{"id":"https://openalex.org/W3217796098","doi":"https://doi.org/10.1109/isncc52172.2021.9615798","title":"Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning","display_name":"Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning","publication_year":2021,"publication_date":"2021-10-31","ids":{"openalex":"https://openalex.org/W3217796098","doi":"https://doi.org/10.1109/isncc52172.2021.9615798","mag":"3217796098"},"language":"en","primary_location":{"id":"doi:10.1109/isncc52172.2021.9615798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053163516","display_name":"Mohamed I. Ibrahem","orcid":"https://orcid.org/0000-0002-8000-4161"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohamed I. Ibrahem","raw_affiliation_strings":["George Mason University,Department of Cyber Security Engineering,Fairfax,VA,USA"],"affiliations":[{"raw_affiliation_string":"George Mason University,Department of Cyber Security Engineering,Fairfax,VA,USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012520636","display_name":"Mahmoud M. Badr","orcid":"https://orcid.org/0000-0002-8986-001X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud M. Badr","raw_affiliation_strings":["Tennessee Tech University,Department of Electrical and Computer Engineering,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Electrical and Computer Engineering,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071309872","display_name":"Mohamed Mahmoud","orcid":"https://orcid.org/0000-0002-8719-501X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Mahmoud","raw_affiliation_strings":["Tennessee Tech University,Department of Electrical and Computer Engineering,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Electrical and Computer Engineering,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"],"affiliations":[{"raw_affiliation_string":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA","institution_ids":["https://openalex.org/I106969075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035541390","display_name":"Waleed Alasmary","orcid":"https://orcid.org/0000-0002-4349-144X"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Waleed Alasmary","raw_affiliation_strings":["Umm Al-Qura University,Department of Computer Engineering,Makkah,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Umm Al-Qura University,Department of Computer Engineering,Makkah,Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053163516"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":3.5353,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93966116,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7258875966072083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49715831875801086},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4685182273387909},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3634595572948456},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35873645544052124},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34234628081321716},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.33590972423553467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7258875966072083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49715831875801086},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4685182273387909},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3634595572948456},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35873645544052124},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34234628081321716},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33590972423553467}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc52172.2021.9615798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc52172.2021.9615798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321408","display_name":"Ministry of Education","ror":"https://ror.org/01p262204"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1437335841","https://openalex.org/W1611367516","https://openalex.org/W2043279449","https://openalex.org/W2061688414","https://openalex.org/W2087969167","https://openalex.org/W2129928993","https://openalex.org/W2200037836","https://openalex.org/W2337192999","https://openalex.org/W2402610834","https://openalex.org/W2587019100","https://openalex.org/W2962920729","https://openalex.org/W2972177310","https://openalex.org/W3087775622","https://openalex.org/W3108200794","https://openalex.org/W3116546924","https://openalex.org/W3163429584","https://openalex.org/W6733081445","https://openalex.org/W6786470203"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2611989081","https://openalex.org/W2731899572","https://openalex.org/W4230611425","https://openalex.org/W4294635752","https://openalex.org/W4304166257","https://openalex.org/W4383066092","https://openalex.org/W3215138031","https://openalex.org/W2804383999","https://openalex.org/W2802049774"],"abstract_inverted_index":{"Reporting":[0],"fine-grained":[1],"power":[2,106,142],"consumption":[3,43,107,143],"readings":[4,27,108,144,215,244],"periodically":[5],"in":[6,12,51,94,110,200,209],"advanced":[7],"metering":[8],"infrastructure":[9],"(AMI)":[10],"results":[11,161],"transmitting":[13,119,243],"a":[14,42,71,99,132,146,152,180,197],"massive":[15],"amount":[16],"of":[17,58,83,167,191,211,214],"data":[18],"by":[19,87,118,238],"each":[20],"smart":[21],"meter":[22],"(SM).":[23],"To":[24],"collect":[25],"these":[26],"efficiently,":[28],"change":[29,50],"and":[30,145,159,235],"transmit":[31,186],"(CAT)":[32],"approach":[33,65],"can":[34,227],"be":[35,218],"used.":[36],"In":[37],"CAT,":[38],"the":[39,52,56,63,81,84,105,115,136,160,164,168,176,201,212,229],"SM":[40],"sends":[41],"reading":[44],"only":[45],"when":[46],"there":[47],"is":[48,170],"enough":[49],"consumption,":[53],"which":[54],"reduces":[55],"number":[57,213],"transmitted":[59],"readings.":[60],"However,":[61],"using":[62,140,183],"CAT":[64,137],"may":[66],"trigger":[67],"attackers":[68],"to":[69,75,156,174,185,233,242],"launch":[70,157],"presence-privacy":[72],"attack":[73],"(PPA)":[74],"infer":[76],"sensitive":[77],"information":[78],"such":[79],"as":[80],"absence":[82],"house":[85],"occupants":[86],"analyzing":[88],"their":[89],"SM&#x2019;s":[90],"transmission":[91,138],"pattern.":[92],"Therefore,":[93],"this":[95],"paper,":[96],"we":[97,130,150,178],"propose":[98],"scheme,":[100],"called":[101],"&#x201C;STID&#x201D;,":[102],"for":[103],"collecting":[104],"efficiently":[109],"AMI":[111],"networks":[112],"while":[113,205],"preserving":[114],"consumers&#x2019;":[116],"privacy":[117],"spoofing":[120,187],"transmissions":[121],"based":[122],"on":[123],"an":[124],"interactive":[125],"deep-learning":[126,184],"defense":[127,181],"model.":[128],"First,":[129],"create":[131],"dataset":[133],"that":[134,163,216,223],"contains":[135],"patterns":[139],"real":[141],"clustering":[147],"technique.":[148],"Next,":[149],"train":[151,179],"deep-learning-based":[153],"attacker":[154,169],"model":[155,182],"PPA,":[158,177],"indicate":[162,222],"success":[165,203,231],"rate":[166,204,232],"about":[171,239],"90&#x0025;.":[172],"Finally,":[173],"mitigate":[175],"transmissions.":[188],"The":[189],"evaluations":[190],"our":[192,224],"envisioned":[193],"STID":[194,226],"scheme":[195],"demonstrate":[196],"significant":[198],"reduction":[199],"attacker&#x2019;s":[202,230],"achieving":[206],"high":[207],"efficiency":[208,237],"terms":[210],"should":[217],"transmitted.":[219],"Our":[220],"measurements":[221],"proposed":[225],"reduce":[228],"6.12&#x0025;":[234],"increase":[236],"38&#x0025;":[240],"compared":[241],"periodically.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
