{"id":"https://openalex.org/W4283204338","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798325","title":"A Generative Model for Evasion Attacks in Smart Grid","display_name":"A Generative Model for Evasion Attacks in Smart Grid","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283204338","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798325"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps54753.2022.9798325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798325","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056727338","display_name":"Venkata Praveen Kumar Madhavarapu","orcid":null},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Venkata Praveen Kumar Madhavarapu","raw_affiliation_strings":["Missouri Univ. of Science and Technology,Department of Computer Science,Rolla,USA","Department of Computer Science, Missouri Univ. of Science and Technology, Rolla, USA"],"affiliations":[{"raw_affiliation_string":"Missouri Univ. of Science and Technology,Department of Computer Science,Rolla,USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Department of Computer Science, Missouri Univ. of Science and Technology, Rolla, USA","institution_ids":["https://openalex.org/I20382870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077299535","display_name":"Shameek Bhattacharjee","orcid":"https://orcid.org/0000-0003-3596-9447"},"institutions":[{"id":"https://openalex.org/I141649380","display_name":"Western Michigan University","ror":"https://ror.org/04j198w64","country_code":"US","type":"education","lineage":["https://openalex.org/I141649380"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shameek Bhattacharjee","raw_affiliation_strings":["Western Michigan University,Department of Computer Science,Kalamazoo,USA","Department of Computer Science, Western Michigan University, Kalamazoo, USA"],"affiliations":[{"raw_affiliation_string":"Western Michigan University,Department of Computer Science,Kalamazoo,USA","institution_ids":["https://openalex.org/I141649380"]},{"raw_affiliation_string":"Department of Computer Science, Western Michigan University, Kalamazoo, USA","institution_ids":["https://openalex.org/I141649380"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035342656","display_name":"Sajal K. Dasy","orcid":null},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajal K. Dasy","raw_affiliation_strings":["Missouri Univ. of Science and Technology,Department of Computer Science,Rolla,USA","Department of Computer Science, Missouri Univ. of Science and Technology, Rolla, USA"],"affiliations":[{"raw_affiliation_string":"Missouri Univ. of Science and Technology,Department of Computer Science,Rolla,USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Department of Computer Science, Missouri Univ. of Science and Technology, Rolla, USA","institution_ids":["https://openalex.org/I20382870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056727338"],"corresponding_institution_ids":["https://openalex.org/I20382870"],"apc_list":null,"apc_paid":null,"fwci":0.7075,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57846309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6572881937026978},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6105838418006897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5687159299850464},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.5680573582649231},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5167990922927856},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.467441201210022},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.43648388981819153},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2696721851825714},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13078027963638306},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07874107360839844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6572881937026978},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6105838418006897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5687159299850464},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.5680573582649231},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5167990922927856},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.467441201210022},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.43648388981819153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2696721851825714},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13078027963638306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07874107360839844},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps54753.2022.9798325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798325","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W25531497","https://openalex.org/W1550953152","https://openalex.org/W1673310716","https://openalex.org/W2602344644","https://openalex.org/W2603766943","https://openalex.org/W2806711735","https://openalex.org/W2809895662","https://openalex.org/W2906301639","https://openalex.org/W2951316647","https://openalex.org/W3122578843","https://openalex.org/W6632876648","https://openalex.org/W6637131181","https://openalex.org/W7039047678"],"related_works":["https://openalex.org/W4365211920","https://openalex.org/W3014948380","https://openalex.org/W4380551139","https://openalex.org/W4317695495","https://openalex.org/W4287117424","https://openalex.org/W4387506531","https://openalex.org/W4238433571","https://openalex.org/W2967848559","https://openalex.org/W4299831724","https://openalex.org/W4283803360"],"abstract_inverted_index":{"Adversarial":[0],"machine":[1,9],"learning":[2,10,75],"(AML)":[3],"studies":[4],"how":[5],"to":[6,39],"fool":[7],"a":[8,41,65,107],"(ML)":[11],"model":[12],"with":[13,106],"malicious":[14],"inputs":[15,54],"degrade":[16],"the":[17,36,44,48,85,91],"ML":[18,49,74,86],"method\u2019s":[19],"performance.":[20],"Within":[21],"AML,":[22],"evasion":[23,70,124],"attacks":[24,71],"are":[25,56],"an":[26],"attack":[27],"category":[28],"that":[29,55],"involves":[30],"manipulation":[31],"of":[32,43,81,93],"input":[33,46],"data":[34,45,53,99],"during":[35],"testing":[37],"phase":[38],"induce":[40],"misclassification":[42],"by":[47],"model.":[50],"Such":[51],"manipulated":[52],"called,":[57],"adversarial":[58],"examples.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63],"propose":[64],"generative":[66,123],"approach":[67],"for":[68,84],"crafting":[69],"against":[72],"three":[73],"based":[76,87],"security":[77,88],"classifiers.":[78],"The":[79],"proof":[80],"concept":[82],"application":[83],"classifier":[89],"is":[90,104],"classification":[92],"compromised":[94,116],"smart":[95,109],"meters":[96],"launching":[97],"false":[98],"injection.":[100],"Our":[101],"proposed":[102,122],"solution":[103],"validated":[105],"real":[108],"metering":[110],"dataset.":[111],"We":[112],"found":[113],"degradation":[114],"in":[115],"meter":[117],"detection":[118],"performance":[119],"under":[120],"our":[121],"attack.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
