{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:38:22Z","timestamp":1775007502089,"version":"3.50.1"},"reference-count":29,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066097","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T08:44:43Z","timestamp":1756111483000},"page":"3861-3877","source":"Crossref","is-referenced-by-count":1,"title":["DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid"],"prefix":"10.32604","volume":"85","author":[{"given":"Yunhao","family":"Yu","sequence":"first","affiliation":[]},{"given":"Meiling","family":"Dizha","sequence":"additional","affiliation":[]},{"given":"Boda","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruibin","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Fuhua","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Junjie","family":"Song","sequence":"additional","affiliation":[]},{"given":"Bingdong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"123","article-title":"A distributed IoT infrastructure to test and deploy real-time demand response in smart grids","volume":"9","author":"Barbierato","year":"2022","journal-title":"IEEE Int Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1632","DOI":"10.1109\/TSG.2022.3166793","article-title":"Extracting umbrella constraint-based representation of local electricity markets","volume":"14","author":"Zhang","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1109\/TSG.2017.2784366","article-title":"Financially motivated FDI on SCED in real-time electricity markets: attacks and mitigation","volume":"10","author":"Liu","year":"2019","journal-title":"IEEE Trans Smart Grid"},{"key":"ref4","series-title":"2023 IEEE 6th International Electrical and Energy Conference","first-page":"3392","article-title":"Weather sensitive residential load forecasting using neural networks","author":"Chen","year":"2023 May 12\u201314"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"7659","DOI":"10.1109\/JIOT.2019.2903312","article-title":"Energy theft detection with energy privacy preservation in the smart grid","volume":"6","author":"Yao","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/TIFS.2022.3226868","article-title":"SPMA: stealthy physics-manipulated attack and countermeasures in cyber-physical smart grid","volume":"18","author":"Zhang","year":"2023","journal-title":"IEEE Transact Inform Foren Secur Publicat Inform"},{"key":"ref7","series-title":"2009 IEEE Bucharest PowerTech; 2009 Jun 28\u2013Jul 2","first-page":"1","article-title":"Towards quantifying the impacts of cyber attacks in the competitive electricity market environment","author":"Negrete-Pincetic"},{"key":"ref8","series-title":"The First IEEE International Conference on Smart Grid Communications; 2010 Oct 4\u20136","first-page":"226","article-title":"False data injection attacks in electricity markets","author":"Xie"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"Xie","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"121405","DOI":"10.1016\/j.apenergy.2023.121405","article-title":"Data security of machine learning applied in low-carbon smart grid: a formal model for the physics-constrained robustness","volume":"347","author":"Zhang","year":"2023","journal-title":"Appl Energy"},{"key":"ref11","series-title":"IEEE International Conference on Acoustics, Speech and Signal Processing; 2011 May 22\u201327","first-page":"5952","article-title":"Malicious data attack on real-time electricity market","author":"Jia"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/TSG.2011.2123925","article-title":"Modeling load redistribution attacks in power systems","volume":"2","author":"Yuan","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1109\/TSG.2012.2228508","article-title":"Ramp-induced data attacks on look-ahead dispatch in real-time power markets","volume":"4","author":"Choi","year":"2013","journal-title":"IEEE Trans Smart Grid"},{"key":"ref14","series-title":"IEEE Power & Energy Society General Meeting; 2017 Jul 16\u201320","first-page":"1","article-title":"A framework for modeling load redistribution attacks coordinating with switching attacks","author":"Xiang"},{"key":"ref15","series-title":"IEEE Energy Conversion Congress and Exposition; 2022 Oct 9\u201313","first-page":"1","article-title":"Load redistribution attacks in multi-terminal DC grids","author":"Zhang"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1109\/TSG.2013.2291661","article-title":"Local load redistribution attacks in power systems with incomplete network information","volume":"5","author":"Liu","year":"2014","journal-title":"IEEE Trans Smart Grid"},{"key":"ref17","series-title":"2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems; 2023 May 8\u201311","first-page":"1","article-title":"Load redistribution attack in optimal power flow with phase shifting transformers","author":"Zhu"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1109\/JAS.2021.1004090","article-title":"Kernel generalization of multi-rate probabilistic principal component analysis for fault detection in nonlinear process","volume":"8","author":"Zheng","year":"2021","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"ref19","series-title":"2013 IEEE Global Communications Conference; 2013 Dec 9\u201313","first-page":"808","article-title":"Detecting stealthy false data injection using machine learning in smart grid","author":"Esmalifalak"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1109\/JSYST.2014.2341597","article-title":"Detecting stealthy false data injection using machine learning in smart grid","volume":"11","author":"Esmalifalak","year":"2017","journal-title":"IEEE Syst J"},{"key":"ref21","series-title":"2018 IEEE Power & Energy Society General Meeting; 2018 Aug 5\u20139","first-page":"1","article-title":"Load redistribution attack detection using machine learning: a data-driven approach","author":"Pinceti"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4772","DOI":"10.1109\/TSG.2023.3256480","article-title":"A deep learning-based attack detection mechanism against potential cascading failure induced by load redistribution attacks","volume":"14","author":"Khaleghi","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4827","DOI":"10.1109\/TSG.2023.3261970","article-title":"Localizing false data injection attacks in smart grid: a spectrum-based neural network approach","volume":"14","author":"Peng","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1792","DOI":"10.1109\/TSG.2019.2929702","article-title":"Dummy data attacks in power systems","volume":"11","author":"Liu","year":"2020","journal-title":"IEEE Trans Smart Grid"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/JAS.2023.123243","article-title":"Detecting the one-shot dummy attack on the power industrial control processes with an unsupervised data-driven approach","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.1109\/TPWRS.2007.907521","article-title":"Continuous locational marginal pricing (CLMP)","volume":"22","author":"Li","year":"2007","journal-title":"IEEE Trans Power Syst"},{"key":"ref27","series-title":"2010 IEEE PES General Meeting; 2010 Jul 25\u201329","first-page":"1","article-title":"Improving an unjustified common practice in Ex Post LMP calculation: an expanded version","author":"Li"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"18951","DOI":"10.1109\/JIOT.2024.3349381","article-title":"Vulnerability of machine learning approaches applied in IoT-based smart grid: a review","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TPWRS.2009.2016599","article-title":"Congestion and price prediction under load variation","volume":"24","author":"Li","year":"2009","journal-title":"IEEE Trans Power Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_66097\/TSP_CMC_66097.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:47Z","timestamp":1764826547000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066097","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}