{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:12:08Z","timestamp":1761581528297,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cns.2016.7860483","type":"proceedings-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T19:32:43Z","timestamp":1487878363000},"page":"172-179","source":"Crossref","is-referenced-by-count":33,"title":["Detection of false data injection attacks in smart grid under colored Gaussian noise"],"prefix":"10.1109","author":[{"given":"Bo","family":"Tang","sequence":"first","affiliation":[]},{"family":"Jun Yan","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Kay","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","volume":"46","author":"hyv\u00e4rinen","year":"2004","journal-title":"Independent Component Analysis"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref32","volume":"136","author":"adkins","year":"2012","journal-title":"Algebra An Approach via Module Theory"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2123925"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2232318"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102326"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2383692"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1983.1164156"},{"key":"ref34","first-page":"1","article-title":"On malicious data attacks on power system state estimation","author":"kosut","year":"2010","journal-title":"45th International Universities Power Engineering Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007974400149"},{"key":"ref12","volume":"84","author":"pitas","year":"2013","journal-title":"Nonlinear Digital Filters Principles and Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161214"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v1i2.133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-4585-27-9_17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947717"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120709"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"journal-title":"Fundamentals of Statistical Signal Processing Estimation Theory","year":"1993","author":"kay","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2195338"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref3","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"2010","journal-title":"Workshop on Secure Control Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2790298"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2245155"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2009.5420809"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130712"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1970.292678"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831172"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2015.2437512"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1970.292680"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1970.292679"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/59.65925"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13930"}],"event":{"name":"2016 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2016,10,17]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7854080\/7860451\/07860483.pdf?arnumber=7860483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T21:17:01Z","timestamp":1568841421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7860483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cns.2016.7860483","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}