{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:3B66DBGXP42MRVQ3ROV2DORZJV","short_pith_number":"pith:3B66DBGX","canonical_record":{"source":{"id":"1607.06015","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2016-07-20T16:32:53Z","cross_cats_sorted":[],"title_canon_sha256":"50403dad0d10eb33adcc41f3bee0b3be0b92811e4818d319f0e58caf5d232480","abstract_canon_sha256":"afe396c4c59a318d9a095341f1b4e1b13b976bf27fc386b19569b4a5c4770ff0"},"schema_version":"1.0"},"canonical_sha256":"d87de184d77f34c8d61b8baba1ba394d71026817a5e64ea0d6750b022c59e40a","source":{"kind":"arxiv","id":"1607.06015","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1607.06015","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"arxiv_version","alias_value":"1607.06015v1","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1607.06015","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"pith_short_12","alias_value":"3B66DBGXP42M","created_at":"2026-05-18T12:29:55Z"},{"alias_kind":"pith_short_16","alias_value":"3B66DBGXP42MRVQ3","created_at":"2026-05-18T12:29:55Z"},{"alias_kind":"pith_short_8","alias_value":"3B66DBGX","created_at":"2026-05-18T12:29:55Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:3B66DBGXP42MRVQ3ROV2DORZJV","target":"record","payload":{"canonical_record":{"source":{"id":"1607.06015","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2016-07-20T16:32:53Z","cross_cats_sorted":[],"title_canon_sha256":"50403dad0d10eb33adcc41f3bee0b3be0b92811e4818d319f0e58caf5d232480","abstract_canon_sha256":"afe396c4c59a318d9a095341f1b4e1b13b976bf27fc386b19569b4a5c4770ff0"},"schema_version":"1.0"},"canonical_sha256":"d87de184d77f34c8d61b8baba1ba394d71026817a5e64ea0d6750b022c59e40a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:10:43.427343Z","signature_b64":"gAxMF7kVUi79xKEWbxSUVXCN4e06NeKuCPUWLRrtiqSjFIXl9K9Vpk0Y+CQy1VXLFgl17bm48/vwmMgPuTGZAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d87de184d77f34c8d61b8baba1ba394d71026817a5e64ea0d6750b022c59e40a","last_reissued_at":"2026-05-18T01:10:43.426726Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:10:43.426726Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1607.06015","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:10:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wSAo9PabBMMyBkTXd7+LdZcLBUEvnEILg2LyduOlKfZV1Ovr2kzovNXIxA7ih4UwZbCWbSSjn9bCOkoLaCAoDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:06:33.065813Z"},"content_sha256":"c9cb704bb2e4bdd7f8cb342c9656cdfcd6f6239050d9d08f09f32c2a010b6f04","schema_version":"1.0","event_id":"sha256:c9cb704bb2e4bdd7f8cb342c9656cdfcd6f6239050d9d08f09f32c2a010b6f04"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:3B66DBGXP42MRVQ3ROV2DORZJV","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SY","authors_text":"Bo Tang, Haibo He, Jun Yan, Steven Kay","submitted_at":"2016-07-20T16:32:53Z","abstract_excerpt":"In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise. By modeling the noise with the autoregressive process, we estimate the state of the power transmission networks and develop a generalized likelihood ratio test (GLRT) detector for the detection of false data injection attacks. We show that the conventional approach with the assumption of Gaussian noise is a special case of the proposed method, and thus the new approach has more applicability. {The proposed detector is also t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1607.06015","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:10:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gMkPkhxL6GldEpec70iG/WLIMKLAKQ0K3ve05DSGTBwDydV52XYgGAfwHQ7XYLIiR0GJ0FbG/BvtkwePquyYBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:06:33.066162Z"},"content_sha256":"035e621b6b76f8247ea194c9899479b8dd8652fd391b2cf6052666ea64e562f3","schema_version":"1.0","event_id":"sha256:035e621b6b76f8247ea194c9899479b8dd8652fd391b2cf6052666ea64e562f3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/3B66DBGXP42MRVQ3ROV2DORZJV/bundle.json","state_url":"https://pith.science/pith/3B66DBGXP42MRVQ3ROV2DORZJV/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/3B66DBGXP42MRVQ3ROV2DORZJV/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T18:06:33Z","links":{"resolver":"https://pith.science/pith/3B66DBGXP42MRVQ3ROV2DORZJV","bundle":"https://pith.science/pith/3B66DBGXP42MRVQ3ROV2DORZJV/bundle.json","state":"https://pith.science/pith/3B66DBGXP42MRVQ3ROV2DORZJV/state.json","well_known_bundle":"https://pith.science/.well-known/pith/3B66DBGXP42MRVQ3ROV2DORZJV/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:3B66DBGXP42MRVQ3ROV2DORZJV","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"afe396c4c59a318d9a095341f1b4e1b13b976bf27fc386b19569b4a5c4770ff0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2016-07-20T16:32:53Z","title_canon_sha256":"50403dad0d10eb33adcc41f3bee0b3be0b92811e4818d319f0e58caf5d232480"},"schema_version":"1.0","source":{"id":"1607.06015","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1607.06015","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"arxiv_version","alias_value":"1607.06015v1","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1607.06015","created_at":"2026-05-18T01:10:43Z"},{"alias_kind":"pith_short_12","alias_value":"3B66DBGXP42M","created_at":"2026-05-18T12:29:55Z"},{"alias_kind":"pith_short_16","alias_value":"3B66DBGXP42MRVQ3","created_at":"2026-05-18T12:29:55Z"},{"alias_kind":"pith_short_8","alias_value":"3B66DBGX","created_at":"2026-05-18T12:29:55Z"}],"graph_snapshots":[{"event_id":"sha256:035e621b6b76f8247ea194c9899479b8dd8652fd391b2cf6052666ea64e562f3","target":"graph","created_at":"2026-05-18T01:10:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise. By modeling the noise with the autoregressive process, we estimate the state of the power transmission networks and develop a generalized likelihood ratio test (GLRT) detector for the detection of false data injection attacks. We show that the conventional approach with the assumption of Gaussian noise is a special case of the proposed method, and thus the new approach has more applicability. {The proposed detector is also t","authors_text":"Bo Tang, Haibo He, Jun Yan, Steven Kay","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2016-07-20T16:32:53Z","title":"Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1607.06015","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c9cb704bb2e4bdd7f8cb342c9656cdfcd6f6239050d9d08f09f32c2a010b6f04","target":"record","created_at":"2026-05-18T01:10:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"afe396c4c59a318d9a095341f1b4e1b13b976bf27fc386b19569b4a5c4770ff0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2016-07-20T16:32:53Z","title_canon_sha256":"50403dad0d10eb33adcc41f3bee0b3be0b92811e4818d319f0e58caf5d232480"},"schema_version":"1.0","source":{"id":"1607.06015","kind":"arxiv","version":1}},"canonical_sha256":"d87de184d77f34c8d61b8baba1ba394d71026817a5e64ea0d6750b022c59e40a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d87de184d77f34c8d61b8baba1ba394d71026817a5e64ea0d6750b022c59e40a","first_computed_at":"2026-05-18T01:10:43.426726Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:10:43.426726Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"gAxMF7kVUi79xKEWbxSUVXCN4e06NeKuCPUWLRrtiqSjFIXl9K9Vpk0Y+CQy1VXLFgl17bm48/vwmMgPuTGZAQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:10:43.427343Z","signed_message":"canonical_sha256_bytes"},"source_id":"1607.06015","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c9cb704bb2e4bdd7f8cb342c9656cdfcd6f6239050d9d08f09f32c2a010b6f04","sha256:035e621b6b76f8247ea194c9899479b8dd8652fd391b2cf6052666ea64e562f3"],"state_sha256":"8dfeb121a5f196a60bc8a32e5c87c9a3f1c6dbc6789cf801d00c98d2c111467f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xAvgjZbsQjVMwVRF0QNI4RUWmuGjhdNcDtl3BzCAcdAqO9IY2MMJeIDlIbXqsWcvQRqxky0Sil5YAxdW6BXjDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T18:06:33.068328Z","bundle_sha256":"259dd930da719bdb0d7d30ef6abb7fd4ba4428e915f1408e5a3110595b727f29"}}