{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T22:25:07Z","timestamp":1775946307726,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450487","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"219-225","source":"Crossref","is-referenced-by-count":52,"title":["Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Ashrafuzzaman","sequence":"first","affiliation":[]},{"given":"Yacine","family":"Chakhchoukh","sequence":"additional","affiliation":[]},{"given":"Ananth A.","family":"Jillepalli","sequence":"additional","affiliation":[]},{"given":"Predrag T.","family":"Tosic","sequence":"additional","affiliation":[]},{"given":"Daniel Conte","family":"de Leon","sequence":"additional","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Brian K.","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2503736"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2018.2804669","article-title":"Deep learning based interval state estimation of ac smart grids against sparse cyber attacks","author":"wang","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref32","author":"marsland","year":"2015","journal-title":"Machine Learning An Algorithmic Perspective"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684102"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2017.2703842","article-title":"Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism","author":"he","year":"2017","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref37","year":"0","journal-title":"Power system test case archive"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1989.118638"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2017.04.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref40","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.72"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious data attacks on the smart grid","volume":"2","author":"kosut","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref15","first-page":"3651","article-title":"Detection and identification of data attacks in power system","author":"sou","year":"2012","journal-title":"American Control Conference (ACC)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2195338"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171901"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.04.023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769099"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139035613"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2616442"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2475695"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3055386.3055390"},{"key":"ref8","year":"2015","journal-title":"Massive power failure plunges 80 percent of pakistan into darkness"},{"key":"ref7","year":"2008","journal-title":"CIA cyberattack caused multiple-city blackout"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2492007.2492018"},{"key":"ref20","author":"hastie","year":"2008","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1109\/PESGM.2016.7741572","article-title":"Statistical outlier detection for diagnosis of cyber attacks in power state estimation","author":"chakhchoukh","year":"2016","journal-title":"IEEE Power and Energy Society General Meeting (Pesgm)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2357182"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2676721"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2017.8190422"},{"key":"ref26","first-page":"1","article-title":"Statistical outlier detection for diagnosis of cyber attacks in power state estimation","author":"chakhchoukh","year":"2016","journal-title":"Proc IEEE PES General Meeting"},{"key":"ref25","article-title":"Detecting stealthy false data injection using machine learning in smart grid","author":"esmalifalak","year":"2014","journal-title":"IEEE Systems Journal"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","location":"Limassol","start":{"date-parts":[[2018,6,25]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450487.pdf?arnumber=8450487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T18:28:21Z","timestamp":1751826501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450487","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}