{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:49:52Z","timestamp":1776955792873,"version":"3.51.4"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031708787","type":"print"},{"value":"9783031708794","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70879-4_19","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:20Z","timestamp":1725476540000},"page":"374-393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["GAN-GRID: A Novel Generative Attack on\u00a0Smart Grid Stability Prediction"],"prefix":"10.1007","author":[{"given":"Emad","family":"Efatinasab","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mirco","family":"Rampazzo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nahal","family":"Azadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Ahmadian, S., Malki, H., Han, Z.: Cyber attacks on smart energy grids using generative adverserial networks. In: 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 942\u2013946 (2018). https:\/\/doi.org\/10.1109\/GlobalSIP.2018.8646424","DOI":"10.1109\/GlobalSIP.2018.8646424"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"85454","DOI":"10.1109\/ACCESS.2020.2991067","volume":"8","author":"M Alazab","year":"2020","unstructured":"Alazab, M., Khan, S., Krishnan, S.S.R., Pham, Q.V., Reddy, M.P.K., Gadekallu, T.R.: A multidirectional LSTM model for predicting the stability of a smart grid. IEEE Access 8, 85454\u201385463 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2991067","journal-title":"IEEE Access"},{"key":"19_CR3","doi-asserted-by":"publisher","DOI":"10.24432\/C5PG66","author":"V Arzamasov","year":"2018","unstructured":"Arzamasov, V.: Electrical grid stability simulated data. UCI Mach. Learn. Repository (2018). https:\/\/doi.org\/10.24432\/C5PG66","journal-title":"UCI Mach. Learn. Repository"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Bai, T., Luo, J., Zhao, J., Wen, B., Wang, Q.: Recent advances in adversarial training for adversarial robustness. In: Zhou, Z.H. (ed.) Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI-21, pp. 4312\u20134321. International Joint Conferences on Artificial Intelligence Organization (2021). https:\/\/doi.org\/10.24963\/ijcai.2021\/591","DOI":"10.24963\/ijcai.2021\/591"},{"issue":"9","key":"19_CR5","doi-asserted-by":"publisher","first-page":"e12706","DOI":"10.1002\/2050-7038.12706","volume":"31","author":"AK Bashir","year":"2021","unstructured":"Bashir, A.K., et al.: Comparative analysis of machine learning algorithms for prediction of smart grid stability$$\\dagger $$. Int. Trans. Electr. Energy Syst. 31(9), e12706 (2021). https:\/\/doi.org\/10.1002\/2050-7038.12706","journal-title":"Int. Trans. Electr. Energy Syst."},{"issue":"7","key":"19_CR6","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","volume":"8","author":"B Bera","year":"2021","unstructured":"Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744\u20135761 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3030308","journal-title":"IEEE Internet Things J."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bird, L., Milligan, M., Lew, D.: Integrating variable renewable energy: challenges and solutions. Tech. rep., National Renewable Energy Lab.(NREL), Golden, CO (United States) (2013)","DOI":"10.2172\/1097911"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00463-5","volume":"2","author":"P Breviglieri","year":"2021","unstructured":"Breviglieri, P., Erdem, T., Eken, S.: Predicting smart grid stability with optimized deep models. SN Comput. Sci. 2, 1\u201312 (2021)","journal-title":"SN Comput. Sci."},{"issue":"4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MC.2011.115","volume":"44","author":"TM Chen","year":"2011","unstructured":"Chen, T.M., Abu-Nimeh, S.: Lessons from stuxnet. Computer 44(4), 91\u201393 (2011)","journal-title":"Computer"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Chen, Y., Tan, Y., Deka, D.: Is machine learning in power systems vulnerable? In: 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/SmartGridComm.2018.8587547","DOI":"10.1109\/SmartGridComm.2018.8587547"},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Ciaramella, G., Martinelli, F., Mercaldo, F., Santone, A.: Explainable deep learning for smart grid stability detection. In: 2023 IEEE International Conference on Big Data, pp. 6131\u20136137 (2023). https:\/\/doi.org\/10.1109\/BigData59044.2023.10386170","DOI":"10.1109\/BigData59044.2023.10386170"},{"key":"19_CR12","unstructured":"CISA: The attack on colonial pipeline: what we\u2019ve learned and what we\u2019ve done over the past two years. https:\/\/www.cisa.gov\/news-events\/news\/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years. Accessed 20 Apr 2024"},{"key":"19_CR13","doi-asserted-by":"publisher","unstructured":"Dewangan, F., Biswal, M., Patnaik, B., Hasan, S., Mishra, M.: Chapter five - smart grid stability prediction using genetic algorithm-based extreme learning machine. In: Bansal, R.C., Mishra, M., Sood, Y.R. (eds.) Electric Power Systems Resiliency, pp. 149\u2013163. Academic Press (2022). https:\/\/doi.org\/10.1016\/B978-0-323-85536-5.00011-4","DOI":"10.1016\/B978-0-323-85536-5.00011-4"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Efatinasab, E., Marchiori, F., Brighente, A., Rampazzo, M., Conti, M.: FaultGuard: a generative approach to resilient fault prediction in smart electrical grids. arXiv preprint arXiv:2403.17494 (2024)","DOI":"10.1007\/978-3-031-64171-8_26"},{"key":"19_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-031-04112-9_24","volume-title":"Pattern Recognition and Artificial Intelligence","author":"T Erdem","year":"2022","unstructured":"Erdem, T., Eken, S.: Layer-wise relevance propagation for smart-grid stability prediction. In: Djeddi, C., Siddiqi, I., Jamil, A., Ali Hameed, A., Kucuk, \u0130 (eds.) MedPRAI 2021. CCIS, vol. 1543, pp. 315\u2013328. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-04112-9_24"},{"key":"19_CR16","unstructured":"Federation of American Scientists: Grid failure and extreme heat (2024). https:\/\/fas.org\/publication\/grid-failure-extreme-heat\/"},{"key":"19_CR17","unstructured":"Forbes: 3 alarming threats to the U.S. energy grid - Cyber, physical, and existential events. https:\/\/www.forbes.com\/sites\/chuckbrooks\/2023\/02\/15\/3-alarming-threats-to-the-us-energy-grid--cyber-physical-and-existential-events\/. Accessed 20 Apr 2024"},{"key":"19_CR18","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2015)"},{"issue":"10","key":"19_CR19","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.3390\/en13102559","volume":"13","author":"MB Gorza\u0142czany","year":"2020","unstructured":"Gorza\u0142czany, M.B., Piekoszewski, J., Rudzi\u0144ski, F.: A modern data-mining approach based on genetically optimized fuzzy systems for interpretable and accurate smart-grid stability prediction. Energies 13(10), 2559 (2020). https:\/\/doi.org\/10.3390\/en13102559","journal-title":"Energies"},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TPWRS.2018.2872505","volume":"34","author":"A Gupta","year":"2019","unstructured":"Gupta, A., Gurrala, G., Sastry, P.S.: An online power system stability monitoring system using convolutional neural networks. IEEE Trans. Power Syst. 34(2), 864\u2013872 (2019). https:\/\/doi.org\/10.1109\/TPWRS.2018.2872505","journal-title":"IEEE Trans. Power Syst."},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"Hao, J., Tao, Y.: Adversarial attacks on deep learning models in smart grids. Energy Rep. 8, 123\u2013129 (2022). https:\/\/doi.org\/10.1016\/j.egyr.2021.11.026, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352484721011707, 2021 6th International Conference on Clean Energy and Power Generation Technology","DOI":"10.1016\/j.egyr.2021.11.026"},{"issue":"5","key":"19_CR22","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.1109\/TSG.2017.2703842","volume":"8","author":"Y He","year":"2017","unstructured":"He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505\u20132516 (2017). https:\/\/doi.org\/10.1109\/TSG.2017.2703842","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"19_CR23","doi-asserted-by":"publisher","first-page":"022012","DOI":"10.1088\/1755-1315\/510\/2\/022012","volume":"510","author":"J Jiao","year":"2020","unstructured":"Jiao, J.: Application and prospect of artificial intelligence in smart grid. IOP Conf. Ser. Earth Environ. Sci. 510(2), 022012 (2020). https:\/\/doi.org\/10.1088\/1755-1315\/510\/2\/022012","journal-title":"IOP Conf. Ser. Earth Environ. Sci."},{"key":"19_CR24","unstructured":"Jung, M., Hofer, T., D\u00f6belt, S., Kienesberger, G., Judex, F., Kastner, W.: Access control for a smart grid SOA. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 281\u2013287 (2012)"},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.apenergy.2016.08.188","volume":"183","author":"X Ke","year":"2016","unstructured":"Ke, X., Wu, D., Rice, J., Kintner-Meyer, M., Lu, N.: Quantifying impacts of heat waves on power grid operation. Appl. Energy 183, 504\u2013512 (2016). https:\/\/doi.org\/10.1016\/j.apenergy.2016.08.188","journal-title":"Appl. Energy"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv:1607.02533 (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"19_CR27","doi-asserted-by":"publisher","unstructured":"Li, J., Yang, Y., Sun, J.S.: SearchFromFree: adversarial measurements for machine learning-based energy theft detection. In: 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp.\u00a01\u20136 (2020). https:\/\/doi.org\/10.1109\/SmartGridComm47815.2020.9303013","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"19_CR28","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS 2017, pp. 4768\u20134777 (2017)"},{"key":"19_CR29","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 (2019)"},{"key":"19_CR30","doi-asserted-by":"publisher","unstructured":"Massaoudi, M., Abu-Rub, H., Refaat, S.S., Chihi, I., Oueslati, F.S.: Accurate smart-grid stability forecasting based on deep learning: Point and interval estimation method. In: 2021 IEEE Kansas Power and Energy Conference (KPEC), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/KPEC51835.2021.9446196","DOI":"10.1109\/KPEC51835.2021.9446196"},{"issue":"1","key":"19_CR31","doi-asserted-by":"publisher","first-page":"472","DOI":"10.3390\/en16010472","volume":"16","author":"HA Muqeet","year":"2023","unstructured":"Muqeet, H.A., Liaqat, R., Jamil, M., Khan, A.A.: A state-of-the-art review of smart energy systems and their management in a smart grid environment. Energies 16(1), 472 (2023). https:\/\/doi.org\/10.3390\/en16010472","journal-title":"Energies"},{"issue":"3","key":"19_CR32","doi-asserted-by":"publisher","first-page":"2218","DOI":"10.1109\/TSG.2019.2949998","volume":"11","author":"AS Musleh","year":"2020","unstructured":"Musleh, A.S., Chen, G., Dong, Z.Y.: A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 11(3), 2218\u20132234 (2020). https:\/\/doi.org\/10.1109\/TSG.2019.2949998","journal-title":"IEEE Trans. Smart Grid"},{"issue":"10","key":"19_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3565570","volume":"55","author":"MN Nafees","year":"2023","unstructured":"Nafees, M.N., Saxena, N., Cardenas, A., Grijalva, S., Burnap, P.: Smart grid cyber-physical situational awareness of complex operational technology attacks: a review. ACM Comput. Surv. 55(10), 1\u201336 (2023)","journal-title":"ACM Comput. Surv."},{"key":"19_CR34","unstructured":"Nicolae, M.I., et al.: Adversarial robustness toolbox v1. 0.0. arXiv preprint arXiv:1807.01069 (2018)"},{"key":"19_CR35","doi-asserted-by":"publisher","first-page":"17851","DOI":"10.1007\/s00521-023-08605-x","volume":"35","author":"M \u00d6nder","year":"2023","unstructured":"\u00d6nder, M., Dogan, M.U., Polat, K.: Classification of smart grid stability prediction using cascade machine learning methods and the internet of things in smart grid. Neural Comput. Appl. 35, 17851\u201317869 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08605-x","journal-title":"Neural Comput. Appl."},{"issue":"10","key":"19_CR36","doi-asserted-by":"publisher","first-page":"11883","DOI":"10.3390\/en81011883","volume":"8","author":"N Saxena","year":"2015","unstructured":"Saxena, N., Choi, B.J.: State of the art authentication, access control, and secure integration in smart grid. Energies 8(10), 11883\u201311915 (2015). https:\/\/doi.org\/10.3390\/en81011883","journal-title":"Energies"},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"115733","DOI":"10.1016\/j.apenergy.2020.115733","volume":"278","author":"Z Shi","year":"2020","unstructured":"Shi, Z., et al.: Artificial intelligence techniques for stability analysis and control in smart grids: methodologies, applications, challenges and future directions. Appl. Energy 278, 115733 (2020). https:\/\/doi.org\/10.1016\/j.apenergy.2020.115733","journal-title":"Appl. Energy"},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"114586","DOI":"10.1016\/j.apenergy.2020.114586","volume":"263","author":"Z Shi","year":"2020","unstructured":"Shi, Z., et al.: Convolutional neural network-based power system transient stability assessment and instability mode prediction. Appl. Energy 263, 114586 (2020). https:\/\/doi.org\/10.1016\/j.apenergy.2020.114586","journal-title":"Appl. Energy"},{"key":"19_CR39","doi-asserted-by":"publisher","unstructured":"Song, Q., Tan, R., Ren, C., Xu, Y.: Understanding credibility of adversarial examples against smart grid: a case study for voltage stability assessment. In: Proceedings of the Twelfth ACM International Conference on Future Energy Systems, e-Energy 2021, pp. 95\u2013106. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3447555.3464859","DOI":"10.1145\/3447555.3464859"},{"issue":"2","key":"19_CR40","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TDSC.2022.3213012","volume":"21","author":"Q Song","year":"2024","unstructured":"Song, Q., et al.: On credibility of adversarial examples against learning-based grid voltage stability assessment. IEEE Trans. Dependable Secure Comput. 21(2), 585\u2013599 (2024). https:\/\/doi.org\/10.1109\/TDSC.2022.3213012","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"19_CR41","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.tej.2017.02.006","volume":"30","author":"JE Sullivan","year":"2017","unstructured":"Sullivan, J.E., Kamensky, D.: How cyber-attacks in Ukraine show the vulnerability of the us power grid. Electr. J. 30(3), 30\u201335 (2017)","journal-title":"Electr. J."},{"key":"19_CR42","doi-asserted-by":"publisher","unstructured":"Tounsi, W.: Cyber deception, the ultimate piece of a defensive strategy - proof of concept. In: 2022 6th Cyber Security in Networking Conference (CSNet), pp.\u00a01\u20135 (2022). https:\/\/doi.org\/10.1109\/CSNet56116.2022.9955605","DOI":"10.1109\/CSNet56116.2022.9955605"},{"issue":"2","key":"19_CR43","doi-asserted-by":"publisher","first-page":"289","DOI":"10.3390\/sym15020289","volume":"15","author":"F Ucar","year":"2023","unstructured":"Ucar, F.: A comprehensive analysis of smart grid stability prediction along with explainable artificial intelligence. Symmetry 15(2), 289 (2023). https:\/\/doi.org\/10.3390\/sym15020289","journal-title":"Symmetry"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"Xu, J., Li, Z., Du, B., Zhang, M., Liu, J.: Reluplex made more practical: leaky ReLU. In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/ISCC50000.2020.9219587"},{"key":"19_CR45","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Zhang, H., Zhang, J., Li, L., Zheng, Z.: Power grid stability prediction model based on BiLSTM with attention. In: ISEEIE 2021, 2021 International Symposium on Electrical, Electronics and Information Engineering, pp. 344\u2013349. Association for Computing Machinery (2021). https:\/\/doi.org\/10.1145\/3459104.3459160","DOI":"10.1145\/3459104.3459160"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70879-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:06:25Z","timestamp":1725476785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70879-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708787","9783031708794"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70879-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}