{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:46:53Z","timestamp":1775854013139,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T00:00:00Z","timestamp":1540166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,22]]},"DOI":"10.1145\/3207677.3278054","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:19:29Z","timestamp":1539872369000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Cyber-Attack Classification in Smart Grid via Deep Neural Network"],"prefix":"10.1145","author":[{"given":"Liang","family":"Zhou","sequence":"first","affiliation":[{"name":"China Electric Power Research Institute, Beijing, China"}]},{"given":"Xuan","family":"Ouyang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering Zhejiang University, Hangzhou, China"}]},{"given":"Huan","family":"Ying","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, China"}]},{"given":"Lifang","family":"Han","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, China"}]},{"given":"Yushi","family":"Cheng","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Tianchen","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218253"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Flick T and Morehouse J. 2010. Securing the smart grid: next generation power grid security. Elsevier.   Flick T and Morehouse J. 2010. Securing the smart grid: next generation power grid security. Elsevier.","DOI":"10.1016\/B978-1-59749-570-7.00001-7"},{"key":"e_1_3_2_1_3_1","volume-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"Case D U","unstructured":"Case D U . 2016. Analysis of the cyber attack on the Ukrainian power grid . Electricity Information Sharing and Analysis Center (E-ISAC) . Case D U. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Holmgren \u00c5 J. 2006. Using graph models to analyze the vulnerability of electric power networks. Risk analysis 26(4) 955--969.  Holmgren \u00c5 J. 2006. Using graph models to analyze the vulnerability of electric power networks. Risk analysis 26(4) 955--969.","DOI":"10.1111\/j.1539-6924.2006.00791.x"},{"key":"e_1_3_2_1_6_1","unstructured":"Andrews F Morgan J and Sonquist J. 1967. Multiple classification analysis: A report on a computer program for multiple regression using categorical predictors.  Andrews F Morgan J and Sonquist J. 1967. Multiple classification analysis: A report on a computer program for multiple regression using categorical predictors."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"e_1_3_2_1_8_1","volume-title":"et al","author":"Hagan M T","year":"1996","unstructured":"Hagan M T , Demuth H B , and Beale M H , et al . 1996 . Neural network design. Boston : Pws Pub .. Hagan M T, Demuth H B, and Beale M H, et al. 1996. Neural network design. Boston: Pws Pub.."},{"key":"e_1_3_2_1_9_1","volume-title":"et al","author":"Hinton G","year":"2012","unstructured":"Hinton G , Deng L , and Yu D , et al . 2012 . Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups{J}. IEEE Signal processing magazine, 29(6), 82--97. Hinton G, Deng L, and Yu D, et al. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups{J}. IEEE Signal processing magazine, 29(6), 82--97."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"LeCun Y Bengio Y and Hinton G. 2015. Deep learning. nature 521(7553): 436.  LeCun Y Bengio Y and Hinton G. 2015. Deep learning. nature 521(7553): 436.","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_11_1","volume-title":"et al","author":"Ozay M","year":"2016","unstructured":"Ozay M , Esnaola I , and Vural F T Y , et al . 2016 .Machine learning methods for attack detection in the smart grid. IEEE transactions on neural networks and learning systems, 27(8), 1773--1786. Ozay M, Esnaola I, and Vural F T Y, et al. 2016.Machine learning methods for attack detection in the smart grid. IEEE transactions on neural networks and learning systems, 27(8), 1773--1786."},{"key":"e_1_3_2_1_12_1","volume-title":"et al","author":"Esmalifalak M","year":"2014","unstructured":"Esmalifalak M , Liu L , and Nguyen N , et al . 2014 . Detecting stealthy false data injection using machine learning in smart grid IEEE Systems Journal . Esmalifalak M, Liu L, and Nguyen N, et al. 2014. Detecting stealthy false data injection using machine learning in smart grid IEEE Systems Journal."},{"key":"e_1_3_2_1_13_1","volume-title":"Joint Workshop on. IEEE","author":"Wei J","year":"2016","unstructured":"Wei J , Mendis G J . 2016 . A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids\/\/Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) , Joint Workshop on. IEEE , 2016, 1--6. Wei J, Mendis G J. 2016. A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids\/\/Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), Joint Workshop on. IEEE, 2016, 1--6."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"e_1_3_2_1_15_1","volume-title":"2017 IEEE 23rd International Conference on. IEEE","author":"Ouyang X","year":"2017","unstructured":"Ouyang X , Ma Z. 2017 . Using LSTM Networks to Identify False Data of Smart Terminals in the Smart Grid{C}\/\/Parallel and Distributed Systems (ICPADS) , 2017 IEEE 23rd International Conference on. IEEE , 2017, 765--768. Ouyang X, Ma Z. 2017. Using LSTM Networks to Identify False Data of Smart Terminals in the Smart Grid{C}\/\/Parallel and Distributed Systems (ICPADS), 2017 IEEE 23rd International Conference on. IEEE, 2017, 765--768."},{"issue":"2","key":"e_1_3_2_1_16_1","first-page":"22","article-title":"Study on condition-based maintenance of electrical secondary equipment","volume":"30","author":"Jie W U","year":"2002","unstructured":"Jie _yu W U , Zhe Z , and Xiang _gen Y , 2002 . Study on condition-based maintenance of electrical secondary equipment . Relay , 30 ( 2 ), 22 -- 24 . Jie_yu W U, Zhe Z, and Xiang_gen Y, et al. 2002. Study on condition-based maintenance of electrical secondary equipment. Relay, 30(2), 22--24.","journal-title":"Relay"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953039"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_19_1","unstructured":"Chollet F. Keras. 2015.  Chollet F. Keras. 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"et al","author":"Abadi M","year":"2016","unstructured":"Abadi M , Barham P , and Chen J , et al . 2016 . Tensorflow : a system for large-scale machine learning{C}\/\/OSDI. 16, 265--283. Abadi M, Barham P, and Chen J, et al. 2016. Tensorflow: a system for large-scale machine learning{C}\/\/OSDI. 16, 265--283."}],"event":{"name":"CSAE '18: The 2nd International Conference on Computer Science and Application Engineering","location":"Hohhot China","acronym":"CSAE '18"},"container-title":["Proceedings of the 2nd International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3207677.3278054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:11Z","timestamp":1750207451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,22]]},"references-count":20,"alternative-id":["10.1145\/3207677.3278054","10.1145\/3207677"],"URL":"https:\/\/doi.org\/10.1145\/3207677.3278054","relation":{},"subject":[],"published":{"date-parts":[[2018,10,22]]},"assertion":[{"value":"2018-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}