{"id":"https://openalex.org/W4401990304","doi":"https://doi.org/10.1109/jiot.2024.3451449","title":"Feature Attention Distillation Defense for Backdoor Attack in Artificial-Neural-Network-Based Electricity Theft Detection","display_name":"Feature Attention Distillation Defense for Backdoor Attack in Artificial-Neural-Network-Based Electricity Theft Detection","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4401990304","doi":"https://doi.org/10.1109/jiot.2024.3451449"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3451449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3451449","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102015526","display_name":"Shizhong Li","orcid":"https://orcid.org/0000-0003-4429-3549"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shizhong Li","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019626706","display_name":"Wenchao Meng","orcid":"https://orcid.org/0000-0002-7038-5896"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenchao Meng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103040439","display_name":"Chen Liu","orcid":"https://orcid.org/0000-0001-8296-8223"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Liu","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068195118","display_name":"Shibo He","orcid":"https://orcid.org/0000-0002-1505-6766"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibo He","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102015526"],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":1.0536,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77019247,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"11","issue":"24","first_page":"39880","last_page":"39889"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12737","display_name":"Electrical Fault Detection and Protection","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9349139332771301},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7001803517341614},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6961667537689209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5801369547843933},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45826321840286255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45093876123428345},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4441757798194885},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.4413266181945801},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3677380383014679},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36699509620666504},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16524577140808105}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9349139332771301},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7001803517341614},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6961667537689209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5801369547843933},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45826321840286255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45093876123428345},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4441757798194885},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.4413266181945801},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3677380383014679},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36699509620666504},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16524577140808105},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3451449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3451449","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7710443011","display_name":null,"funder_award_id":"92367205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2108558074","https://openalex.org/W2150595230","https://openalex.org/W2212529815","https://openalex.org/W2312446965","https://openalex.org/W2776990447","https://openalex.org/W2786918196","https://openalex.org/W2807363941","https://openalex.org/W2921261293","https://openalex.org/W2942091739","https://openalex.org/W2956058978","https://openalex.org/W2998382059","https://openalex.org/W3005548505","https://openalex.org/W3005785043","https://openalex.org/W3015815227","https://openalex.org/W3042368254","https://openalex.org/W3087775622","https://openalex.org/W3102477513","https://openalex.org/W3116466274","https://openalex.org/W3167354048","https://openalex.org/W3197763089","https://openalex.org/W3212877473","https://openalex.org/W4205345560","https://openalex.org/W4206372987","https://openalex.org/W4224924081","https://openalex.org/W4231400843","https://openalex.org/W4252979261","https://openalex.org/W4285034544","https://openalex.org/W4285201538","https://openalex.org/W4288062092","https://openalex.org/W4319341347","https://openalex.org/W4322736917","https://openalex.org/W4395028456","https://openalex.org/W4398199753","https://openalex.org/W4402727728","https://openalex.org/W6773457010","https://openalex.org/W6788876066","https://openalex.org/W6842607031"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4386185023"],"abstract_inverted_index":{"Artificial":[0],"neural":[1],"networks":[2],"(ANNs)":[3],"have":[4],"been":[5,42],"widely":[6],"used":[7],"for":[8,66,96,210],"tasks":[9],"like":[10],"electricity":[11,130,137],"theft":[12],"detection":[13],"(ETD)":[14],"in":[15,45,64,82,217],"smart":[16,218],"meters.":[17],"However,":[18],"due":[19],"to":[20,31,99,129],"the":[21,50,59,67,79,90,110,114,136,145,155,211],"subtle":[22],"mechanisms":[23],"and":[24,70,89,109,161,206],"inherent":[25],"opaque":[26],"characteristics,":[27],"ANNs":[28],"are":[29,107],"vulnerable":[30],"attacks.":[32],"Although":[33],"this":[34,56],"attack":[35,80,182,204],"surface":[36,81],"poses":[37],"significant":[38],"risks,":[39],"it":[40],"has":[41],"largely":[43],"overlooked":[44],"industrial":[46,54],"scenarios.":[47,220],"To":[48],"alert":[49],"widespread":[51],"adoption":[52,213],"of":[53,61,214],"intelligence,":[55],"article":[57],"studies":[58],"impact":[60],"backdoor":[62],"attacks":[63,142],"ETD":[65,116,193],"first":[68],"time":[69],"proposes":[71],"a":[72,200,208],"feature":[73,157],"attention":[74],"distillation":[75],"(FAD)":[76],"defense.":[77],"First,":[78],"current":[83],"model":[84],"training":[85],"pipeline":[86],"is":[87,164],"analyzed,":[88],"adversaries":[91,111],"can":[92,112,139,167,185],"embed":[93],"malicious":[94],"backdoors":[95,169],"specific":[97],"triggers":[98],"escape":[100],"ETD.":[101],"Then,":[102],"six":[103],"prevalent":[104],"ANN-based":[105],"models":[106,117,163],"tested":[108],"bypass":[113],"backdoored":[115,162],"with":[118,172,176,189],"success":[119,183],"rates":[120],"over":[121],"90.53%,":[122],"which":[123,166],"would":[124],"inevitably":[125],"bring":[126],"huge":[127],"losses":[128],"companies.":[131],"We":[132],"further":[133],"argue":[134],"that":[135,153],"companies":[138],"mitigate":[140],"such":[141],"when":[143],"noticing":[144],"abnormal":[146],"nontechnical":[147],"loss.":[148],"A":[149],"novel":[150,201],"FAD":[151],"defense":[152],"aligns":[154],"intermediate":[156],"maps":[158],"between":[159],"fine-tuned":[160],"proposed,":[165],"eliminate":[168],"more":[170],"efficiently":[171],"few":[173],"resources":[174],"compared":[175],"two":[177],"classic":[178],"defenses.":[179],"The":[180],"average":[181],"rate":[184],"drop":[186],"by":[187],"90.71%":[188],"slight":[190],"impacts":[191],"on":[192,199],"performance.":[194],"This":[195],"work":[196],"sheds":[197],"light":[198],"but":[202],"perilous":[203],"surface,":[205],"raises":[207],"warning":[209],"wide":[212],"artificial":[215],"intelligence":[216],"measurement":[219]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
