{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:10Z","timestamp":1774541290996,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672928","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"44-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A single-class attack detection algorithm for smart grid AGC system based on improved support vector machines algorithm"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1361-7483","authenticated-orcid":false,"given":"Chao","family":"Hong","sequence":"first","affiliation":[{"name":"Electric Power Research Institute, China Southern Power Grid, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9522-6101","authenticated-orcid":false,"given":"Jiaye","family":"Tao","sequence":"additional","affiliation":[{"name":"Information Centre of Guizhou Power Grid Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6662-9489","authenticated-orcid":false,"given":"Yun","family":"Fu","sequence":"additional","affiliation":[{"name":"Information Centre of Guizhou Power Grid Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7017-8291","authenticated-orcid":false,"given":"Yiwei","family":"Yang","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, China Southern Power Grid, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0213-7573","authenticated-orcid":false,"given":"Lipeng","family":"Wei","sequence":"additional","affiliation":[{"name":"Information Centre of Guizhou Power Grid Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6210-7459","authenticated-orcid":false,"given":"Zhihong","family":"Liang","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, China Southern Power Grid, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9209-3227","authenticated-orcid":false,"given":"Junrong","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Centre of Guizhou Power Grid Co., China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"9","article-title":"Analysis of the ShockNet virus incident and insights for enhancing industrial control system security protection capabilities[J]","volume":"2019","author":"Li","unstructured":"D Li. Analysis of the ShockNet virus incident and insights for enhancing industrial control system security protection capabilities[J]. Network Security Technology and Applications, 2019 (1): 9-10+24.","journal-title":"Network Security Technology and Applications"},{"issue":"7","key":"e_1_3_2_1_2_1","first-page":"144","article-title":"Network attacks and considerations on power grid information security in response to the Ukrainian power outage incident[J]","volume":"40","author":"Tong X R","year":"2016","unstructured":"X Y Tong, X R Wang. Network attacks and considerations on power grid information security in response to the Ukrainian power outage incident[J]. Power System Automation, 2016, 40(7): 144\u2013148.","journal-title":"Power System Automation"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854745"},{"key":"e_1_3_2_1_5_1","volume-title":"statistical methods for quality improvement[M]","author":"Thomas P.","year":"2011","unstructured":"Thomas P. Ryan. statistical methods for quality improvement[M]. Smyrna, Georgia: John Wiley & Sons, Inc, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"Research on anomaly detection of false data injection attacks in industrial control systems based on improved kpca method[D]","author":"Liu","year":"2019","unstructured":"Y Liu. Research on anomaly detection of false data injection attacks in industrial control systems based on improved kpca method[D]. Zhejiang University, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.120"},{"key":"e_1_3_2_1_8_1","volume-title":"Research on anomaly detection method for deceptive attacks in industrial control systems based on self-organizing map neural network[D]","author":"Hong","year":"2021","unstructured":"Q H Hong. Research on anomaly detection method for deceptive attacks in industrial control systems based on self-organizing map neural network[D]. Zhejiang University, 2021."},{"key":"e_1_3_2_1_9_1","volume-title":"Machine learning[M]","author":"Zhou","year":"2016","unstructured":"Z H Zhou. Machine learning[M]. Beijing: Tsinghua University Press, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"Li X and Zhao Y 2021 P","author":"Zhou C","unstructured":"Zhou C, Hu B, Shi Y, Tian Y C, Li X and Zhao Y 2021 P. IEEE 109 517\u201341."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-016-9693-y"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075273"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1140-3"},{"key":"e_1_3_2_1_14_1","volume-title":"2015 50th International Universities Power Engineering Conference (UPEC)[C]. Stoke On Trent, United Kingdom: IEEE","author":"Moeini A","unstructured":"Moeini A, Kamwa I, Brunelle P, et.al. Open data IEEE test systems implemented in SimPowerSystems for education and research in power grid dynamics and control[A]. 2015 50th International Universities Power Engineering Conference (UPEC)[C]. Stoke On Trent, United Kingdom: IEEE, 2015: 1-6."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2810161"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","location":"Nanjing China","acronym":"CSAIDE 2024"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:36:55Z","timestamp":1755880615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":15,"alternative-id":["10.1145\/3672919.3672928","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672928","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}