{"id":"https:\/\/openalex.org\/W3083018510","doi":"https:\/\/doi.org\/10.1109\/cec48606.2020.9185725","title":"Multi-Objective Evolutionary Optimization for Worst-Case Analysis of False Data Injection Attacks in the Smart Grid","display_name":"Multi-Objective Evolutionary Optimization for Worst-Case Analysis of False Data Injection Attacks in the Smart Grid","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https:\/\/openalex.org\/W3083018510","doi":"https:\/\/doi.org\/10.1109\/cec48606.2020.9185725","mag":"3083018510"},"language":"en","primary_location":{"id":"doi:10.1109\/cec48606.2020.9185725","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/cec48606.2020.9185725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Congress on Evolutionary Computation (CEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5073775075","display_name":"Moshfeka Rahman","orcid":"https:\/\/orcid.org\/0009-0001-0235-9434"},"institutions":[{"id":"https:\/\/openalex.org\/I60158472","display_name":"Concordia University","ror":"https:\/\/ror.org\/0420zvk78","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Moshfeka Rahman","raw_affiliation_strings":["Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada","institution_ids":["https:\/\/openalex.org\/I60158472"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5036711281","display_name":"Yuanliang Li","orcid":"https:\/\/orcid.org\/0000-0002-6741-5038"},"institutions":[{"id":"https:\/\/openalex.org\/I60158472","display_name":"Concordia University","ror":"https:\/\/ror.org\/0420zvk78","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yuanliang Li","raw_affiliation_strings":["Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada","institution_ids":["https:\/\/openalex.org\/I60158472"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5061710167","display_name":"Jun Yan","orcid":"https:\/\/orcid.org\/0000-0002-5148-1399"},"institutions":[{"id":"https:\/\/openalex.org\/I60158472","display_name":"Concordia University","ror":"https:\/\/ror.org\/0420zvk78","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jun Yan","raw_affiliation_strings":["Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information and Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada","institution_ids":["https:\/\/openalex.org\/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5073775075"],"corresponding_institution_ids":["https:\/\/openalex.org\/I60158472"],"apc_list":null,"apc_paid":null,"fwci":0.7356,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71059353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10917","display_name":"Smart Grid Security and Resilience","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10917","display_name":"Smart Grid Security and Resilience","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10714","display_name":"Software-Defined Networks and 5G","score":0.9857000112533569,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/smart-grid","display_name":"Smart grid","score":0.6779682636260986},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.5932825207710266},{"id":"https:\/\/openalex.org\/keywords\/pareto-principle","display_name":"Pareto principle","score":0.495639443397522},{"id":"https:\/\/openalex.org\/keywords\/solver","display_name":"Solver","score":0.47712230682373047},{"id":"https:\/\/openalex.org\/keywords\/set","display_name":"Set (abstract data type)","score":0.44771116971969604},{"id":"https:\/\/openalex.org\/keywords\/mathematical-optimization","display_name":"Mathematical optimization","score":0.4455038607120514},{"id":"https:\/\/openalex.org\/keywords\/grid","display_name":"Grid","score":0.4442570209503174},{"id":"https:\/\/openalex.org\/keywords\/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.4336378574371338},{"id":"https:\/\/openalex.org\/keywords\/identification","display_name":"Identification (biology)","score":0.4290560185909271},{"id":"https:\/\/openalex.org\/keywords\/mathematics","display_name":"Mathematics","score":0.20407748222351074},{"id":"https:\/\/openalex.org\/keywords\/engineering","display_name":"Engineering","score":0.19971662759780884},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.19158750772476196}],"concepts":[{"id":"https:\/\/openalex.org\/C10558101","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q689855","display_name":"Smart grid","level":2,"score":0.6779682636260986},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.5932825207710266},{"id":"https:\/\/openalex.org\/C137635306","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q182667","display_name":"Pareto principle","level":2,"score":0.495639443397522},{"id":"https:\/\/openalex.org\/C2778770139","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1966904","display_name":"Solver","level":2,"score":0.47712230682373047},{"id":"https:\/\/openalex.org\/C177264268","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44771116971969604},{"id":"https:\/\/openalex.org\/C126255220","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4455038607120514},{"id":"https:\/\/openalex.org\/C187691185","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2020720","display_name":"Grid","level":2,"score":0.4442570209503174},{"id":"https:\/\/openalex.org\/C159149176","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.4336378574371338},{"id":"https:\/\/openalex.org\/C116834253","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4290560185909271},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0.20407748222351074},{"id":"https:\/\/openalex.org\/C127413603","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11023","display_name":"Engineering","level":0,"score":0.19971662759780884},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19158750772476196},{"id":"https:\/\/openalex.org\/C59822182","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q441","display_name":"Botany","level":1,"score":0},{"id":"https:\/\/openalex.org\/C86803240","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q420","display_name":"Biology","level":0,"score":0},{"id":"https:\/\/openalex.org\/C2524010","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8087","display_name":"Geometry","level":1,"score":0},{"id":"https:\/\/openalex.org\/C199360897","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9143","display_name":"Programming language","level":1,"score":0},{"id":"https:\/\/openalex.org\/C119599485","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q43035","display_name":"Electrical engineering","level":1,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109\/cec48606.2020.9185725","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/cec48606.2020.9185725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Congress on Evolutionary Computation (CEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https:\/\/openalex.org\/W1585939719","https:\/\/openalex.org\/W1598852905","https:\/\/openalex.org\/W1680757476","https:\/\/openalex.org\/W1970225669","https:\/\/openalex.org\/W2002254092","https:\/\/openalex.org\/W2003190831","https:\/\/openalex.org\/W2036070481","https:\/\/openalex.org\/W2038651258","https:\/\/openalex.org\/W2077764722","https:\/\/openalex.org\/W2098897917","https:\/\/openalex.org\/W2108906138","https:\/\/openalex.org\/W2116065935","https:\/\/openalex.org\/W2122559297","https:\/\/openalex.org\/W2164681195","https:\/\/openalex.org\/W2181495931","https:\/\/openalex.org\/W2319367234","https:\/\/openalex.org\/W2332912277","https:\/\/openalex.org\/W2464910170","https:\/\/openalex.org\/W2525022545","https:\/\/openalex.org\/W2549613767","https:\/\/openalex.org\/W2554050192","https:\/\/openalex.org\/W2554619103","https:\/\/openalex.org\/W2557406209","https:\/\/openalex.org\/W2600059420","https:\/\/openalex.org\/W2893065897","https:\/\/openalex.org\/W2896107239","https:\/\/openalex.org\/W2897378890","https:\/\/openalex.org\/W2898808607","https:\/\/openalex.org\/W2914106598","https:\/\/openalex.org\/W2964247084","https:\/\/openalex.org\/W6635097213"],"related_works":["https:\/\/openalex.org\/W2186864281","https:\/\/openalex.org\/W4255427455","https:\/\/openalex.org\/W1966025497","https:\/\/openalex.org\/W68941528","https:\/\/openalex.org\/W4206451355","https:\/\/openalex.org\/W1553604823","https:\/\/openalex.org\/W8322802","https:\/\/openalex.org\/W2195994862","https:\/\/openalex.org\/W314331466","https:\/\/openalex.org\/W2004285327"],"abstract_inverted_index":{"False":[0],"data":[1,17],"injection":[2],"attacks":[3],"(FDIA)":[4],"have":[5,45],"drawn":[6],"significant":[7,204],"interests":[8],"recently":[9],"after":[10],"the":[11,22,32,42,47,56,64,91,104,107,113,116,124,129,138,146,151,165,169,173,180,186,194,207,227,230],"discovery":[12],"of":[13,15,34,41,84,175,216],"vulnerabilities":[14],"bad":[16],"detectors":[18],"(BDD)":[19],"deployed":[20],"in":[21,59,94,179],"smart":[23,92],"grid.":[24],"While":[25],"most":[26],"FDIA":[27,72],"analyses":[28],"focused":[29],"separately":[30],"on":[31,90,185,206],"aspects":[33],"stealthiness,":[35,232],"knowledge,":[36],"resources,":[37],"or":[38],"expected":[39,239],"consequences":[40],"attack,":[43],"few":[44],"evaluated":[46,224],"relationship":[48],"and":[49,153,171,189,219,234,245],"tradeoffs":[50],"among":[51,229],"these":[52],"factors":[53],"to":[54,86,126,167,225,240],"identify":[55],"worst-case":[57,181,249],"scenario":[58],"realistic":[60,95],"operations.":[61],"To":[62],"fill":[63],"gap,":[65],"this":[66],"paper":[67,114],"investigates":[68],"a":[69,81],"strictly":[70],"stealthy":[71],"scheme":[73],"with":[74,98,106,203,247],"multi-objective":[75,196],"evolutionary":[76],"optimization,":[77],"which":[78],"could":[79],"compromise":[80],"small":[82],"set":[83],"meters":[85],"inflict":[87],"large":[88],"impacts":[89,205],"grid":[93],"scenarios.":[96],"Compared":[97],"existing":[99],"attack":[100,135,176,201],"schemes":[101],"that":[102,193],"relax":[103],"problem":[105],"\u2113":[108,130],"<sub":[109,131],"xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"":[110,132],"xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\">1<\/sub>":[111],"-norm,":[112],"introduced":[115],"Improved":[117],"Strength":[118],"Pareto":[119],"Evolutionary":[120],"Algorithm":[121],"(SPEA2)":[122],"as":[123],"solver":[125],"directly":[127],"obtain":[128],"xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\">0<\/sub>":[133],"-sparse":[134],"vector.":[136],"Meanwhile,":[137],"unobservability":[139],"is":[140,161],"ensured":[141],"by":[142],"not":[143],"only":[144],"bypassing":[145],"BDD":[147],"but":[148],"also":[149,162,222],"satisfying":[150],"physical":[152],"operational":[154],"constraints.":[155],"A":[156],"three-step":[157],"constraint":[158],"handling":[159],"technique":[160],"proposed":[163],"for":[164],"SPEA2":[166],"ensure":[168],"stealthiness":[170],"improve":[172],"efficiency":[174],"vector":[177],"identification":[178],"scenario.":[182],"Simulation":[183],"results":[184,237],"IEEE":[187],"14-bus":[188],"30-bus":[190],"systems":[191],"demonstrate":[192],"new":[195],"formulation":[197],"discovers":[198],"highly":[199],"sparse":[200],"vectors":[202],"system":[208],"without":[209],"triggering":[210],"immediate":[211],"emergency":[212],"responses.":[213],"The":[214,236],"influence":[215],"alternative":[217],"objectives":[218],"constraints":[220],"has":[221],"been":[223],"reveal":[226],"trade-offs":[228],"attack's":[231],"sparsity,":[233],"impact.":[235],"are":[238],"facilitate":[241],"better-informed":[242],"risk":[243],"assessment":[244],"mitigation":[246],"refined":[248],"understandings.":[250]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-01-17T23:10:49.606395","created_date":"2025-10-10T00:00:00"}