{"id":"https://openalex.org/W4402834083","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683388","title":"Charging Ahead: A Hierarchical Adversarial Framework for Counteracting Advanced Cyber Threats in EV Charging Stations","display_name":"Charging Ahead: A Hierarchical Adversarial Framework for Counteracting Advanced Cyber Threats in EV Charging Stations","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4402834083","doi":"https://doi.org/10.1109/vtc2024-spring62846.2024.10683388"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2024-spring62846.2024.10683388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014350012","display_name":"Mohammed Almehdhar","orcid":"https://orcid.org/0009-0006-7012-6700"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Mohammed Al-Mehdhar","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048768303","display_name":"Abdullatif Albaseer","orcid":"https://orcid.org/0000-0002-6886-6500"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Abdullatif Albaseer","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037234286","display_name":"Mohamed Abdallah","orcid":"https://orcid.org/0000-0002-3261-7588"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohamed Abdallah","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008695053","display_name":"Ala Al\u2010Fuqaha","orcid":"https://orcid.org/0000-0002-0903-1204"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ala Al-Fuqaha","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Division of Information and Computing Technology,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014350012"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":2.1769,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.89438855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7447819709777832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5967409014701843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4960204064846039},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0649321973323822}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7447819709777832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5967409014701843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4960204064846039},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0649321973323822}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2024-spring62846.2024.10683388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7397807588","display_name":null,"funder_award_id":"AICC04-0812-210017","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"}],"funders":[{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2011886068","https://openalex.org/W2104933073","https://openalex.org/W3006629274","https://openalex.org/W3090391777","https://openalex.org/W3096762368","https://openalex.org/W3174938955","https://openalex.org/W4311694755","https://openalex.org/W4321379156","https://openalex.org/W4380303529","https://openalex.org/W4383901257"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119"],"abstract_inverted_index":{"The":[0],"increasing":[1],"popularity":[2],"of":[3,51,99,171],"electric":[4],"vehicles":[5],"(EVs)":[6],"necessitates":[7],"robust":[8,163],"defenses":[9],"against":[10,174],"sophisticated":[11,147],"cyber":[12],"threats.":[13],"A":[14],"significant":[15],"challenge":[16],"arises":[17],"when":[18,198],"EVs":[19,190],"intentionally":[20],"provide":[21],"false":[22,194],"information":[23],"to":[24,42,67,73,97,113,142],"gain":[25],"higher":[26],"charging":[27,92,139],"priority,":[28],"potentially":[29],"causing":[30],"grid":[31],"instability.":[32],"While":[33],"various":[34],"approaches":[35],"have":[36],"been":[37],"proposed":[38],"in":[39,161,204],"existing":[40],"literature":[41,177],"address":[43],"this":[44,75],"issue,":[45],"they":[46],"often":[47],"overlook":[48],"the":[49,108,135,157,169,175,180,205],"possibility":[50],"attackers":[52],"using":[53,82],"advanced":[54,115],"techniques":[55],"like":[56],"deep":[57,64],"reinforcement":[58],"learning":[59,65],"(DRL)":[60],"or":[61],"other":[62],"complex":[63],"methods":[66,119],"achieve":[68],"such":[69],"attacks.":[70,148],"In":[71],"response":[72],"this,":[74],"paper":[76],"introduces":[77],"a":[78,104,131,162,192],"hierarchical":[79],"adversarial":[80],"framework":[81,173],"DRL":[83,112],"(HADRL),":[84],"which":[85],"effectively":[86],"detects":[87],"stealthy":[88,117],"cyberattacks":[89],"on":[90],"EV":[91,138],"stations,":[93,140],"especially":[94],"those":[95],"leading":[96],"denial":[98],"charging.":[100],"Our":[101],"approach":[102],"includes":[103],"dual":[105],"approach,":[106],"where":[107],"first":[109,158],"scheme":[110,133,150],"leverages":[111],"develop":[114],"and":[116,144,164,179],"attack":[118],"that":[120,183],"can":[121,186],"bypass":[122],"basic":[123],"intrusion":[124],"detection":[125],"systems":[126],"(IDS).":[127],"Second,":[128],"we":[129],"implement":[130],"DRL-based":[132],"within":[134],"IDS":[136,185],"at":[137],"aiming":[141],"detect":[143,188],"counter":[145],"these":[146],"This":[149],"is":[151],"trained":[152],"with":[153,191,200],"datasets":[154],"created":[155],"from":[156],"scheme,":[159],"resulting":[160],"efficient":[165],"IDS.":[166],"We":[167],"evaluated":[168],"effectiveness":[170],"our":[172,184],"recent":[176],"approaches,":[178],"results":[181],"show":[182],"accurately":[187],"deceptive":[189],"low":[193],"alarm":[195],"rate,":[196],"even":[197],"confronted":[199],"attacks":[201],"not":[202],"represented":[203],"training":[206],"dataset.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
