{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:38:29Z","timestamp":1767897509304,"version":"3.49.0"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"NSF","award":["2231623"],"award-info":[{"award-number":["2231623"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2025,8,31]]},"abstract":"<jats:p>False Data Injection Attacks (FDIAs) that target the state estimation pose an immense threat to the security of power grids. Deep Neural Network (DNN)-based methods have shown promising results in detecting such FDIAs. Among the existing state-of-the-art DNN models, time series analysis DNNs have demonstrated superior FDIA detection capability. This article discusses the challenges associated with applying time series analysis DNNs for detecting FDIAs and emphasizes the impact of the attack rate on the detection rate of attacks. We demonstrate that existing time series analysis DNNs are highly vulnerable to FDIAs executed at low attack rates. This article presents various alternative implementations for time series classifiers and time series predictors to improve the FDIA detection rate. A novel method is proposed to train time series classification neural networks to detect FDIAs of any attack rate with high efficiency. Subsequently, an enhanced FDIA detection framework that includes a time series classifier and multiple predictors is presented. Furthermore, an analytical criterion is derived to estimate the FDIA detection rate of time series analysis DNNs under any attack rate. Experimental results obtained on IEEE bus systems using state-of-the-art DNN architectures support the effectiveness of the proposed training method and the proposed framework. The proposed training method significantly improved the detection rate of FDIAs at low attack rates. Up to a 48% improvement in the FDIA detection rate was observed in the proposed framework when compared to the state-of-the-art.<\/jats:p>","DOI":"10.1145\/3723164","type":"journal-article","created":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T06:02:41Z","timestamp":1742104961000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Time Series Analysis Neural Networks for Detecting False Data Injection Attacks of Different Rates on Power Grid State Estimation"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8823-159X","authenticated-orcid":false,"given":"Danushka","family":"Senarathna","sequence":"first","affiliation":[{"name":"School of Electrical, Computer and Biomedical Engineering, Southern Illinois University Carbondale","place":["Carbondale, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2575-3588","authenticated-orcid":false,"given":"Spyros","family":"Tragoudas","sequence":"additional","affiliation":[{"name":"School of Electrical, Computer and Biomedical Engineering, Southern Illinois University Carbondale","place":["Carbondale, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3708-9641","authenticated-orcid":false,"given":"Jason","family":"Wibbenmeyer","sequence":"additional","affiliation":[{"name":"Ameren Corporation Missouri","place":["St Louis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9781-3930","authenticated-orcid":false,"given":"Nasser","family":"Khdeer","sequence":"additional","affiliation":[{"name":"Ameren Corporation Missouri","place":["St Louis, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,8,23]]},"reference":[{"key":"e_1_3_1_2_2","article-title":"The vulnerability of nuclear facilities to cyber attack","year":"2010","unstructured":"Brent Kesler. 2010. The vulnerability of nuclear facilities to cyber attack. Strategic Insights, Spring, 10, 1 (2011).","journal-title":"Strategic Insights,"},{"key":"e_1_3_1_3_2","first-page":"1","article-title":"Analysis of the cyber attack on the Ukrainian power grid","volume":"388","author":"Case Defense Use","year":"2016","unstructured":"Case Defense Use. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2016), 1\u201329.","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"e_1_3_1_4_2","article-title":"Ukraine's power grid gets hacked again, a worrying sign for infrastructure attacks","author":"Condliffe J.","year":"2016","unstructured":"J. Condliffe. 2016. Ukraine's power grid gets hacked again, a worrying sign for infrastructure attacks. MIT Technol. Rev. (2016).","journal-title":"MIT Technol. Rev"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21186225"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"e_1_3_1_7_2","first-page":"1","article-title":"False data injection attacks against state estimation in electric power grids","volume":"1","author":"Yao Liu","year":"2016","unstructured":"Liu Yao, Peng Ning, and Michael K. Reiter. 2016. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC) 14 (renamed to ACM Transactions on Privacy and Security (TOPS) in 2016), 1 (2011), 1\u201333.","journal-title":"ACM Transactions on Information and System Security (TISSEC) 14 (renamed to ACM Transactions on Privacy and Security (TOPS) in 2016)"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026923"},{"issue":"3","key":"e_1_3_1_9_2","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1049\/cps2.12014","article-title":"Man-in-the-middle attacks and defence in a power system cyber-physical testbed","volume":"6","year":"2021","unstructured":"Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana Goulart, Katherine Davis, and Saman Zonouz. 2021. Man-in-the-middle attacks and defence in a power system cyber-physical testbed. IET Cyber-Physical Systems: Theory & Applications 6, 3 (2021), 164\u2013177.","journal-title":"IET Cyber-Physical Systems: Theory & Applications"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103028"},{"key":"e_1_3_1_11_2","volume-title":"Power Generation, Operation, and Control","author":"Wood Allen J.","year":"2013","unstructured":"Allen J. Wood, Bruce F. Wollenberg, and Gerald B. Shebl\u00e9. 2013. Power Generation, Operation, and Control. John Wiley & Sons."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975"},{"issue":"3","key":"e_1_3_1_13_2","first-page":"2218","article-title":"A survey on the detection algorithms for false data injection attacks in smart grids","volume":"11","year":"2019","unstructured":"Ahmed S. Musleh, Guo Chen, and Zhao Yang Dong. 2019. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Transactions on Smart Grid 11, 3 (2019), 2218\u20132234.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","DOI":"10.1109\/EI2.2017.8245663","article-title":"Real-time false data injection attack detection in energy internet using online robust principal component analysis","author":"Ding Y.","year":"2017","unstructured":"Y. Ding and J. Liu. 2017. Real-time false data injection attack detection in energy internet using online robust principal component analysis. In 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2).","journal-title":"2017 IEEE Conference on Energy Internet and Energy System Integration (EI2)"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753738"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"e_1_3_1_18_2","first-page":"1","article-title":"Real-time cyber-physical false data attack detection in smart grids using neural networks","author":"Ferragut E. M.","year":"2017","unstructured":"E. M. Ferragut, J. Laska, M. M. Olama, and O. Ozmen. 2017. Real-time cyber-physical false data attack detection in smart grids using neural networks. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI), 1\u20136.","journal-title":"2017 International Conference on Computational Science and Computational Intelligence (CSCI)"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.008"},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Boyaci Osman Amarachi Umunnakwe Abhijeet Sahu Mohammad Rasoul Narimani Muhammad Ismail Katherine R. Davis and Erchin Serpedin. 2021. Graph neural networks based detection of stealth false data injection attacks in smart grids. IEEE Systems Journal 16 2 (2021) 2946--2957.782.","DOI":"10.1109\/JSYST.2021.3109082"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.125865"},{"key":"e_1_3_1_22_2","first-page":"1","article-title":"Detection of false data injection attacks in automatic generation control systems considering system nonlinearities","author":"Ayad A.","year":"2018","unstructured":"A. Ayad, M. Khalaf, and E. El-Saadany. 2018. Detection of false data injection attacks in automatic generation control systems considering system nonlinearities. In 2018 IEEE Electrical Power and Energy Conference (EPEC), 1\u20136.","journal-title":"2018 IEEE Electrical Power and Energy Conference (EPEC)"},{"key":"e_1_3_1_23_2","first-page":"1","article-title":"Detection of false data injection attacks in smart grids using recurrent neural networks","author":"Abdelrahman Ayad","year":"2018","unstructured":"Ayad Abdelrahman, Hany E. Z. Farag, Amr Youssef, and Ehab F. El-Saadany. 2018. Detection of false data injection attacks in smart grids using recurrent neural networks. In 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 1\u20135.","journal-title":"2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2825243"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"1005660","DOI":"10.3389\/fenrg.2022.1005660","article-title":"False data injection attack detection in dynamic power grid: A recurrent neural network-based method","volume":"10","year":"2022","unstructured":"Feiye Zhang and Qingyu Yang. 2022. False data injection attack detection in dynamic power grid: A recurrent neural network-based method. Frontiers in Energy Research 10 (2022), 1005660.","journal-title":"Frontiers in Energy Research"},{"key":"e_1_3_1_26_2","first-page":"357","article-title":"Toward detecting cyberattacks targeting modern power grids: A deep learning framework","year":"2022","unstructured":"Ehsan Naderi and Arash Asrari. 2022. Toward detecting cyberattacks targeting modern power grids: A deep learning framework. In 2022 IEEE World AI IoT Congress (AIIoT). IEEE, 357\u2013363.","journal-title":"2022 IEEE World AI IoT Congress (AIIoT)"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/SEGE59172.2023.10274577","article-title":"Increasing detection rate of false data injection attacks using measurement predictors","author":"Senarathna D.","year":"2023","unstructured":"D. Senarathna, S. Tragoudas, J. Wibbenmeyer, and N. Khdeer. 2023. Increasing detection rate of false data injection attacks using measurement predictors. In 2023 IEEE 11th International Conference on Smart Energy Grid Engineering (SEGE, 148\u2013152.","journal-title":"2023 IEEE 11th International Conference on Smart Energy Grid Engineering (SEGE"},{"issue":"6","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"4862","DOI":"10.1109\/TSG.2022.3204796","article-title":"Detection of false data injection attacks in smart grid: A secure federated deep learning approach","volume":"13","author":"Yang Li","year":"2022","unstructured":"Li Yang, Xinhao Wei, Yuanzheng Li, Zhaoyang Dong, and Mohammad Shahidehpour. 2022. Detection of false data injection attacks in smart grid: A secure federated deep learning approach. IEEE Transactions on Smart Grid 13, 6 (2022), 4862\u20134872.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040797"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Huan Pan Hang Yang Chunning na and Jiayi Jin. A Transformer and Cnn-Based Hybrid Model for Localization Detection of False Data Injection Attacks in Smart Grids. Available at SSRN: 10.2139\/ssrn.4860505806","DOI":"10.2139\/ssrn.4860505806"},{"issue":"2","key":"e_1_3_1_31_2","article-title":"Self-attention spatio-temporal deep collaborative network for robust FDIA detection in smart grids","volume":"141","year":"2024","unstructured":"Tong Zu and Fengyong Li. 2024. Self-attention spatio-temporal deep collaborative network for robust FDIA detection in smart grids. CMES-Computer Modeling in Engineering & Sciences 141, 2 (2024).","journal-title":"CMES-Computer Modeling in Engineering & Sciences"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"121706","DOI":"10.1016\/j.eswa.2023.121706","article-title":"Detection of false data injection attack in power grid based on spatial-temporal transformer network","volume":"238","year":"2024","unstructured":"Xueping Li, Linbo Hu, and Zhigang Lu. 2024. Detection of false data injection attack in power grid based on spatial-temporal transformer network. Expert Systems with Applications 238 (2024), 121706.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_1_33_2","volume-title":"Neural Networks and Deep Learning","unstructured":"Charu C. Aggarwal. 2018. Neural Networks and Deep Learning. 10, 978 (2018). Cham: Springer, 2018."},{"key":"e_1_3_1_34_2","first-page":"1","article-title":"Understanding of a convolutional neural network","author":"Albawi S.","year":"2017","unstructured":"S. Albawi, T. A. Mohammed, and S. Al-Zawi. 2017. Understanding of a convolutional neural network. In 2017 International Conference on Engineering and Technology (ICET), 1\u20136.","journal-title":"2017 International Conference on Engineering and Technology (ICET)"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Junyoung Chung Caglar Gulcehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv:1412.3555. 10.48550\/arXiv.1412.3555","DOI":"10.48550\/arXiv.1412.3555"},{"issue":"9","key":"e_1_3_1_38_2","first-page":"8","article-title":"Long short-term memory","volume":"15","author":"Hochreiter S.","year":"1997","unstructured":"S. Hochreiter and J. Schmidhuber. 1997. Long short-term memory. Neural Comput 15, 9 (8) (1997), 1735\u201380.","journal-title":"Neural Comput"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"e_1_3_1_40_2","volume-title":"Advances in Neural Information Processing Systems","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017)."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","unstructured":"Qingsong Wen Tian Zhou Chaoli Zhang Weiqi Chen Ziqing Ma Junchi Yan and Liang Sun. 2022. Transformers in time series: A survey. arXiv:2202.07125. 10.48550\/arXiv.2202.07125","DOI":"10.48550\/arXiv.2202.07125"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107975"},{"key":"e_1_3_1_43_2","first-page":"1243","article-title":"Convolutional sequence to sequence learning","year":"2017","unstructured":"Jonas Gehring, Michael Auli, David Grangier, Denis Yarats, and Yann N. Dauphin. 2017. Convolutional sequence to sequence learning. In International Conference on Machine Learning (PMLR), 1243\u20131252.","journal-title":"International Conference on Machine Learning (PMLR)"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_1_45_2","unstructured":"IEEE 14-Bus System. Accessed September 20 2024. http:\/\/www.ee.washington.edu\/research\/pstca\/pf14\/pg_tca14bus.htm"},{"key":"e_1_3_1_46_2","unstructured":"IEEE 30-Bus System. Accessed September 20 2024. http:\/\/www.ee.washington.edu\/research\/pstca\/pf30\/pg_tca30bus.htm"},{"key":"e_1_3_1_47_2","first-page":"338","volume-title":"Security and Privacy in Communication Networks","year":"2021","unstructured":"Steven G. Shahriar. 2021. iDDAF: An intelligent deceptive data acquisition framework for secure cyber-physical systems. In Security and Privacy in Communication Networks. Springer International Publishing, 338\u2013359."},{"key":"e_1_3_1_48_2","volume-title":"UCI Machine Learning Repository","year":"2006","unstructured":"Georges H\u00e9brail and Alice Berard. 2006. Individual household electric power consumption. UCI Machine Learning Repository."},{"key":"e_1_3_1_49_2","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/CNS53000.2021.9705034","article-title":"iAttackGen: Generative synthesis of false data injection attacks in cyber-physical systems","author":"Shahriar M. H.","year":"2021","unstructured":"M. H. Shahriar, A. A. Khalil, M. A. Rahman, M. H. Manshaei, and D. Chen. 2021. iAttackGen: Generative synthesis of false data injection attacks in cyber-physical systems. In 2021 IEEE Conference on Communications and Network Security (CNS), 200\u2013208.","journal-title":"2021 IEEE Conference on Communications and Network Security (CNS)"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","unstructured":"Min Lin Qiang Chen and Shuicheng Yan. 2013. Network in network. arXiv:1312.4400. 10.48550\/arXiv.1312.4400","DOI":"10.48550\/arXiv.1312.4400"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","unstructured":"Diederik P. Kingma. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. 10.48550\/arXiv.1412.6980","DOI":"10.48550\/arXiv.1412.6980"},{"key":"e_1_3_1_52_2","unstructured":"Fran\u00e7ois Chollet and others. Keras. (2015). https:\/\/keras.io\/api\/"},{"key":"e_1_3_1_53_2","unstructured":"https:\/\/github.com\/HBMDDS\/fdia_detection.git"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T14:48:23Z","timestamp":1755960503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,23]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,8,31]]}},"alternative-id":["10.1145\/3723164"],"URL":"https:\/\/doi.org\/10.1145\/3723164","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,23]]},"assertion":[{"value":"2024-09-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}