{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:38:22Z","timestamp":1775007502092,"version":"3.50.1"},"reference-count":26,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065643","type":"journal-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T07:47:36Z","timestamp":1756280856000},"page":"3599-3619","source":"Crossref","is-referenced-by-count":1,"title":["Robust False Data Injection Identification Framework for Power Systems Using Explainable Deep Learning"],"prefix":"10.32604","volume":"85","author":[{"given":"Ghadah","family":"Aldehim","sequence":"first","affiliation":[]},{"given":"Shakila","family":"Basheer","sequence":"additional","affiliation":[]},{"given":"Ala Saleh","family":"Alluhaidan","sequence":"additional","affiliation":[]},{"given":"Sapiah","family":"Sakri","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.3390\/electronics14061159","article-title":"Advancing power systems with renewable energy and intelligent technologies: a comprehensive review on grid transformation and integration","volume":"14","author":"Cavus","year":"2025","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"012004","DOI":"10.1088\/2516-1083\/ada198","article-title":"Latest advancements in smart grid technologies and their transformative role in shaping the power systems of tomorrow: an overview","volume":"7","author":"Al-Shetwi","year":"2025","journal-title":"Progress Energy"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"e5004","DOI":"10.1002\/ett.5004","article-title":"A systematic literature review on past attack analysis on industrial control systems","volume":"35","author":"Goel","year":"2024","journal-title":"Trans Emerg Telecomm Technol"},{"key":"ref4","first-page":"102647","article-title":"Securing modern power systems: implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks","volume":"23","author":"Abdelkader","year":"2024","journal-title":"Res Eng"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.3390\/en16041651","article-title":"Review of cybersecurity analysis in smart distribution systems and future directions for using unsupervised learning methods for cyber detection","volume":"16","author":"Pinto","year":"2023","journal-title":"Energies"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.55248\/gengpi.5.1124.3352","article-title":"Predictive analytics for cyber threat intelligence in fintech using big data and machine learning","volume":"5","author":"Ekundayo","year":"2024","journal-title":"Int J Res Publ Rev"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3571728","article-title":"Machine learning applications in internet-of-drones: systematic review, recent deployments, and open issues","volume":"55","author":"Heidari","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"161329","DOI":"10.1109\/ACCESS.2024.3477714","article-title":"Trends in smart grid cyber-physical security: components, threats and solutions","volume":"12","author":"Manias","year":"2024","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s00521-024-10437-2","article-title":"Unlocking the black box: an in-depth review on interpretability, explainability, and reliability in deep learning","volume":"37","author":"\u015eAHiN","year":"2025","journal-title":"Neural Comput Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/OJCOMS.2024.3386872","article-title":"Explainable AI for 6G use cases: technical aspects and research challenges","volume":"5","author":"Wang","year":"2024","journal-title":"IEEE Open J Commun Soc"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"101274","DOI":"10.1016\/j.segan.2024.101274","article-title":"RETINA: distributed and secure trust management for smart grid applications and energy trading","volume":"38","author":"Bolgouras","year":"2024","journal-title":"Sustain Energy Grids Netw"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"935","DOI":"10.1016\/j.icte.2024.05.007","article-title":"Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: methods, taxonomy, challenges and prospects","volume":"10","author":"Sarker","year":"2024","journal-title":"ICT Express"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"4862","DOI":"10.1109\/TSG.2022.3204796","article-title":"Detection of false data injection attacks in smart grid: a secure federated deep learning approach","volume":"13","author":"Li","year":"2022","journal-title":"IEEE Trans Smart Grid"},{"key":"ref14","series-title":"2024 International Conference on Telecommunications and Intelligent Systems (ICTIS)","first-page":"1","article-title":"Adaptive cyber-attack detection in IIoT using attention-based LSTM-CNN models","author":"Gueriani","year":"2024 Dec 14\u201315"},{"key":"ref15","series-title":"6th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","first-page":"1","article-title":"Enhancing iot security with cnn and lstm-based intrusion detection systems","author":"Gueriani","year":"2024 Apr 24\u201325"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"455","DOI":"10.35833\/MPCE.2020.000827","article-title":"Data-driven approach for state prediction and detection of false data injection attacks in smart grid","volume":"11","author":"Reda","year":"2022","journal-title":"J Modern Power Syst Clean Energy"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"101994","DOI":"10.1016\/j.cose.2020.101994","article-title":"Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning","volume":"97","author":"Ashrafuzzaman","year":"2020","journal-title":"Comput Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TSG.2020.3010510","article-title":"Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach","volume":"12","author":"Zhang","year":"2020","journal-title":"IEEE Trans Smart Grid"},{"key":"ref19","first-page":"4339","article-title":"Smart grid security framework for data transmissions with adaptive practices using machine learning algorithm","volume":"82","author":"Selvarajan","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"105429","DOI":"10.1016\/j.imavis.2025.105429","article-title":"Transparency and privacy measures of biometric patterns for data processing with synthetic data using explainable artificial intelligence","volume":"154","author":"Shankar","year":"2025","journal-title":"Image Vis Comput"},{"key":"ref21","first-page":"21670","article-title":"A survey on cyber--physical systems security","volume":"10","author":"Yu","year":"2023","journal-title":"IEEE Int Things J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/MAES.2023.3318226","article-title":"Cybersecurity of unmanned aerial vehicles: a survey","volume":"39","author":"Yu","year":"2023","journal-title":"IEEE Aerospace Electr Syst Mag"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"107058","DOI":"10.1016\/j.compeleceng.2021.107058","article-title":"Detection of false data injection attacks in smart grid based on a new dimensionality-reduction method","volume":"91","author":"Shi","year":"2021","journal-title":"Comput Electr Eng"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2679","DOI":"10.1109\/TPWRS.2021.3127353","article-title":"Detection of false data injection attacks on smart grids: a resilience-enhanced scheme","volume":"37","author":"Li","year":"2021","journal-title":"IEEE Trans Power Syst"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s00202-021-01278-6","article-title":"Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids","volume":"104","author":"Mukherjee","year":"2022","journal-title":"Electr Eng"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2946","DOI":"10.1109\/JSYST.2021.3109082","article-title":"Graph neural networks based detection of stealth false data injection attacks in smart grids","volume":"16","author":"Boyaci","year":"2021","journal-title":"IEEE Syst J"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_65643\/TSP_CMC_65643.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:45Z","timestamp":1764826545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065643","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}