{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:28:24Z","timestamp":1759940904291,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,11]]},"DOI":"10.1109\/smartgridcomm47815.2020.9303010","type":"proceedings-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:54:24Z","timestamp":1609365264000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Information Theoretic Data Injection Attacks with Sparsity Constraints"],"prefix":"10.1109","author":[{"given":"Xiuzhen","family":"Ye","sequence":"first","affiliation":[]},{"given":"Inaki","family":"Esnaola","sequence":"additional","affiliation":[]},{"given":"Samir M.","family":"Perlaza","sequence":"additional","affiliation":[]},{"given":"Robert F.","family":"Harrison","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550420"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340708"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2935353"},{"journal-title":"Elements of Information Theory","year":"1999","author":"cover","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4057","DOI":"10.1109\/TSG.2018.2848935","article-title":"Robust recovery of missing data in electricity distribution systems","volume":"10","author":"genes","year":"2018","journal-title":"IEEE Trans Smart Grid"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2248875"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682919"},{"journal-title":"Power System Analysis","year":"1994","author":"grainger","key":"ref18"},{"key":"ref19","first-page":"289","article-title":"On the problem of the most efficient tests of statistical hypotheses","volume":"231","author":"neyman","year":"0","journal-title":"Philosophical Trans of the Royal Society of London"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"ref3","first-page":"184","article-title":"Network-layer protection schemes against stealth attacks on state estimators in power systems","author":"vukovi?","year":"2011","journal-title":"Proc IEEE Int Conf Smart Grid Commun Conf"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Process Mag"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102319"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032225"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130713"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203913673"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-32125-7","author":"colbert","year":"2016","journal-title":"Cyber-security of SCADA & Industrial Control Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"year":"1999","key":"ref21","article-title":"Power systems test case archive"}],"event":{"name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","start":{"date-parts":[[2020,11,11]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2020,11,13]]}},"container-title":["2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9302911\/9302928\/09303010.pdf?arnumber=9303010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:16:12Z","timestamp":1656602172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9303010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm47815.2020.9303010","relation":{},"subject":[],"published":{"date-parts":[[2020,11,11]]}}}