{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:50:11Z","timestamp":1729626611446,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pccc.2016.7820657","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T02:16:58Z","timestamp":1484878618000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Data integrity attacks against the distributed real-time pricing in the smart grid"],"prefix":"10.1109","author":[{"given":"Xinyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xialei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2286992"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516705"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.72"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"key":"ref15","article-title":"False-data injection attack to control realtime price in electricity market","author":"bi","year":"2013","journal-title":"Proceedings of the Conference on Global Communications (GLOBECOM)"},{"key":"ref16","article-title":"On false data injection attack against multistep electricity price in electricity market in smart grid","author":"lin","year":"2013","journal-title":"Proc IEEE Global Communications Conf (GLOBECOM)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407684"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017076"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407784"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622077"},{"article-title":"An introduction to the kalman filter","year":"1995","author":"welch","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017039"},{"key":"ref8","article-title":"On data integrity attacks against real-time pricing in energy-based cyber-physical systems","author":"zhang","year":"2016","journal-title":"IEEE Trans on Parallel and Distributed Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2447154"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2224337"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017078"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2010.939165"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8853-9","volume":"87","author":"nesterov","year":"2004","journal-title":"Introductory Lectures on Convex Optimization"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294120"},{"key":"ref23","article-title":"A modern introduction to cardano and ferrari formulas in the algebraic equations","author":"fujii","year":"2003","journal-title":"Arxiv preprint quant-ph\/0311 085"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.177"}],"event":{"name":"2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2016,12,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,12,11]]}},"container-title":["2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7803497\/7820593\/07820657.pdf?arnumber=7820657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:42:58Z","timestamp":1568749378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7820657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/pccc.2016.7820657","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}