{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:27:22Z","timestamp":1730237242228,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1109\/icct56141.2022.10072826","type":"proceedings-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T18:29:19Z","timestamp":1679941759000},"page":"1893-1897","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection Method For Interactive Data of Third-Party Load Aggregation Platform Based on Multidimensional Feature Information Fusion"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Zhang","sequence":"first","affiliation":[{"name":"Xuzhou Power Supply Company of State, Grid Jiangsu Electric Power Co., Ltd,Xuzhou,Jiangsu,China"}]},{"given":"Chenghao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Xuzhou Power Supply Company of State, Grid Jiangsu Electric Power Co., Ltd,Xuzhou,Jiangsu,China"}]},{"given":"Xianglong","family":"Wu","sequence":"additional","affiliation":[{"name":"Xuzhou Power Supply Company of State, Grid Jiangsu Electric Power Co., Ltd,Xuzhou,Jiangsu,China"}]},{"given":"Tianpeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Xuzhou Power Supply Company of State, Grid Jiangsu Electric Power Co., Ltd,Xuzhou,Jiangsu,China"}]},{"given":"Hailong","family":"Gao","sequence":"additional","affiliation":[{"name":"Xuzhou Power Supply Company of State, Grid Jiangsu Electric Power Co., Ltd,Xuzhou,Jiangsu,China"}]},{"given":"Jing","family":"Guo","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of State Grid Jiangsu Electric Power Co., Ltd,Nanjing,Jiangsu,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.09.088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.09.101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2018.2851516"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2572402"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.115424"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2018.00016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2019.109466"},{"issue":"5","key":"ref8","first-page":"120","volume":"39","author":"Songlin","year":"2020","journal-title":"Abnormal data inspection technology of photovoltaic power generation based on EKF algorithm, Electric Power Engineering Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"issue":"57","key":"ref10","first-page":"156","article-title":"State summation for detecting false data attack on smart grid","volume":"2014","author":"Yuancheng","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2385670"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2392100"},{"issue":"4","key":"ref13","first-page":"9","article-title":"Research on key technologies of big data for energy interconnection","volume":"14","author":"Pei","year":"2016","journal-title":"Electric Power Information and Communication Technology"},{"issue":"6","key":"ref14","first-page":"1481","article-title":"Power system cyber physical modeling and security assessment: motivation and ideas","volume-title":"Proceedings of the CSEE","volume":"36","author":"Qinglai","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2421935"},{"issue":"3","key":"ref16","first-page":"22","article-title":"Distributed state estimation of active distribution network considering false data injection attack","volume":"41","author":"Chongxin","year":"2022","journal-title":"Electric Power Engineering Technology"},{"issue":"3","key":"ref17","first-page":"14","volume":"41","author":"Sheng","year":"2022","journal-title":"Risk assessment method of security and stability control system considering the impact of cyber attacks, Electric Power Engineering Technology"}],"event":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2022,11,11]]},"location":"Nanjing, China","end":{"date-parts":[[2022,11,14]]}},"container-title":["2022 IEEE 22nd International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072013\/10072295\/10072826.pdf?arnumber=10072826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:54:33Z","timestamp":1707836073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icct56141.2022.10072826","relation":{},"subject":[],"published":{"date-parts":[[2022,11,11]]}}}