{"id":"https://openalex.org/W3216141275","doi":"https://doi.org/10.1109/isncc52172.2021.9615776","title":"Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks","display_name":"Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks","publication_year":2021,"publication_date":"2021-10-31","ids":{"openalex":"https://openalex.org/W3216141275","doi":"https://doi.org/10.1109/isncc52172.2021.9615776","mag":"3216141275"},"language":"en","primary_location":{"id":"doi:10.1109/isncc52172.2021.9615776","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043672921","display_name":"Ahmed Shafee","orcid":"https://orcid.org/0000-0002-4119-9525"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed Shafee","raw_affiliation_strings":["Tennessee Tech University, Cookeville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University, Cookeville, TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018554930","display_name":"Mahmoud Nabil","orcid":"https://orcid.org/0000-0003-3059-7912"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Nabil","raw_affiliation_strings":["North Carolina A&#x0026;T State University, Greensboro, NC, USA","North Carolina A&#x0026","T State University, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"North Carolina A&#x0026","institution_ids":[]},{"raw_affiliation_string":"T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071309872","display_name":"Mohamed Mahmoud","orcid":"https://orcid.org/0000-0002-8719-501X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Mahmoud","raw_affiliation_strings":["Tennessee Tech University, Cookeville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University, Cookeville, TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035541390","display_name":"Waleed Alasmary","orcid":"https://orcid.org/0000-0002-4349-144X"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Waleed Alasmary","raw_affiliation_strings":["Umm Al-Qura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045929043","display_name":"Fathi Amsaad","orcid":"https://orcid.org/0000-0002-1641-5046"},"institutions":[{"id":"https://openalex.org/I159107703","display_name":"Eastern Washington University","ror":"https://ror.org/002g57a93","country_code":"US","type":"education","lineage":["https://openalex.org/I159107703"]},{"id":"https://openalex.org/I54880866","display_name":"Milligan College","ror":"https://ror.org/001ksx577","country_code":"US","type":"education","lineage":["https://openalex.org/I54880866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fathi Amsaad","raw_affiliation_strings":["College of Engineering &#x0026; Technology, Eastern Mitchigan University, USA","Technology, Eastern Mitchigan University, USA","College of Engineering &#x0026"],"affiliations":[{"raw_affiliation_string":"College of Engineering &#x0026; Technology, Eastern Mitchigan University, USA","institution_ids":["https://openalex.org/I159107703"]},{"raw_affiliation_string":"Technology, Eastern Mitchigan University, USA","institution_ids":["https://openalex.org/I54880866"]},{"raw_affiliation_string":"College of Engineering &#x0026","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043672921"],"corresponding_institution_ids":["https://openalex.org/I63920570"],"apc_list":null,"apc_paid":null,"fwci":0.5493,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66763254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7515919208526611},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6778848171234131},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6078784465789795},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5685154795646667},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5676197409629822},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5529372096061707},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5482684373855591},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4653165340423584},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.45684942603111267},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4340859651565552},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.4167743921279907},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33400624990463257},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21084707975387573},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14438268542289734},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.12186095118522644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515919208526611},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6778848171234131},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6078784465789795},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5685154795646667},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5676197409629822},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5529372096061707},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5482684373855591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4653165340423584},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.45684942603111267},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4340859651565552},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.4167743921279907},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33400624990463257},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21084707975387573},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14438268542289734},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.12186095118522644},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc52172.2021.9615776","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8500000238418579,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311687","display_name":"Ministry of Education","ror":"https://ror.org/03m01yf64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2011886068","https://openalex.org/W2525600709","https://openalex.org/W2538911617","https://openalex.org/W2783741806","https://openalex.org/W2889751219","https://openalex.org/W2900716719","https://openalex.org/W2953404784","https://openalex.org/W2970148885","https://openalex.org/W2979914026","https://openalex.org/W3017180860","https://openalex.org/W3020434223","https://openalex.org/W3080594820","https://openalex.org/W3090391777","https://openalex.org/W3096424616","https://openalex.org/W3108825117","https://openalex.org/W3118755224","https://openalex.org/W6784908645"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W4386482731","https://openalex.org/W2753240997","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W335511927"],"abstract_inverted_index":{"Spatial-temporal":[0],"charging":[1,12,33,40,46,67,81,96,108,127,162],"coordination":[2],"mechanisms":[3,27],"are":[4,198],"developed":[5],"to":[6,35,64,70,79,105,152,200,213,221],"avoid":[7],"electrical":[8],"overload":[9],"at":[10],"the":[11,72,85,107,154,158,161,202,208,217],"stations":[13,34,109],"and":[14,61,89,135,187,210,215,234],"extravagant":[15],"waiting":[16],"time":[17],"for":[18,87],"electric":[19],"vehicle":[20],"drivers.":[21],"Though,":[22],"attackers":[23],"could":[24,176],"attack":[25,44],"these":[26],"by":[28,57],"launching":[29,136],"distributed":[30],"attacks":[31,116,138,196],"against":[32],"prevent":[36],"legitimate":[37],"drivers":[38],"from":[39],"their":[41],"vehicles.":[42],"To":[43,142,164],"a":[45,52,59,80,130,172,193],"station,":[47],"an":[48,101],"attacker":[49],"can":[50],"compromise":[51],"set":[53],"of":[54,113,160,195],"vehicles,":[55],"e.g.,":[56],"disseminating":[58],"malware,":[60],"instruct":[62],"them":[63],"send":[65],"fake":[66],"requests":[68],"simultaneously":[69],"reserve":[71],"available":[73],"energy":[74,132,188],"capacity":[75],"that":[76,125,175,197,228],"is":[77,124],"provided":[78],"station":[82,128],"without":[83],"having":[84],"intention":[86],"charging,":[88],"thus":[90],"benign":[91,173,209],"vehicles":[92],"do":[93],"not":[94],"find":[95],"slots.":[97],"This":[98],"paper":[99],"introduces":[100],"anomaly-based":[102],"detection":[103,233],"technique":[104],"identify":[106],"under":[110],"this":[111,140],"denial":[112],"charge":[114],"(DoC)":[115],"using":[117],"convolutional":[118,149],"neural":[119,150,219],"networks.":[120],"The":[121],"main":[122],"idea":[123],"each":[126],"has":[129,231],"normal":[131],"demand":[133,159],"pattern":[134],"DoC":[137,223],"changes":[139],"pattern.":[141],"capture":[143,153],"such":[144,183],"anomalous":[145],"pattern,":[146],"we":[147,169,191,206],"use":[148],"model":[151,220],"temporal":[155],"features":[156],"within":[157],"station.":[163],"train":[165,214],"our":[166,229],"anomaly":[167],"detector,":[168],"first":[170],"create":[171,201],"dataset":[174],"be":[177],"utilized":[178],"in":[179],"other":[180],"research":[181],"areas":[182],"as":[184],"load":[185],"forecast":[186],"management.":[189],"Then,":[190],"introduce":[192],"group":[194],"used":[199,207],"malicious":[203,211],"dataset.":[204],"Finally,":[205],"datasets":[212],"test":[216],"deep":[218],"detect":[222],"attacks.":[224],"Our":[225],"experiments":[226],"show":[227],"detector":[230],"high":[232],"low":[235],"false":[236],"alarm":[237],"rates.":[238]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
