{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:15:45Z","timestamp":1776442545074,"version":"3.51.2"},"reference-count":33,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067180","type":"journal-article","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:32:25Z","timestamp":1755851545000},"page":"3739-3766","source":"Crossref","is-referenced-by-count":2,"title":["Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion"],"prefix":"10.32604","volume":"85","author":[{"given":"Zehui","family":"Qi","sequence":"first","affiliation":[]},{"given":"Sixing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"108975","DOI":"10.1016\/j.epsr.2022.108975","article-title":"A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future","volume":"215","author":"Ghiasi","year":"2023","journal-title":"Elect Power Syst Res"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"124607","DOI":"10.1016\/j.eswa.2024.124607","article-title":"Markov game based on reinforcement learning solution against cyber-physical attacks in smart grid","volume":"255","author":"Bitirgen","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"57260","DOI":"10.1109\/ACCESS.2020.2982057","article-title":"Method for extracting patterns of coordinated network attacks on electric power CPS based on temporal-topological correlation","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"682","DOI":"10.3390\/en12040682","article-title":"A survey on power system blackout and cascading events: research motivations and challenges","volume":"12","author":"Haes Alhelou","year":"2019","journal-title":"Energies"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"118347","DOI":"10.1016\/j.apenergy.2021.118347","article-title":"A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems","volume":"308","author":"Li","year":"2022","journal-title":"Appl Energy"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3864","DOI":"10.1109\/TPWRS.2015.2504950","article-title":"Vulnerability analysis and consequences of false data injection attack on power system state estimation","volume":"31","author":"Liang","year":"2015","journal-title":"IEEE Trans Power Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1109\/TSG.2019.2949998","article-title":"A survey on the detection algorithms for false data injection attacks in smart grids","volume":"11","author":"Musleh","year":"2019","journal-title":"IEEE Trans Smart Grid"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.is.2014.12.001","article-title":"Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid","volume":"53","author":"Anwar","year":"2015","journal-title":"Inf Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/TII.2017.2720726","article-title":"Joint-transformation-based detection of false data injection attacks in smart grid","volume":"14","author":"Singh","year":"2017","journal-title":"IEEE Trans Ind Inform"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1109\/TSG.2016.2544854","article-title":"A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks","volume":"7","author":"Khalid","year":"2016","journal-title":"IEEE Trans Smart Grid"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/JSYST.2017.2741483","article-title":"A prediction algorithm to enhance grid resilience toward cyber attacks in WAMCS applications","volume":"13","author":"Musleh","year":"2017","journal-title":"IEEE Syst J"},{"key":"ref13","first-page":"3214","article-title":"Detection and isolation of false data injection attacks in smart grid via unknown input interval observer","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Int Things J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"012134","DOI":"10.1088\/1742-6596\/1633\/1\/012134","article-title":"False data injection attacks detection on power systems with convolutional neural network","volume":"1633","author":"Lu","year":"2020","journal-title":"J Phys Conf Ser"},{"key":"ref15","series-title":"2020 35th Youth Academic Annual Conference of Chinese Association of Automation (YAC)","first-page":"638","article-title":"LSTM-based false data injection attack detection in smart grids","author":"Zhao","year":"2020"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1938","DOI":"10.3390\/electronics13101938","article-title":"Detection of false data injection attacks on smart grids based on A-BiTG approach","volume":"13","author":"He","year":"2024","journal-title":"Electronics"},{"key":"ref17","first-page":"8218","article-title":"Locational detection of the false data injection attack in a smart grid: a multilabel classification approach","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Int Things J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1109\/TII.2020.2984315","article-title":"Extreme learning machine-based state reconstruction for automatic attack filtering in cyber physical power system","volume":"17","author":"Wu","year":"2020","journal-title":"IEEE Trans Industr Inform"},{"key":"ref19","first-page":"657","article-title":"Interval observer-based detection and localization against false data injection attack in smart grids","volume":"8","author":"Luo","year":"2020","journal-title":"IEEE Int Things J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"100702","DOI":"10.1016\/j.segan.2022.100702","article-title":"A novel strategy for locational detection of false data injection attack","volume":"31","author":"Mukherjee","year":"2022","journal-title":"Sustain Energy Grids Netw"},{"key":"ref21","series-title":"Advances in Thermofluids and Renewable Energy: Select Proceedings of TFRE 2020","first-page":"599","article-title":"A novel architecture for cluster based false data injection attack detection and location identification in smart grid","author":"Mallikarjunaswamy","year":"2021"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"101705","DOI":"10.1016\/j.sysarc.2019.101705","article-title":"Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system","volume":"105","author":"Li","year":"2020","journal-title":"J Syst Archit"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2946","DOI":"10.1109\/JSYST.2021.3109082","article-title":"Graph neural networks based detection of stealth false data injection attacks in smart grids","volume":"16","author":"Boyaci","year":"2021","journal-title":"IEEE Syst J"},{"key":"ref24","series-title":"2022 9th International Conference on Electrical and Electronics Engineering (ICEEE)","first-page":"217","article-title":"Cyberattack detection in large-scale smart grids using Chebyshev graph convolutional networks","author":"Boyaci","year":"2022"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TSG.2021.3117977","article-title":"Joint detection and localization of stealth false data injection attacks in smart grids using graph neural networks","volume":"13","author":"Boyaci","year":"2021","journal-title":"IEEE Trans Smart Grid"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"125865","DOI":"10.1016\/j.energy.2022.125865","article-title":"Graph-based detection for false data injection attacks in power grid","volume":"263","author":"Li","year":"2023","journal-title":"Energy"},{"key":"ref27","first-page":"9324","article-title":"Locational detection of false data injection attacks in smart grids: a graph convolutional attention network approach","volume":"11","author":"Xia","year":"2023","journal-title":"IEEE Int Things J"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"121706","DOI":"10.1016\/j.eswa.2023.121706","article-title":"Detection of false data injection attack in power grid based on spatial-temporal transformer network","volume":"238","author":"Li","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"103016","DOI":"10.1016\/j.cose.2022.103016","article-title":"False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids","volume":"124","author":"Han","year":"2023","journal-title":"Comput Secur"},{"key":"ref30","first-page":"7793","article-title":"Beyond homophily in graph neural networks: current limitations and effective designs","volume":"33","author":"Zhu","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref31","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"1341","article-title":"Homogcl: rethinking homophily in graph contrastive learning","author":"Li","year":"2023"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"110537","DOI":"10.1016\/j.patcog.2024.110537","article-title":"Self-attention empowered graph convolutional network for structure learning and node embedding","volume":"153","author":"Jiang","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref33","series-title":"Machine Learning and Knowledge Discovery in Databases Research Track: European Conference; ECML PKDD 2021","first-page":"633","article-title":"Causal explanation of convolutional neural networks","author":"Debbi","year":"2021 Sep 13\u201317","journal-title":"Springer International Publishing"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67180\/TSP_CMC_67180.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:46Z","timestamp":1764826546000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067180","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}