{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:12:09Z","timestamp":1761743529172},"reference-count":94,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/tsg.2011.2160101","type":"journal-article","created":{"date-parts":[[2011,8,15]],"date-time":"2011-08-15T20:20:21Z","timestamp":1313439621000},"page":"724-740","source":"Crossref","is-referenced-by-count":139,"title":["Cognitive Radio Network for the Smart Grid: Experimental System Architecture, Control Algorithms, Security, and Microgrid Testbed"],"prefix":"10.1109","volume":"2","author":[{"given":"Robert Caiming","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Raghuram","family":"Ranganathan","sequence":"additional","affiliation":[]},{"given":"Shujie","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"1","article-title":"On malicious data attacks on power system state estimation","author":"kosut","year":"2010","journal-title":"Proc Universities Power Eng Conf (UPEC)"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1613\/jair.2447","article-title":"Optimal and approximate Q-value functions for decentralized POMDPs","volume":"32","author":"oliehoek","year":"2008","journal-title":"J Artif Intell Res"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1613\/jair.1659","article-title":"Perseus: Randomized point-based value iteration for POMDPs","volume":"24","author":"spaan","year":"2005","journal-title":"J Artif Intell Res"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081960"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.01.011"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2007.376583"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2001.939539"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.918715"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39624-6_14"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.39"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015052"},{"key":"ref32","author":"hadzic","year":"1999","journal-title":"FPGA Viruses"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2004.1393279"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-540-45234-8_10","author":"wollinger","year":"2003","journal-title":"Field-Programmable Logic and Applications"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840087"},{"key":"ref36","year":"2009","journal-title":"Nvidia's Next Generation CUDA Compute Architecture Fermi"},{"key":"ref35","author":"glenn-anderson","year":"2008","journal-title":"Gpu-Based Desktop Supercomputing"},{"key":"ref34","author":"drimer","year":"2009","journal-title":"Security for Volatile FPGAs"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831050"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622022"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015718"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560593"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0216"},{"key":"ref27","first-page":"75","article-title":"Sora: High performance software radio using general purpose multi-core processors","author":"tan","year":"2009","journal-title":"Proc 6th USENIX Symp Netw Syst Design Implementation USENIX Assoc"},{"key":"ref65","author":"sondik","year":"1971","journal-title":"The optimal control of partially observable Markov processes"},{"key":"ref66","author":"cassandra","year":"1998","journal-title":"Exact and approximate algorithms for partially observable Markov decision processes"},{"key":"ref29","article-title":"FPGA-based cryptography for internet security","author":"prasanna","year":"2000","journal-title":"Proc Online Symp Electron Eng"},{"key":"ref67","first-page":"107","article-title":"The multiagent decision process toolbox: Software for decision theoretic planning in multiagent systems","author":"spaan","year":"2008","journal-title":"Proc MSDM"},{"key":"ref68","author":"smith","year":"2007","journal-title":"Probabilistic planning for robotic exploration"},{"key":"ref69","article-title":"Sarsop: Efficient point-based pomdp planning by approximating optimally reachable belief spaces","author":"kurniawati","year":"2008","journal-title":"Proc Robot Sci Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118376270"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2048171"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2116051"},{"key":"ref22","year":"2009","journal-title":"ADACMaster III user's guide"},{"key":"ref21","year":"2010","journal-title":"Small form factor SDR evaluation module\/development platform user's guide"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2007.91"},{"key":"ref23","year":"2010","journal-title":"Lyrtech Incorporated"},{"key":"ref26","year":"2010","journal-title":"Mango Communications"},{"key":"ref25","year":"2010","journal-title":"Rice University"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434746"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rpg.2009.0076"},{"key":"ref94","author":"qiu","year":"2011","journal-title":"Experimental results on matrix separation algorithm"},{"key":"ref93","article-title":"The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices","author":"lin","year":"2009","journal-title":"Math Program"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450037906X"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622049"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.852060"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622073"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434752"},{"key":"ref52","article-title":"Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integration","author":"he","year":"2010","journal-title":"ArXiv Preprint"},{"key":"ref10","article-title":"Cognitive radio and smart grid","author":"qiu","year":"2010","journal-title":"IEEE Chapter"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SDR.2010.5507920"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.918720"},{"key":"ref12","author":"reed","year":"0","journal-title":"Enabling Rural Virginia's Smart Grid Through White Space Communications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74494-8_91"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"ref82","first-page":"480","article-title":"One-unit learning rules for independent component analysis","author":"hyvarinen","year":"1997","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDENTCOM.2007.4444684"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(94)90029-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560594"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/0471221317"},{"key":"ref18","year":"2010","journal-title":"Ettus Research LLC"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"ref19","year":"2010","journal-title":"GNU Radio"},{"key":"ref80","author":"kwon","year":"2004","journal-title":"Kernel-based anomaly detection in hyperspectral imagery"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622027"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WDD.2010.5592625"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WDD.2010.5592613"},{"key":"ref6","first-page":"13","article-title":"Securing the electricity grid","author":"amin","year":"2010","journal-title":"Bridge"},{"key":"ref5","year":"2007","journal-title":"A Systems View of the Modern Grid"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.811199"},{"key":"ref8","author":"qiu","year":"2010","journal-title":"A cognitive radio network testbed"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/78.542183"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2009.5420809"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2053053"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/34.879789"},{"key":"ref88","first-page":"757","article-title":"A new learning algorithm for blind signal separation","author":"amari","year":"1996","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref9","author":"qiu","year":"2010","journal-title":"Smart grid research at TTU"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887322"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.2007.914686"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5621994"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.910665"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622034"},{"key":"ref44","author":"krishna","year":"2009","journal-title":"Auction Theory"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2055903"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5165411\/6084801\/05971793.pdf?arnumber=5971793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:53:27Z","timestamp":1642006407000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5971793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":94,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2011.2160101","relation":{},"ISSN":["1949-3053"],"issn-type":[{"value":"1949-3053","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}