{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:10Z","timestamp":1776926350501,"version":"3.51.2"},"reference-count":51,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065496","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T08:05:20Z","timestamp":1753085120000},"page":"5859-5877","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of False Data Injection Attacks: A Protected Federated Deep Learning Based on Encryption Mechanism"],"prefix":"10.32604","volume":"84","author":[{"given":"Chenxin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Qun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ximing","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yaochang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yijia","family":"Xu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TII.2011.2166794","article-title":"Smart grid technologies: communication technologies and standards","volume":"7","author":"Gungor","year":"2011","journal-title":"IEEE Trans Ind Inf"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1002\/9781119968696","author":"Ekanayake","year":"2012","journal-title":"Smart grid: technology and applications"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/JPROC.2015.2503119","article-title":"Smart grids: a cyber\u2013physical systems perspective","volume":"104","author":"Yu","year":"2016","journal-title":"Proc IEEE"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1109\/TNSM.2025.3525554","article-title":"Federated learning under attack: exposing vulnerabilities through data poisoning attacks in computer networks","volume":"22","author":"Nowroozi","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"112905","DOI":"10.1016\/j.asoc.2025.112905","article-title":"Unknown web attack threat detection based on large language model","volume":"173","author":"Xu","year":"2025","journal-title":"Appl Soft Comput"},{"key":"ref6","series-title":"The 16th ACM Conference on Computer and Communications Security (CCS \u201909)","first-page":"21","article-title":"False data injection attacks against state estimation in electric power grids","author":"Liu","year":"2009"},{"key":"ref7","first-page":"3","article-title":"Analysis of the cyber attack on the Ukrainian power grid","volume":"388","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref8","series-title":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","first-page":"1","article-title":"Limiting false data attacks on power system state estimation","author":"Kosut","year":"2010"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1049\/iet-gtd.2018.5139","article-title":"Detection and isolation of false data injection attack for smart grids via unknown input observers","volume":"13","author":"Luo","year":"2019","journal-title":"IET Generation Trans & Dist"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2679","DOI":"10.1109\/TPWRS.2021.3127353","article-title":"Detection of false data injection attacks on smart grids: A resilience\u2013enhanced scheme","volume":"37","author":"Li","year":"2022","journal-title":"IEEE Trans Power Syst"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TSG.2020.3010510","article-title":"Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach","volume":"12","author":"Zhang","year":"2021","journal-title":"IEEE Trans Smart Grid"},{"key":"ref12","first-page":"22","article-title":"Distributed state estimation of active distribution networks considering false data injection attacks","volume":"41","author":"Huang","year":"2022","journal-title":"Electric Power Engi Technol"},{"key":"ref13","first-page":"1","article-title":"Distributed detection method for a false data attack in a power grid based on edge computing","volume":"49","author":"Huang","year":"2021","journal-title":"Power Syst Prot Control"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2946","DOI":"10.1109\/JSYST.2021.3109082","article-title":"Graph neural networks based detection of stealth false data injection attacks in smart grids","volume":"16","author":"Boyaci","year":"2021","journal-title":"IEEE System J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TII.2024.3452202","article-title":"Distributed unsupervised detection for robust power system false data attacks via flexible dynamic time warping strategy","volume":"21","author":"Wu","year":"2024","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref16","series-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"1567","article-title":"Pre-training enhanced spatial-temporal graph neural network for multivariate time series forecasting","author":"Shao","year":"2022"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4862","DOI":"10.1109\/TSG.2022.3204796","article-title":"Detection of false data injection attacks in smart grid: a secure federated deep learning approach","volume":"13","author":"Li","year":"2022","journal-title":"IEEE Trans Smart Grid"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","article-title":"False data injection on state estimation in power systems\u2014Attacks, impacts, and defense: a survey","volume":"13","author":"Deng","year":"2016","journal-title":"IEEE Trans Industr Inform"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"108779","DOI":"10.1016\/j.compbiomed.2024.108779","article-title":"Propensity Weighted federated learning for treatment effect estimation in distributed imbalanced environments","volume":"178","author":"Almod\u00f3var","year":"2024","journal-title":"Comput Biol Med"},{"key":"ref20","unstructured":"Xia Y, Yang D, Li W, Myronenko A, Xu D, Obinata H, et al. Auto-FedAvg: learnable federated averaging for multi-institutional medical image segmentation. arXiv preprint. 2021. doi:10.48550\/arXiv.2104.10195."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"109095","DOI":"10.1016\/j.ijpe.2023.109095","article-title":"A federated machine learning approach for order-level risk prediction in supply chain financing","volume":"268","author":"Kong","year":"2024","journal-title":"Int J Prod Econ"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/0952813X.2022.2079730","article-title":"AFedAvg: communication-efficient federated learning aggregation with adaptive communication frequency and gradient sparse","volume":"36","author":"Li","year":"2024","journal-title":"J Exp Theor Artif Intell"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/TII.2022.3203395","article-title":"Federated learning-based cross-enterprise recommendation with graph neural networks","volume":"19","author":"Li","year":"2023","journal-title":"IEEE Trans Ind Inf"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"110150","DOI":"10.1016\/j.epsr.2024.110150","article-title":"Privacy-preserving federated learning for detecting false data injection attacks on power system","volume":"229","author":"Lin","year":"2024","journal-title":"Electr Power Syst Res"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1109\/TIFS.2023.3267892","article-title":"An efficient privacy-enhancing cross-silo federated learning and applications for false data injection attack detection in smart grids","volume":"18","author":"Tran","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref26","first-page":"421","author":"Bottou","year":"2012","journal-title":"Neural networks: tricks of the trade"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-031-13584-2_7","author":"Huang","year":"2022","journal-title":"Applied time series analysis and forecasting with python"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"5502","DOI":"10.3390\/s24175502","article-title":"Spatial-temporal transformer networks for traffic flow forecasting using a pre-trained language model","volume":"24","author":"Ma","year":"2024","journal-title":"Sensors"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"8880530","DOI":"10.1155\/2023\/8880530","article-title":"STGNN-FAM: a traffic flow prediction model for spatiotemporal graph networks based on fusion of attention mechanisms","volume":"2023","author":"Qi","year":"2023","journal-title":"J Adv Transp"},{"key":"ref30","first-page":"100207","volume":"4","author":"Pan","year":"2025","journal-title":"Urban intersection traffic flow prediction: a physics-guided stepwise framework utilizing spatio-temporal graph neural network algorithms"},{"key":"ref31","first-page":"83","article-title":"An interval forecast model for infectious diseases using fuzzy information granulation and spatial-temporal graph neural network","volume":"47","author":"Hu","year":"2024","journal-title":"J Intell Fuzzy Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"105615","DOI":"10.1016\/j.asoc.2019.105615","article-title":"An artificial intelligent-based model for detecting systolic pathological patterns of phonocardiogram based on time-growing neural network","volume":"83","author":"Gharehbaghi","year":"2019","journal-title":"Appl Soft Comput"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"109398","DOI":"10.1016\/j.engappai.2024.109398","article-title":"Multi-area short-term load forecasting based on spatiotemporal graph neural network","volume":"138","author":"Lv","year":"2024","journal-title":"Eng Appl Artif Intell"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1109\/TSG.2023.3315750","article-title":"A multi-scale spatial-temporal graph neural network-based method of multienergy load forecasting in integrated energy system","volume":"15","author":"Zhuang","year":"2024","journal-title":"IEEE Trans Smart Grid"},{"key":"ref35","series-title":"2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2)","first-page":"4977","article-title":"Stealth FDIA localization in power systems using spatio-temporal graph neural networks","author":"Wang","year":"2023"},{"key":"ref36","first-page":"509","article-title":"Application layer DDoS detection method based on spatio-temporal graph neural network","volume":"24","author":"Wang","year":"2024","journal-title":"Netinfo Secur"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"166","DOI":"10.3390\/a18030166","article-title":"A GNN-based false data detection scheme for smart grids","volume":"18","author":"Qiu","year":"2025","journal-title":"Algorithms"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","author":"Cheon","year":"2017","journal-title":"Advances in Cryptology-ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security"},{"key":"ref39","first-page":"199","author":"Wu","year":"2024","journal-title":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"171540","DOI":"10.1109\/ACCESS.2024.3498040","article-title":"Privacy-preserving rule induction using CKKS","volume":"12","author":"Choi","year":"2024","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1109\/TIFS.2024.3516553","article-title":"EvalComp: bootstrapping based on homomorphic comparison function for CKKS","volume":"20","author":"Li","year":"2025","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3233\/JHS-222016","article-title":"A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT","volume":"29","author":"Su","year":"2023","journal-title":"J High Speed Netw"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","article-title":"Privacy-preserving machine learning with fully homomorphic encryption for deep neural network","volume":"10","author":"Lee","year":"2022","journal-title":"IEEE Access"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"67469","DOI":"10.1007\/s11042-024-18113-2","article-title":"Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption","volume":"83","author":"Zhang","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1939","DOI":"10.1109\/TCSI.2024.3479427","article-title":"A privacy-preserving federated reinforcement learning method for multiple virtual power plants scheduling[J]","volume":"72","author":"Yang","year":"2025","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"ref46","unstructured":"Fathony RZA. Performance-aligned learning algorithms with statistical guarantees. Chicago: University of Illinois; 2019. [cited 2025 Apr 15]. Available from: https:\/\/www.proquest.com\/docview\/2342583943?sourcetype=Dissertations%20&%20Theses."},{"key":"ref47","doi-asserted-by":"crossref","first-page":"5481","DOI":"10.5194\/gmd-15-5481-2022","article-title":"Root-mean-square error (RMSE) or mean absolute error (MAE): when to use them or not","volume":"15","author":"Hodson","year":"2022","journal-title":"Geosci Model Dev"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1186\/s40537-021-00444-8","article-title":"Review of deep learning: concepts, CNN architectures, challenges, applications, future directions","volume":"8","author":"Alzubaidi","year":"2021","journal-title":"J Big Data"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1162\/neco_a_01199","article-title":"A review of recurrent neural networks: LSTM cells and network architectures","volume":"31","author":"Yu","year":"2019","journal-title":"Neural Comput"},{"key":"ref50","first-page":"168","author":"Taheri","year":"2024","journal-title":"International Conference on Information and Knowledge Systems"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1186\/s42400-024-00232-w","article-title":"FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption","volume":"7","author":"Pan","year":"2024","journal-title":"Cybersecurity"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65496\/TSP_CMC_65496.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:35Z","timestamp":1776923135000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":51,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065496","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}