{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T22:58:52Z","timestamp":1777071532620,"version":"3.51.4"},"reference-count":36,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T00:00:00Z","timestamp":1683158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Scientific and Technological Project of the State Grid Shanghai Municipal Electric Power Company","award":["B30940220003"],"award-info":[{"award-number":["B30940220003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>As a new cyber-attack method in power cyber physical systems, false-data-injection attacks (FDIAs) mainly disturb the operating state of power systems by tampering with the measurement data of sensors, thereby avoiding bad-data detection by the power grid and threatening the security of power systems. However, existing FDIA detection methods usually only focus on the detection feature extraction between false data and normal data, ignoring the feature correlation that easily produces diverse data redundancy, resulting in the significant difficulty of detecting false-data-injection attacks. To address the above problem, we propose a multi-source self-attention data fusion model for designing an efficient FDIA detection method. The proposed data fusing model firstly employs a temporal alignment technique to integrate the collected multi-source sensing data to the identical time dimension. Subsequently, a symmetric hybrid deep network model is built by symmetrically combining long short-term memory (LSTM) and a convolution neural network (CNN), which can effectively extract hybrid features for different multi-source sensing data. Furthermore, we design a self-attention module to further eliminate hybrid feature redundancy and aggregate the differences between attack-data features and normal-data features. Finally, the extracted features and their weights are integrated to implement false-data-injection attack detection using a single convolution operation. Extensive simulations are performed over IEEE14 node test systems and IEEE118 node test systems; the experimental results demonstrate that our model can achieve better data fusion effects and presents a superior detection performance compared with the state-of-the-art.<\/jats:p>","DOI":"10.3390\/sym15051019","type":"journal-article","created":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T02:28:02Z","timestamp":1683167282000},"page":"1019","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Efficient Multi-Source Self-Attention Data Fusion for FDIA Detection in Smart Grid"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5913-2126","authenticated-orcid":false,"given":"Yi","family":"Wu","sequence":"first","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Shanghai 200122, China"}]},{"given":"Qiankuan","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 201306, China"}]},{"given":"Naiwang","family":"Guo","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Shanghai 200122, China"}]},{"given":"Yingjie","family":"Tian","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, Shanghai 200122, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-8164","authenticated-orcid":false,"given":"Fengyong","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 201306, China"}]},{"given":"Xiangjing","family":"Su","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Shanghai University of Electric Power, Shanghai 201306, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Liu, X., Zeng, X., Yao, L., Rashed, G.I., and Deng, C. (2018, January 20\u201322). Power System State Estimation Based on Fusion of WAMS\/SCADA Measurements: A Survey. Proceedings of the 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China.","DOI":"10.1109\/EI2.2018.8582102"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jiang, C., Huang, C., Huang, Q., and Shi, J. (2021). A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm. Symmetry, 13.","DOI":"10.3390\/sym13091718"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ucar, F. (2023). A Comprehensive Analysis of Smart Grid Stability Prediction along with Explainable Artificial Intelligence. Symmetry, 15.","DOI":"10.3390\/sym15020289"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"90","DOI":"10.3390\/sym15010090","article-title":"Modern Active Voltage Control in Distribution Networks, including Distributed Generation, Using the Hardware-in-the-Loop Technique","volume":"15","author":"Fahmy","year":"2022","journal-title":"Symmetry"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5541","DOI":"10.1109\/TII.2019.2901768","article-title":"Stability of Transactive Energy Market-Based Power Distribution System under Data Integrity Attack","volume":"15","author":"Jhala","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TII.2019.2926557","article-title":"Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs","volume":"16","author":"Bahrami","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.apenergy.2019.01.224","article-title":"Uncertainties of Virtual Power Plant: Problems and Countermeasures","volume":"239","author":"Yu","year":"2019","journal-title":"Appl. Energy"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"460","DOI":"10.3390\/sym13030460","article-title":"Novel Approach to Collect and Process Power Quality Data in Medium-Voltage Distribution Grids","volume":"13","author":"Sergei","year":"2021","journal-title":"Symmetry"},{"key":"ref_9","first-page":"2571","article-title":"A Novel Method to Improve the Fault Location Accuracy in Transmission Line Based on Data Fusion Technology","volume":"37","author":"Jiao","year":"2017","journal-title":"Proc. CSEE"},{"key":"ref_10","first-page":"115733","article-title":"Artificial Intelligence Techniques for Stability Analysis and Control in Smart Grids: Methodologies, Applications, Challenges and Future Directions","volume":"278","author":"Shi","year":"2020","journal-title":"Energies"},{"key":"ref_11","unstructured":"Kumar, R.S., Saravanan, S., Pandiyan, P., and Tiwari, R. (2023). Smart Energy and Electric Power Systems, Elsevier."},{"key":"ref_12","first-page":"100","article-title":"Status Monitoring and Fault Handling Method Based on Big Data Analysis of Intelligent Distribution Network","volume":"7","author":"Lin","year":"2018","journal-title":"Digit. Technol. Appl."},{"key":"ref_13","first-page":"480","article-title":"Research and Application of Multi-Source Big Data Fusion Method in Power Grid","volume":"2","author":"Qin","year":"2021","journal-title":"IEEE Electr. Device"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wahid, A., Breslin, J.G., and Intizar, M.A. (2022). Prediction of Machine Failure in Industry 4.0: A Hybrid CNN-LSTM Framework. Appl. Sci., 12.","DOI":"10.3390\/app12094221"},{"key":"ref_15","unstructured":"Mehta, S., and Rastegari, M. (2022). Separable Self-Attention for Mobile Vision Transformers. arXiv."},{"key":"ref_16","first-page":"012134","article-title":"False Data Injection Attacks Detection on Power Systems with Convolutional Neural Network","volume":"1633","author":"Lu","year":"2020","journal-title":"JPCS"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"85454","DOI":"10.1109\/ACCESS.2020.2991067","article-title":"A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid","volume":"8","author":"Alazab","year":"2020","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Alimi, O.A., Ouahada, K., and Abu-Mahfouz, A.M. (2019). Real Time Security Assessment of the Power System Using a Hybrid Support Vector Machine and Multilayer Perceptron Neural Network Algorithms. Sustainability, 11.","DOI":"10.3390\/su11133586"},{"key":"ref_19","first-page":"131","article-title":"A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data","volume":"63","author":"Cheng","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Saleh, K., Hossny, M., and Nahavandi, S. (2017, January 16\u201319). Driving Behavior Classification Based on Sensor Data Fusion Using LSTM Recurrent Neural Networks. Proceedings of the 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), Yokohama, Japan.","DOI":"10.1109\/ITSC.2017.8317835"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"482","DOI":"10.35833\/MPCE.2021.000050","article-title":"Physical-Data Fusion Modeling Method for Energy Consumption Analysis of Smart Building","volume":"10","author":"Han","year":"2022","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"4392","DOI":"10.1109\/TIE.2017.2764844","article-title":"NB-CNN: Deep Learning-Based Crack Detection Using Convolutional Neural Network and Naive Bayes Data Fusion","volume":"65","author":"Chen","year":"2017","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"188352","DOI":"10.1109\/ACCESS.2020.3031958","article-title":"Domain Fusion CNN-LSTM for Short-Term Power Consumption Forecasting","volume":"8","author":"Shao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.3724\/SP.J.1016.2012.01147","article-title":"Information Sensing and Interaction Technology in Internet of Things","volume":"35","author":"Hu","year":"2012","journal-title":"Chin. J. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/TIM.2004.830598","article-title":"Distributed Decision Fusion with a Random-Access Channel for Sensor Network Applications","volume":"53","author":"Yuan","year":"2004","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_26","first-page":"5998","article-title":"Attention Is All You Need","volume":"30","author":"Vaswani","year":"2017","journal-title":"NIPS"},{"key":"ref_27","unstructured":"Child, R., Gray, S., Radford, A., and Sutskever, I. (2019). Generating Long Sequences with Sparse Transformers. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Qiu, J., Ma, H., Levy, O., Yih, S.W.-T., Wang, S., Tang, J., and Yih, W.-T. (2020). Blockwise Self-Attention for Long Document Understanding. arXiv.","DOI":"10.18653\/v1\/2020.findings-emnlp.232"},{"key":"ref_29","unstructured":"Wang, S., Li, B.Z., Khabsa, M., Fang, H., and Ma, H. (2020). Linformer: Self-Attention with Linear Complexity. arXiv."},{"key":"ref_30","unstructured":"Kitaev, N., Kaiser, L., and Levskaya, A. (2020). Reformer: The Efficient Transformer. arXiv."},{"key":"ref_31","unstructured":"Choromanski, K., Likhosherstov, V., Dohan, D., Song, X., Gane, A., Sarlos, T., Hawkins, P., Davis, J., Mohiuddin, A., and Kaiser, L. (2021). Rethinking Attention with Performers. arXiv."},{"key":"ref_32","first-page":"21297","article-title":"Soft: Softmax-Free Transformer with Linear Complexity","volume":"34","author":"Lu","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"7293","DOI":"10.1007\/s11042-022-13425-7","article-title":"Lane detection in intelligent vehicle system using optimal 2-tier deep convolutional neural network","volume":"82","author":"Dewangan","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2252002","DOI":"10.1142\/S0218001422520024","article-title":"Optimized convolutional neural network for road detection with structured contour and spatial information for intelligent vehicle system","volume":"36","author":"Dewangan","year":"2022","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_35","first-page":"343","article-title":"ROC Analysis in Theory and Practice","volume":"6","author":"Wixted","year":"2017","journal-title":"Behav. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1136\/emermed-2017-206735","article-title":"What is an ROC Curve?","volume":"34","author":"Hoo","year":"2017","journal-title":"Emerg. Med. J."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/5\/1019\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:28:54Z","timestamp":1760124534000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/5\/1019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":36,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["sym15051019"],"URL":"https:\/\/doi.org\/10.3390\/sym15051019","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,4]]}}}