{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:54Z","timestamp":1742914014241,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505768"},{"type":"electronic","value":"9783031505775"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50577-5_16","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T08:02:33Z","timestamp":1708416153000},"page":"215-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi Stage Data Attack Traceability Method Based on Convolutional Neural Network for Industrial Internet"],"prefix":"10.1007","author":[{"given":"Yanfa","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xinran","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"issue":"12","key":"16_CR1","doi-asserted-by":"publisher","first-page":"10968","DOI":"10.1002\/int.23029","volume":"37","author":"S Liu","year":"2022","unstructured":"Liu, S., Li, Y., Fu, W.: Human-centered attention-aware networks for action recognition. Int. J. Intell. Syst. 37(12), 10968\u201310987 (2022)","journal-title":"Int. J. Intell. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zhu, Y., Liu, X.: Big data visualization of the quantification of influencing factors and key monitoring indicators in the refined oil products market based on fuzzy mathematics. J. Intel. Fuzzy Sys. Appl. Eng. Technol. 40(4), 6219\u20136229 (2021)","key":"16_CR2","DOI":"10.3233\/JIFS-189459"},{"doi-asserted-by":"crossref","unstructured":"Le, D.-N., Parvathy, V.S., Gupta, D., et al.: IoT enabled depthwise separable convolution neural network with deep support vector machine for COVID-19 diagnosis and classification. Int. J. Machi. Learn. Cybern. 12(11), 3235\u20133248 (2021)","key":"16_CR3","DOI":"10.1007\/s13042-020-01248-7"},{"issue":"2","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TCNS.2019.2927594","volume":"7","author":"A Chattopadhyay","year":"2020","unstructured":"Chattopadhyay, A., Mitra, U.: Security against false data-injection attack in cyber-physical systems. IEEE Trans. Cont. Netw. Sys. 7(2), 1015\u20131027 (2020)","journal-title":"IEEE Trans. Cont. Netw. Sys."},{"issue":"12","key":"16_CR5","first-page":"237","volume":"38","author":"F Youzhi","year":"2021","unstructured":"Youzhi, F., Yunfeng, Z.: Simulation of automatic encryption algorithm for high-speed network multi-segment support data. Computer Simulation 38(12), 237\u2013240 (2021)","journal-title":"Computer Simulation"},{"doi-asserted-by":"crossref","unstructured":"Li, H., Spencer, B.F., Champneys, M.D., et al.: On the vulnerability of data-driven structural health monitoring models to adversarial attack. Structural Health Monitoring 20(4), 1476\u20131493 (2021)","key":"16_CR6","DOI":"10.1177\/1475921720920233"},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TSG.2019.2928340","volume":"11","author":"K Mahapatra","year":"2020","unstructured":"Mahapatra, K., Ashour, M., Chaudhuri, N.R., et al.: Malicious corruption resilience in PMU data and wide-area damping control. IEEE Trans. Smart Grid 11(2), 958\u2013967 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"11","key":"16_CR8","first-page":"25","volume":"4","author":"R Battur","year":"2020","unstructured":"Battur, R., Amboji, J., Deshpande, A., et al.: A Distributed deep learning system fornweb attack detection on edge devices. Control. Eng. Pract. 4(11), 25\u201336 (2020)","journal-title":"Control. Eng. Pract."},{"issue":"3","key":"16_CR9","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1109\/TSG.2019.2957150","volume":"11","author":"B Moussa","year":"2020","unstructured":"Moussa, B., Al-Barakati, A., Kassouf, M., et al.: Exploiting the vulnerability of relative data alignment in phasor data concentrators to time synchronization attacks. IEEE Transactions on Smart Grid 11(3), 2541\u20132551 (2020)","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"11","key":"16_CR10","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.future.2020.11.013","volume":"116","author":"B Bordel","year":"2021","unstructured":"Bordel, B., Alcarria, R., Robles, T.: Denial of chain: evaluation and prediction of a novel cyberattack in blockchain-supported systems. Futur. Gener. Comput. Syst. 116(11), 426\u2013439 (2021)","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50577-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T08:04:22Z","timestamp":1708416262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50577-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505768","9783031505775"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50577-5_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icmtel.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}