Z","timestamp":1498392019000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7869600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/acssc.2016.7869600","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}