{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:54:44Z","timestamp":1770350084112,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011512","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011512","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.1109\/smartgridcomm51999.2021.9632337","type":"proceedings-article","created":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:15:25Z","timestamp":1639430125000},"page":"108-114","source":"Crossref","is-referenced-by-count":6,"title":["A Stealthier False Data Injection Attack against the Power Grid"],"prefix":"10.1109","author":[{"given":"Weili","family":"Yan","sequence":"first","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore"}]},{"given":"Xin","family":"Lou","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore"}]},{"given":"David K.Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design"}]},{"given":"Ying","family":"Yang","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore"}]},{"given":"Muhammad Ramadan","family":"Saifuddin","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore"}]},{"given":"Jiyan","family":"Wu","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore"}]},{"given":"Marianne","family":"Winslett","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(95)00059-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.818700"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033566"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846365"},{"key":"ref14","article-title":"Learning-based attacks in cyber-physical systems","author":"khojasteh","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741557"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2969117"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3063735"},{"key":"ref19","year":"2021","journal-title":"PowerWorld"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref3","year":"2014","journal-title":"The Dragonfly Attack"},{"key":"ref6","author":"kundur","year":"1994","journal-title":"Power System Stability and Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2676721"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2010.5590115"},{"key":"ref2","year":"2014","journal-title":"Hackers Infiltrated Power Grids"},{"key":"ref1","article-title":"Stuxnet worm impact on industrial cyber physical system security","author":"zhang","year":"0","journal-title":"37th Annual Conference of the IEEE Industrial Electronics Society"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909732"},{"key":"ref20","article-title":"A Stealthier False Data Injection Attack against the Power Grid","year":"2021","journal-title":"Technical Report"}],"event":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","location":"Aachen, Germany","start":{"date-parts":[[2021,10,25]]},"end":{"date-parts":[[2021,10,28]]}},"container-title":["2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631985\/9631986\/09632337.pdf?arnumber=9632337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:23:05Z","timestamp":1659486185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9632337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm51999.2021.9632337","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}