{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:50:02Z","timestamp":1743742202884,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,7]]},"DOI":"10.1109\/tencon54134.2021.9707292","type":"proceedings-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T20:41:43Z","timestamp":1645044103000},"page":"278-283","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Deep Learning Framework to Identify False Data Injection Attack in Power Sector"],"prefix":"10.1109","author":[{"given":"Debottam","family":"Mukherjee","sequence":"first","affiliation":[{"name":"Indian Institute of Technology (BHU),Dept. of Electrical Engineering,Varanasi,India"}]},{"given":"Samrat","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Dept. of Electrical Engineering,Jote,Arunachal Pradesh,India"}]},{"given":"Ramashis","family":"Banerjee","sequence":"additional","affiliation":[{"name":"National Institute of Technology,Dept. of Electrical Engineering,Silchar,Assam,India"}]},{"given":"Joydeep","family":"Bhunia","sequence":"additional","affiliation":[{"name":"Medinipur Sadar Government Polytechnic,Dept. of Electrical Engineering,Paschim Medinipur,India"}]},{"given":"Pabitra","family":"Kumar Guchhait","sequence":"additional","affiliation":[{"name":"Bengal College of Engineering and Technology,Dept. of Electrical Engineering,Durgapur,India"}]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"State forecasting in distribution networks","author":"anton?i?","year":"2019","journal-title":"2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE50343.2020.9290632"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12901"},{"key":"ref30","first-page":"44","article-title":"Ma-chine learning based solar power generation forecasting with and without mppt controller","author":"mukherjee","year":"0","journal-title":"2020 IEEE 1st International Conference for Convergence in Engineering (ICCE)"},{"key":"ref34","first-page":"1","article-title":"Power system state fore-casting using regression analysis","author":"hassanzadeh","year":"0","journal-title":"2012 IEEE Power and Energy Society General Meeting"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2394358"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2385670"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939058"},{"key":"ref15","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"2010","journal-title":"First Workshop on Secure Control Systems (SCS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769099"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP52854.2021.9550965"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2875529"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2284438"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45050-6_1"},{"key":"ref29","first-page":"1","article-title":"Power system state forecasting using machine learning techniques","author":"mukherjee","year":"2021","journal-title":"Electrical Engineering"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"xie","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref8","first-page":"1","article-title":"Adaptive adjustment of noise covariance in kalman filter for dynamic state estimation","author":"akhlaghi","year":"0","journal-title":"2017 IEEE Power & Energy Society General Meeting IEEE"},{"key":"ref7","first-page":"408","article-title":"A new scheduling algorithm for dynamic task and fault tolerant in heterogeneous grid systems using genetic algorithm","volume":"9","author":"delavar","year":"0","journal-title":"2010 3rd International Conference on Computer Science and Information Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9780203913673"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503599"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.931384"},{"key":"ref20","first-page":"1","article-title":"Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids","author":"mukherjee","year":"2021","journal-title":"Electrical Engineering"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.1109\/TSG.2014.2374577","article-title":"Quickest detection of false data injection attack in wide-area smart grids","volume":"6","author":"li","year":"2014","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious data attacks on the smart grid","volume":"2","author":"kosut","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","article-title":"Developing a hybrid intrusion detection system using data mining for power systems","volume":"6","author":"pan","year":"2015","journal-title":"IEEE Trans-actions on Smart Grid"},{"key":"ref23","first-page":"1","article-title":"Machine learning for power system disturbance and cyber-attack discrimination","author":"hink","year":"0","journal-title":"2014 7th International Symposium on Resilient Control Systems (ISRCS) ISRCS"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1109\/TSG.2015.2388545","article-title":"Detecting false data injection attacks in ac state estimation","volume":"6","author":"chaojun","year":"2015","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref25","article-title":"Fast sequence component analysis for attack de-tection in synchrophasor networks","author":"landford","year":"2015","journal-title":"ArXiv Preprint"}],"event":{"name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","start":{"date-parts":[[2021,12,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,10]]}},"container-title":["TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9707139\/9707180\/09707292.pdf?arnumber=9707292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T01:59:20Z","timestamp":1670378360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9707292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/tencon54134.2021.9707292","relation":{},"subject":[],"published":{"date-parts":[[2021,12,7]]}}}