{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:08:47Z","timestamp":1774631327999,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Research on Proactive Cybersecurity Defense and Cyber Range Verification Technology for New-Type Power Systems","award":["kj2024-53"],"award-info":[{"award-number":["kj2024-53"]}]},{"name":"Research on Proactive Cybersecurity Defense and Cyber Range Verification Technology for New-Type Power Systems","award":["kj2024-53"],"award-info":[{"award-number":["kj2024-53"]}]},{"name":"Research on Proactive Cybersecurity Defense and Cyber Range Verification Technology for New-Type Power Systems","award":["kj2024-53"],"award-info":[{"award-number":["kj2024-53"]}]},{"name":"Research on Proactive Cybersecurity Defense and Cyber Range Verification Technology for New-Type Power Systems","award":["kj2024-53"],"award-info":[{"award-number":["kj2024-53"]}]},{"name":"Research on Proactive Cybersecurity Defense and Cyber Range Verification Technology for New-Type Power Systems","award":["kj2024-53"],"award-info":[{"award-number":["kj2024-53"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"DOI":"10.1186\/s42162-025-00533-5","type":"journal-article","created":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T15:11:06Z","timestamp":1748185866000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Research on load frequency control system attack detection method based on multi-model fusion"],"prefix":"10.1186","volume":"8","author":[{"given":"Feng","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Weixun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huifeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Libo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zengjie","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"issue":"10","key":"533_CR1","doi-asserted-by":"publisher","first-page":"6246","DOI":"10.1109\/TSMC.2022.3143903","volume":"52","author":"P Chen","year":"2022","unstructured":"Chen P, Zhang D, Yu L, Yan H (2022) Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks. IEEE Tran Syst Man and Cybern: Syst 52(10):6246\u20136258","journal-title":"IEEE Tran Syst Man and Cybern: Syst"},{"issue":"1","key":"533_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40866-025-00250-8","volume":"10","author":"DK Gupta","year":"2025","unstructured":"Gupta DK, Jha AV, Sahu P, Mohapatra S, Dei G, Appasani B, Srinivasulu A, Nsengiyumva P (2025) Load frequency control analysis of cyber-physical power system with denial-of-service attack in deregulated power markets. Smart Grids Sustain Energy 10(1):1\u201323","journal-title":"Smart Grids Sustain Energy"},{"key":"533_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109150","volume":"116","author":"AY Abdelaziz","year":"2024","unstructured":"Abdelaziz AY, Abo-Elyousr FK et al (2024) Blockchain-based approach for load frequency control of smart grids under denial-of-service attacks. Comput Electr Eng 116:109150","journal-title":"Comput Electr Eng"},{"issue":"1","key":"533_CR4","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/TSG.2022.3190680","volume":"14","author":"S Hu","year":"2022","unstructured":"Hu S, Ge X, Chen X, Yue D (2022) Resilient load frequency control of islanded ac microgrids under concurrent false data injection and denial-of-service attacks. IEEE Trans Smart Grid 14(1):690\u2013700","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"533_CR5","doi-asserted-by":"publisher","first-page":"2357","DOI":"10.1109\/TSG.2022.3147693","volume":"13","author":"X Chen","year":"2022","unstructured":"Chen X, Hu S, Li Y, Yue D, Dou C, Ding L (2022) Co-estimation of state and fdi attacks and attack compensation control for multi-area load frequency control systems under fdi and dos attacks. IEEE Trans Smart Grid 13(3):2357\u20132368","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"533_CR6","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s10922-024-09882-0","volume":"33","author":"A Alfatemi","year":"2025","unstructured":"Alfatemi A, Rahouti M, Hsu DF, Schweikert C, Ghani N, Solyman A, Assaqty MIS (2025) Identifying distributed denial of service attacks through multi-model deep learning fusion and combinatorial analysis. J Netw Syst Manage 33(1):8","journal-title":"J Netw Syst Manage"},{"key":"533_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102050","volume":"102","author":"SM Nagarajan","year":"2024","unstructured":"Nagarajan SM, Devarajan GG, Bashir AK, Al-Otaibi YD et al (2024) Adversarial deep learning based dampster-shafer data fusion model for intelligent transportation system. Inform Fusion 102:102050","journal-title":"Inform Fusion"},{"key":"533_CR8","doi-asserted-by":"crossref","unstructured":"Gao R, Cong Y, Zhang X, Yang L (2025) Multi-feature fusion-based black-box attack detection method for automatic modulation classification. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2025.3546745"},{"key":"533_CR9","doi-asserted-by":"crossref","unstructured":"Zhang Z, Shi K, Chen H, Zhang H, Cao J (2024) An improved integral-based adaptive event-triggered frequency regulation on a dual-link lfc system under mixed attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems","DOI":"10.1109\/TSMC.2024.3395303"},{"key":"533_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2024.131809","volume":"302","author":"AK Chaudhary","year":"2024","unstructured":"Chaudhary AK, Roy S, Guha D, Negi R, Banerjee S (2024) Adaptive cyber-tolerant finite-time frequency control framework for renewable-integrated power system under deception and periodic denial-of-service attacks. Energy 302:131809","journal-title":"Energy"},{"key":"533_CR11","doi-asserted-by":"crossref","unstructured":"Liu J, Zang H, Cheng L, Ding T, Wei Z, Sun G (2025) Robust photovoltaic power forecasting against multi-modal adversarial attack via deep reinforcement learning. IEEE Tran Sustain Energy","DOI":"10.1109\/TSTE.2025.3548089"},{"issue":"4","key":"533_CR12","doi-asserted-by":"publisher","first-page":"6825","DOI":"10.1109\/TII.2024.3353934","volume":"20","author":"X Chen","year":"2024","unstructured":"Chen X, Zhang M, Wu Z, Wu L, Guan X (2024) Model-free load frequency control of nonlinear power systems based on deep reinforcement learning. IEEE Trans Industr Inf 20(4):6825\u20136833","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"533_CR13","doi-asserted-by":"publisher","first-page":"184","DOI":"10.3390\/fi16060184","volume":"16","author":"F Harrou","year":"2024","unstructured":"Harrou F, Bouyeddou B, Dairi A, Sun Y (2024) Exploiting autoencoder-based anomaly detection to enhance cybersecurity in power grids. Future Internet 16(6):184","journal-title":"Future Internet"},{"key":"533_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2024.100381","volume":"17","author":"YM Khaw","year":"2024","unstructured":"Khaw YM, Jahromi AA, Arani MF, Kundur D (2024) Evasive attacks against autoencoder-based cyberattack detection systems in power systems. Energy and AI 17:100381","journal-title":"Energy and AI"},{"key":"533_CR15","doi-asserted-by":"crossref","unstructured":"Narmadha S, Balaji N (2025) Improved network anomaly detection system using optimized autoencoder- lstm. Expert Systems with Applications, 126854","DOI":"10.1016\/j.eswa.2025.126854"},{"issue":"11","key":"533_CR16","doi-asserted-by":"publisher","first-page":"4764","DOI":"10.3390\/app14114764","volume":"14","author":"MJ Abudin","year":"2024","unstructured":"Abudin MJ, Thokchom S, Naayagi R, Panda G (2024) Detecting false data injection attacks using machine learning-based approaches for smart grid networks. Appl Sci 14(11):4764","journal-title":"Appl Sci"},{"key":"533_CR17","doi-asserted-by":"crossref","unstructured":"Cao J, Wang Q, Qu Z, Chen C-L, Dong Y (2025) Method for identifying false data injection attacks in power grid based on improved cnn-lstm. Electr Eng 1\u201326","DOI":"10.1007\/s00202-025-02974-3"},{"issue":"16","key":"533_CR18","doi-asserted-by":"publisher","first-page":"6865","DOI":"10.3390\/app14166865","volume":"14","author":"Z Li","year":"2024","unstructured":"Li Z, Xie Y, Ma R, Wei Z (2024) Optimizing cnn-lstm for the localization of false data injection attacks in power systems. Appl Sci 14(16):6865","journal-title":"Appl Sci"},{"issue":"3","key":"533_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s12083-025-01936-7","volume":"18","author":"X Cao","year":"2025","unstructured":"Cao X (2025) Enhanced security data management in power grids using deep learning with genetic algorithm-based hyperparameter optimization. Peer-to-Peer Netw Appl 18(3):117","journal-title":"Peer-to-Peer Netw Appl"},{"key":"533_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100678","volume":"45","author":"AD Syrmakesis","year":"2024","unstructured":"Syrmakesis AD, Alcaraz C, Hatziargyriou ND (2024) Dar-lfc: A data-driven attack recovery mechanism for load frequency control. Int J Crit Infrastruct Prot 45:100678","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"3","key":"533_CR21","first-page":"2883","volume":"107","author":"MK Pasumponthevar","year":"2025","unstructured":"Pasumponthevar MK, Jeyaraj PR (2025) Kalman reinforcement learning-based provably secured smart grid false data intrusion detection and resilience enhancement. Electr Eng 107(3):2883\u20132901","journal-title":"Electr Eng"},{"issue":"10","key":"533_CR22","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.3390\/en17102340","volume":"17","author":"F Lachekhab","year":"2024","unstructured":"Lachekhab F, Benzaoui M, Tadjer SA, Bensmaine A, Hamma H (2024) Lstm-autoencoder deep learning model for anomaly detection in electric motor. Energies 17(10):2340","journal-title":"Energies"},{"issue":"1","key":"533_CR23","first-page":"20240153","volume":"33","author":"YL Khaleel","year":"2024","unstructured":"Khaleel YL, Habeeb MA, Albahri A, Al-Quraishi T, Albahri O, Alamoodi A (2024) Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods. J Intell Syst 33(1):20240153","journal-title":"J Intell Syst"},{"key":"533_CR24","doi-asserted-by":"crossref","unstructured":"Moradi M, Panahi S, Zhai Z-M, Weng Y, Dirkman J, Lai Y-C (2024) Heterogeneous reinforcement learning for defending power grids against attacks. APL Mach Learn 2(2)","DOI":"10.1063\/5.0216874"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00533-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42162-025-00533-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00533-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T15:11:08Z","timestamp":1748185868000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-025-00533-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,25]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["533"],"URL":"https:\/\/doi.org\/10.1186\/s42162-025-00533-5","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,25]]},"assertion":[{"value":"17 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"72"}}