[1] LIANG G, ZHAO J, LUO F, et al.A review of false data injection attacks against modern power systems[J]. IEEE Transactions on Smart Grid,2016, 8(4): 1630-1638. [2] LIANG G, WELLER SR, ZHAO J, et al. The 2015 Ukraine blackout: Implications for false data injection attacks[J]. IEEE transactions on power systems. 2016, 32(4): 3317-3318. [3] DU M, LIU X, LI Z,et al. Robust mitigation strategy against dummy data attacks in power systems[J]. IEEE Transactions on Smart Grid,2023, 14(4): 3102-3113. [4] WU K H, LI J W, ZHANG B, et al. Preventive dispatch strategy against FDIA induced overloads in power systems with high wind penetration[J].IEEE Access,2020(8):210452-210461. [5] LIU Y, NING P, REITER M K. False Data Injection Attacks Against State Estimation in Electric Power Grids[J].ACM Transaction on Information and System Security,2011,14(1):1-33. [6] MOSLEMI R, MESBAHI A, MOHAMMADPOUR VELNI J. Design of robust profitable false data injection attacks in multi-ettlement electricity markets[J]. IET generation, transmission & distribution,2018, 12(6): 1263-1270. [7] 张鹏, 熊雅琴, 蹇洁, 等. 基于多目标双层规划的智能电网虚假数据注入攻击研究[J]. 运筹与管理, 2023, 32(1):22-26. [8] 田猛, 王先培, 董政呈, 等. 基于拉格朗日乘子法的虚假数据攻击策略[J]. 电力系统自动化, 2017, 41(11): 26-32. [9] ZHANG X L,YANG X Y,LIN J,et al.On false data injection attacks against the dynamic microgrid partition in the smart grid[C]//2015 IEEE International Conference on Communications (ICC),London,UK.IEEE,2015:7222-7227. [10] 杨清宇, 李东鹤, 蔡远利, 等. 针对电力系统中最优潮流的假数据注入攻击研究[C]//第17届中国系统仿真技术及其应用学术年会论文集 (17th CCSSTA 2016).合肥:中国科学技术大学出版社,2016:35. [11] TAJER A. False data injection attacks in electricity markets by limited adversaries: Stochastic robustness[J]. IEEE Transactions on Smart Grid,2017,10(1):128-38. [12] LIU X,LI Z,SHUAI Z.Cyber attacks against the economic operation of power systems:A fast solution[J]. IEEE Transactions on Smart Grid,2016,8(2):1023-5. [13] 田继伟, 王布宏, 李夏, 等. 基于博弈论的负荷重分配攻击最佳防御策略[J]. 计算机仿真,2018;35(5):123-127. [14] LIU X, LI Z, LIU X,et al.Masking transmission line outages via false data injection attacks[J]. IEEE Transactions on Information Forensics and Security,2016, 11(7): 1592-1602. [15] LIU X, LI Z. Trilevel modeling of cyber attacks on transmission lines[J]. IEEE Transactions on Smart Grid,2015, 8(2): 720-729. [16] TAN Y, LI Y, CAO Y, et al. Cyber-attack on overloading multiple lines: A bilevel mixed-integer linear programming model[J]. IEEE Transactions on Smart Grid,2017, 9(2): 1534-1536. [17] CHE L, LIU X, LI Z,et al.False data injection attacks induced sequential outages in power systems[J]. IEEE Transactions on Power Systems,2018, 34(2): 1513-1523. [18] PAZOUKI S, ASRARI A. Attacking energy hubs via manipulating demand response program[C]//2021 IEEE PES/IAS Power Africa,Nairobo,Kenya.IEEE,2021,23:1-5. [19] ZIMMERMAN RD, MURILLO-SáNCHEZ CE, THOMAS RJ. MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education[J]. IEEE Transactions on Power Systems,2010, 26(1): 12-19. |