{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:02:05Z","timestamp":1760101325012,"version":"3.38.0"},"reference-count":37,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Science and Technology Project of State Grid Shandong Electric Power Company"},{"DOI":"10.13039\/501100010211","name":"Education Department of Jilin Province","doi-asserted-by":"publisher","award":["JJKH20200118KJ"],"award-info":[{"award-number":["JJKH20200118KJ"]}],"id":[{"id":"10.13039\/501100010211","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873057"],"award-info":[{"award-number":["61873057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering"],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:p> This article mainly focuses on the attack location and defense of cyber-physical power systems under dynamic load altering attacks. Taking the smart grid as an example, first, the cyber-physical power system model under attack is established to provide conditions for attack detection. On this basis, an adaptive observer with [Formula: see text] performance is designed to realize detection and location through residual signal and attack estimation, respectively. Furthermore, a power redistribution strategy based on optimal economic scheduling is presented to realize attack defense by means of the observer data. Finally, theoretical analysis proves the feasibility of the algorithm, and simulation cases prove the effectiveness of attack location and defense strategies. <\/jats:p>","DOI":"10.1177\/09596518211032069","type":"journal-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T05:20:21Z","timestamp":1627017621000},"page":"294-304","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Adaptive observer-based attack location and defense strategy in smart grid"],"prefix":"10.1177","volume":"236","author":[{"given":"Wenting","family":"Wang","sequence":"first","affiliation":[{"name":"State Grid Shandong Electric Power Company, Electric Power Research Institute, Jinan, P.R. China"}]},{"given":"Qiang","family":"Ma","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.R. China"}]},{"given":"Lin","family":"Lin","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.R. China"}]},{"given":"Ti","family":"Guan","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.R. China"}]},{"given":"Dawei","family":"Tian","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.R. China"}]},{"given":"Shuqi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Automation Engineering, Northeast Electric Power University, Jilin, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3485-0551","authenticated-orcid":false,"given":"Jian","family":"Li","sequence":"additional","affiliation":[{"name":"School of Automation Engineering, Northeast Electric Power University, Jilin, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"key":"bibr1-09596518211032069","first-page":"37","volume":"45","author":"Li H","year":"2019","journal-title":"Acta Automatica Sinica"},{"key":"bibr2-09596518211032069","first-page":"44","volume":"15","author":"Li C.","year":"2016","journal-title":"Electronic Testing"},{"first-page":"1","volume-title":"2017 IEEE conference on energy internet and energy system integration (EI2)","author":"Su Z","key":"bibr3-09596518211032069"},{"volume-title":"Analysis and protection of power grid data injection attacks based on cyber-physical fusion method","year":"2018","author":"Liu C.","key":"bibr4-09596518211032069"},{"first-page":"244","volume-title":"2010 First IEEE international conference on smart grid communications","author":"Kundur D","key":"bibr5-09596518211032069"},{"key":"bibr6-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2387381"},{"first-page":"857","volume-title":"2016 IEEE PES Asia-Pacific power and energy engineering conference (APPEEC)","author":"Tang Y","key":"bibr7-09596518211032069"},{"key":"bibr8-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2863689"},{"key":"bibr9-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2902105"},{"key":"bibr10-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3014253"},{"key":"bibr11-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.2965501"},{"key":"bibr12-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.071"},{"key":"bibr13-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2019.05.001"},{"key":"bibr14-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2021.104836"},{"key":"bibr15-09596518211032069","first-page":"282","volume":"353","author":"Li J","year":"2019","journal-title":"Appl Math Comput"},{"key":"bibr16-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2020.08.041"},{"key":"bibr17-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1177\/0959651817733222"},{"key":"bibr18-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1177\/0959651820939694"},{"first-page":"1","volume-title":"2016 IEEE power and energy society general meeting (PESGM)","author":"Guo J","key":"bibr19-09596518211032069"},{"first-page":"816","volume-title":"2017 8th IEEE international conference on software engineering and service science (ICSESS)","author":"Chu X","key":"bibr20-09596518211032069"},{"key":"bibr21-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.055"},{"key":"bibr22-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"bibr23-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995772"},{"key":"bibr24-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2894946"},{"key":"bibr25-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.58"},{"key":"bibr26-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2021.02.008"},{"key":"bibr27-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"first-page":"1","volume-title":"2015 IEEE power energy society innovative smart grid technologies conference (ISGT)","author":"Amini S","key":"bibr28-09596518211032069"},{"key":"bibr29-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2626267"},{"key":"bibr30-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902163"},{"key":"bibr31-09596518211032069","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2016.1313"},{"volume-title":"Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems","year":"2004","author":"Scholtz E.","key":"bibr32-09596518211032069"},{"first-page":"3918","volume-title":"Proceedings of the 2011 American control conference","author":"Pasqualetti F","key":"bibr33-09596518211032069"},{"issue":"4","key":"bibr34-09596518211032069","first-page":"483","volume":"34","author":"Mu L","year":"2017","journal-title":"Control Theory Appl"},{"issue":"7","key":"bibr35-09596518211032069","first-page":"131","volume":"33","author":"Wang Z","year":"2016","journal-title":"Comput Simul"},{"issue":"11","key":"bibr36-09596518211032069","first-page":"3687","volume":"36","author":"Hu Z","year":"2015","journal-title":"Acta Aeronaut Sinica"},{"volume-title":"Modeling technique and vulnerability assessment of electrical cyber physical systems considering cyber attacks","year":"2017","author":"Wang Y.","key":"bibr37-09596518211032069"}],"container-title":["Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09596518211032069","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09596518211032069","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09596518211032069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T23:23:51Z","timestamp":1740871431000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09596518211032069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,22]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["10.1177\/09596518211032069"],"URL":"https:\/\/doi.org\/10.1177\/09596518211032069","relation":{},"ISSN":["0959-6518","2041-3041"],"issn-type":[{"type":"print","value":"0959-6518"},{"type":"electronic","value":"2041-3041"}],"subject":[],"published":{"date-parts":[[2021,7,22]]}}}