ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1506.03774
  4. Cited By
Vulnerability Analysis and Consequences of False Data Injection Attack
  on Power System State Estimation

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation

IEEE Transactions on Power Systems (IEEE Trans. Power Syst.), 2015
11 June 2015
Jingwen Liang
Lalitha Sankar
O. Kosut
ArXiv (abs)PDFHTML

Papers citing "Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation"

15 / 15 papers shown
Learning a Generalized Model for Substation Level Voltage Estimation in Distribution Networks
Learning a Generalized Model for Substation Level Voltage Estimation in Distribution Networks
Muhy Eddin Za'ter
B. Hodge
116
0
0
17 Oct 2025
Exposing Hidden Attackers in Industrial Control Systems using
  Micro-distortions
Exposing Hidden Attackers in Industrial Control Systems using Micro-distortionsIEEE Transactions on Smart Grid (IEEE Trans. Smart Grid), 2023
S. Sourav
Binbin Chen
AAML
158
7
0
29 Jul 2023
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against
  Cyber-Physical Power Systems
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
A. Bhattacharjee
T. K. Saha
Ashu Verma
Sukumar Mishra
AAML
166
8
0
16 Mar 2023
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack
  Detection for AC-model Transmission Systems
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission SystemsIEEE Open Journal of the Computer Society (JOCS), 2022
Xuefei Yin
Yanming Zhu
Yi Xie
Jiankun Hu
301
7
0
15 Jul 2022
Cyber-physical risk modeling with imperfect cyber-attackers
Cyber-physical risk modeling with imperfect cyber-attackers
E. Karangelos
L. Wehenkel
175
14
0
01 Oct 2021
Identification and Mitigation of False Data Injection using Multi State
  Implicative Interdependency Model (MSIIM) for Smart Grid
Identification and Mitigation of False Data Injection using Multi State Implicative Interdependency Model (MSIIM) for Smart Grid
Sohini Roy
Arunabha Sen
48
0
0
25 Mar 2021
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart
  Grid: Attack Models, Targets, and Impacts
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and ImpactsRenewable & Sustainable Energy Reviews (RSER), 2021
H. Reda
A. Anwar
A. N. Mahmood
257
158
0
19 Mar 2021
A Deep Learning Approach to Anomaly Sequence Detection for
  High-Resolution Monitoring of Power Systems
A Deep Learning Approach to Anomaly Sequence Detection for High-Resolution Monitoring of Power SystemsIEEE Transactions on Power Systems (IEEE Trans. Power Syst.), 2020
Kursat Rasim Mestav
Xinyi Wang
Lang Tong
AI4TS
311
36
0
09 Dec 2020
Designing False Data Injection attacks penetrating AC-based Bad Data
  Detection System and FDI Dataset generation
Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generationConcurrency and Computation (CCPE), 2020
N. N. Tran
H. Pota
Q. Tran
Xuefei Yin
Jiankun Hu
101
8
0
11 Mar 2020
Enhancing Power System Cyber-Security with Systematic Two-Stage
  Detection Strategy
Enhancing Power System Cyber-Security with Systematic Two-Stage Detection Strategy
Xingpeng Li
K. Hedman
33
42
0
13 Oct 2018
Application of Correlation Indices on Intrusion Detection Systems:
  Protecting the Power Grid Against Coordinated Attacks
Application of Correlation Indices on Intrusion Detection Systems: Protecting the Power Grid Against Coordinated Attacks
C. Moya
Junho Hong
Jiankang Wang
35
5
0
09 Jun 2018
Vulnerability Analysis of Smart Grids to GPS Spoofing
Vulnerability Analysis of Smart Grids to GPS Spoofing
Paresh Risbud
Nikolaos Gatsis
A. Taha
73
80
0
25 Apr 2018
Data Attacks on Power System State Estimation: Limited Adversarial
  Knowledge vs. Limited Attack Resources
Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources
Kaikai Pan
André M. H. Teixeira
M. Cvetković
Peter Palensky
73
10
0
28 Aug 2017
Cyber Risk Analysis of Combined Data Attacks Against Power System State
  Estimation
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation
Kaikai Pan
André M. H. Teixeira
M. Cvetković
Peter Palensky
80
79
0
28 Aug 2017
Cyber-Physical Systems Security: a Systematic Mapping Study
Cyber-Physical Systems Security: a Systematic Mapping StudyJournal of Systems and Software (JSS), 2016
Yu Lun
A. D’innocenzo
I. Malavolta
M. D. Benedetto
AI4CE
237
151
0
31 May 2016
1
Page 1 of 1