{"id":"https://openalex.org/W7126094456","doi":"https://doi.org/10.1109/tce.2026.3659127","title":"Detection of Ransomware Attack in IoT-Based Smart Meter Using Hybrid Deep Learning Model","display_name":"Detection of Ransomware Attack in IoT-Based Smart Meter Using Hybrid Deep Learning Model","publication_year":2026,"publication_date":"2026-01-29","ids":{"openalex":"https://openalex.org/W7126094456","doi":"https://doi.org/10.1109/tce.2026.3659127"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2026.3659127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2026.3659127","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115822353","display_name":"Hassam Ishfaq","orcid":null},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hassam Ishfaq","raw_affiliation_strings":["School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124294277","display_name":"Waqas Amin","orcid":null},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Waqas Amin","raw_affiliation_strings":["School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039995971","display_name":"Asif Khan","orcid":"https://orcid.org/0000-0001-5009-3290"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Abdullah Aman Khan","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124167247","display_name":"Nermish Mushtaq","orcid":null},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nermish Mushtaq","raw_affiliation_strings":["School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052926022","display_name":"Muhammad Asim Saleem","orcid":"https://orcid.org/0000-0003-2709-5508"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Asim Saleem","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109780236","display_name":"Abdullah Feraih Alenezi","orcid":null},"institutions":[{"id":"https://openalex.org/I143601524","display_name":"Public Authority for Applied Education and Training","ror":"https://ror.org/024242h31","country_code":"KW","type":"education","lineage":["https://openalex.org/I143601524"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Abdullah Feraih Alenezi","raw_affiliation_strings":["College of Business Studies, Public Authority for Applied Education and Training, Kuwait City, Safat, Kuwait"],"affiliations":[{"raw_affiliation_string":"College of Business Studies, Public Authority for Applied Education and Training, Kuwait City, Safat, Kuwait","institution_ids":["https://openalex.org/I143601524"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124262498","display_name":"Hussain Mobarak Albarakati","orcid":null},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hussain Mobarak Albarakati","raw_affiliation_strings":["Department of Computer and Network Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Network Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5115822353"],"corresponding_institution_ids":["https://openalex.org/I1297991670"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27247052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1441","last_page":"1450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.5066999793052673,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.5066999793052673,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3878999948501587,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.047600001096725464,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.7527999877929688},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6883000135421753},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.661899983882904},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5486999750137329},{"id":"https://openalex.org/keywords/electricity-meter","display_name":"Electricity meter","score":0.4650999903678894},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.43220001459121704},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.42719998955726624},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.42410001158714294},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4000000059604645},{"id":"https://openalex.org/keywords/metre","display_name":"Metre","score":0.39980000257492065}],"concepts":[{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.7527999877929688},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6883000135421753},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.661899983882904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.618399977684021},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5486999750137329},{"id":"https://openalex.org/C67172668","wikidata":"https://www.wikidata.org/wiki/Q622756","display_name":"Electricity meter","level":3,"score":0.4650999903678894},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4535999894142151},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43709999322891235},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.43220001459121704},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.42719998955726624},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.42410001158714294},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C151011524","wikidata":"https://www.wikidata.org/wiki/Q11573","display_name":"Metre","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3815000057220459},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37299999594688416},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.37279999256134033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34709998965263367},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.3165000081062317},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3070000112056732},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C7817414","wikidata":"https://www.wikidata.org/wiki/Q1779504","display_name":"Energy management","level":3,"score":0.2718000113964081},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2590999901294708},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C176563091","wikidata":"https://www.wikidata.org/wiki/Q669238","display_name":"Intelligent sensor","level":3,"score":0.2531999945640564},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2026.3659127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2026.3659127","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6397420167922974,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Massive":[0],"utilization":[1],"of":[2,47,87,111,133],"IoT-enabled":[3],"consumer":[4,51,56],"electronic":[5,52,57],"devices":[6,58],"such":[7],"as":[8,135],"fans,":[9],"cooling":[10],"and":[11,89],"heating":[12],"equipment,":[13],"etc.,":[14],"controlled":[15],"through":[16],"the":[17,23,34,42,69,76,112,122,127,138],"energy":[18],"management":[19],"controller":[20],"interconnected":[21],"with":[22,130],"smart":[24,35,70],"meters,":[25],"are":[26],"highly":[27],"susceptible":[28],"to":[29,39,65,96,103,137],"cyber-attacks.":[30],"Any":[31],"cyber-attack":[32],"on":[33,116],"meter":[36],"may":[37,101],"lead":[38,102],"changes":[40],"in":[41,68,75],"operating":[43],"cycle":[44],"or":[45],"leakage":[46],"information":[48],"from":[49,59],"these":[50,55],"devices.":[53],"Protecting":[54],"vulnerabilities":[60,67],"necessitates":[61],"an":[62,131],"effective":[63],"solution":[64],"detect":[66,97],"meter.":[71],"For":[72],"this":[73],"purpose,":[74],"presented":[77],"study,":[78],"a":[79,85,90,104,117],"deep":[80],"learning-based":[81],"model":[82,124],"by":[83],"using":[84],"combination":[86],"TinyBERT":[88],"convolutional":[91],"neural":[92],"network":[93],"is":[94],"proposed":[95,113,123],"any":[98],"vulnerability":[99],"that":[100,121],"possible":[105],"cyber-attack,":[106],"i.e.,":[107],"ransomware.":[108],"Simulation":[109],"results":[110],"study":[114],"evaluated":[115],"real-life":[118],"dataset":[119],"demonstrate":[120],"effectively":[125],"detects":[126],"ransomware":[128],"attack":[129],"accuracy":[132],"95.40%":[134],"compared":[136],"other":[139],"state-of-the-art":[140],"methods.":[141]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2026-01-30T00:00:00"}
