{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:48:31Z","timestamp":1776955711958,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T00:00:00Z","timestamp":1690156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T00:00:00Z","timestamp":1690156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Project (Key Technologies and Applications of Security and Trusted Industrial Control System","award":["2020YFB2009500"],"award-info":[{"award-number":["2020YFB2009500"]}]},{"name":"Beijing Municipal Natural Science Foundation","award":["L192020"],"award-info":[{"award-number":["L192020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00521-023-08791-8","type":"journal-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T19:02:55Z","timestamp":1690225375000},"page":"20675-20695","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks"],"prefix":"10.1007","volume":"35","author":[{"given":"Bitao","family":"Tian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9844-1717","authenticated-orcid":false,"given":"Yingxu","family":"Lai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Motong","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yipeng","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,24]]},"reference":[{"key":"8791_CR1","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TDSC.2021.3050101","volume":"19","author":"M Kravchik","year":"2021","unstructured":"Kravchik M, Shabtai A (2021) Efficient cyber-attack detection in industrial control systems using lightweight neural networks and pca. IEEE Trans Dependable Secur Comput 19:2179\u20132197","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"8791_CR2","unstructured":"Krebs B (2012) Fbi: Smart meter hacks likely to spread. Krebs on Security. http:\/\/krebsonsecurity.com\/2012\/04\/fbi-smart-meter-hacks-likely-to-spread\/. Accessed on 25 Apr 2012"},{"key":"8791_CR3","doi-asserted-by":"crossref","unstructured":"Ma R, Basumallik S, Eftekharnejad S, Kong F (2020) Recovery-based model predictive control for cascade mitigation under cyber-physical attacks. In: 2020 IEEE Texas Power and Energy Conference (TPEC), IEEE, pp 1\u20136","DOI":"10.1109\/TPEC48276.2020.9042584"},{"issue":"1","key":"8791_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1023\/A:1026589200419","volume":"20","author":"S Punnekkat","year":"2001","unstructured":"Punnekkat S, Burns A, Davis R (2001) Analysis of checkpointing for real-time systems. Real-Time Syst 20(1):83\u2013102","journal-title":"Real-Time Syst"},{"key":"8791_CR5","doi-asserted-by":"crossref","unstructured":"Kong F, Xu M, Weimer J, Sokolsky O, Lee I (2018) Cyber-physical system checkpointing and recovery. In: 2018 ACM\/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), IEEE, pp 22\u201331","DOI":"10.1109\/ICCPS.2018.00011"},{"key":"8791_CR6","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.1109\/TII.2020.3000172","volume":"18","author":"H Wang","year":"2020","unstructured":"Wang H, Wen X, Xu Y, Zhou B, Peng J-C, Liu W (2020) Operating state reconstruction in cyber physical smart grid for automatic attack filtering. IEEE Trans Ind Inform 18:2909\u20132922","journal-title":"IEEE Trans Ind Inform"},{"key":"8791_CR7","doi-asserted-by":"publisher","first-page":"10211","DOI":"10.1007\/s00521-021-05785-2","volume":"33","author":"R Alguliyev","year":"2021","unstructured":"Alguliyev R, Imamverdiyev Y, Sukhostat L (2021) Hybrid deepgcl model for cyber-attacks detection on cyber-physical systems. Neural Comput Appl 33:10211\u201310226","journal-title":"Neural Comput Appl"},{"issue":"3","key":"8791_CR8","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TII.2020.2984315","volume":"17","author":"T Wu","year":"2020","unstructured":"Wu T, Xue W, Wang H, Chung C, Wang G, Peng J, Yang Q (2020) Extreme learning machine-based state reconstruction for automatic attack filtering in cyber physical power system. IEEE Trans Ind Inform 17(3):1892\u20131904","journal-title":"IEEE Trans Ind Inform"},{"issue":"11","key":"8791_CR9","doi-asserted-by":"publisher","first-page":"7814","DOI":"10.1109\/TII.2022.3146859","volume":"18","author":"J Ruan","year":"2022","unstructured":"Ruan J, Liang G, Zhao J, Qiu J, Dong ZY (2022) An inertia-based data recovery scheme for false data injection attack. IEEE Trans Ind Inform 18(11):7814\u20137823","journal-title":"IEEE Trans Ind Inform"},{"key":"8791_CR10","doi-asserted-by":"crossref","unstructured":"Jin Z, Liu M, Deng R, Cheng P (2022) Distributed data recovery against false data injection attacks in dc microgrids. In: 2022 IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm), IEEE, pp 265\u2013270","DOI":"10.1109\/SmartGridComm52983.2022.9960968"},{"key":"8791_CR11","doi-asserted-by":"crossref","unstructured":"Song X, Guo Y, Li N, Liu J (2021) Dynamic missing data recovery method with low complexity in internet of things. In: 2021 7th International conference on computer and communications (ICCC), IEEE, pp 2091\u20132095","DOI":"10.1109\/ICCC54389.2021.9674265"},{"key":"8791_CR12","doi-asserted-by":"publisher","first-page":"118921","DOI":"10.1016\/j.eswa.2022.118921","volume":"213","author":"M-Q Zhang","year":"2023","unstructured":"Zhang M-Q, Luo X-L (2023) Static and incremental robust kernel factorization embedding graph regularization supporting ill-conditioned industrial data recovery. Expert Syst Appl 213:118921","journal-title":"Expert Syst Appl"},{"key":"8791_CR13","first-page":"1","volume":"2021","author":"EFM Josephlal","year":"2021","unstructured":"Josephlal EFM, Adepu S, Yang Z, Zhou J (2021) Enabling isolation and recovery in plc redundancy framework of metro train systems. Int J Inf Secur 2021:1\u201313","journal-title":"Int J Inf Secur"},{"key":"8791_CR14","doi-asserted-by":"crossref","unstructured":"Pajic M, Weimer J, Bezzo N, Tabuada P, Sokolsky O, Lee I, Pappas GJ (2014) Robustness of attack-resilient state estimators. In: 2014 ACM\/IEEE international conference on cyber-physical systems (ICCPS), IEEE, pp 163\u2013174","DOI":"10.1109\/ICCPS.2014.6843720"},{"issue":"7","key":"8791_CR15","doi-asserted-by":"publisher","first-page":"4659","DOI":"10.1109\/TII.2019.2945520","volume":"16","author":"H Pearce","year":"2019","unstructured":"Pearce H, Pinisetty S, Roop PS, Kuo MM, Ukil A (2019) Smart i\/o modules for mitigating cyber-physical attacks on industrial control systems. IEEE Trans Ind Inform 16(7):4659\u20134669","journal-title":"IEEE Trans Ind Inform"},{"key":"8791_CR16","doi-asserted-by":"crossref","unstructured":"Elnaggar M, Bezzo N (2018) An irl approach for cyber-physical attack intention prediction and recovery. In: 2018 Annual American control conference (ACC), IEEE, pp 222\u2013227","DOI":"10.23919\/ACC.2018.8430922"},{"issue":"1","key":"8791_CR17","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TSG.2020.3014813","volume":"12","author":"T Wu","year":"2020","unstructured":"Wu T, Zhang Y-JA, Liu Y, Lau WC, Xu H (2020) Missing data recovery in large power systems using network embedding. IEEE Trans Smart Grid 12(1):680\u2013691","journal-title":"IEEE Trans Smart Grid"},{"issue":"6","key":"8791_CR18","doi-asserted-by":"publisher","first-page":"5889","DOI":"10.1109\/TSG.2019.2892423","volume":"10","author":"X Wang","year":"2019","unstructured":"Wang X, Shi D, Wang J, Yu Z, Wang Z (2019) Online identification and data recovery for PMU data manipulation attack. IEEE Trans Smart Grid 10(6):5889\u20135898","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"8791_CR19","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1109\/TII.2019.2921106","volume":"16","author":"Y Li","year":"2019","unstructured":"Li Y, Wang Y, Hu S (2019) Online generative adversary network based measurement recovery in false data injection attacks: a cyber-physical approach. IEEE Trans Ind Inform 16(3):2031\u20132043","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"8791_CR20","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TSG.2019.2956161","volume":"11","author":"F Wei","year":"2019","unstructured":"Wei F, Wan Z, He H (2019) Cyber-attack recovery strategy for smart grid based on deep reinforcement learning. IEEE Trans Smart Grid 11(3):2476\u20132486","journal-title":"IEEE Trans Smart Grid"},{"issue":"6","key":"8791_CR21","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1109\/TIM.2019.2935576","volume":"69","author":"B Wang","year":"2019","unstructured":"Wang B, Liu D, Peng Y, Peng X (2019) Multivariate regression-based fault detection and recovery of uav flight data. IEEE Trans Instrum Meas 69(6):3527\u20133537","journal-title":"IEEE Trans Instrum Meas"},{"key":"8791_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3216413","volume":"71","author":"H Wang","year":"2022","unstructured":"Wang H, Ouyang Y (2022) Adaptive data recovery model for PMU data based on SDAE in transient stability assessment. IEEE Trans Instrum Meas 71:1\u201311","journal-title":"IEEE Trans Instrum Meas"},{"key":"8791_CR23","doi-asserted-by":"publisher","first-page":"104962","DOI":"10.1016\/j.jweia.2022.104962","volume":"224","author":"Q Lin","year":"2022","unstructured":"Lin Q, Bao X, Li C (2022) Deep learning based missing data recovery of non-stationary wind velocity. J Wind Eng Ind Aerodyn 224:104962","journal-title":"J Wind Eng Ind Aerodyn"},{"key":"8791_CR24","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.egyr.2021.11.070","volume":"8","author":"Y Ma","year":"2022","unstructured":"Ma Y, Yang J, Feng J, Wang H, Li Y, Li Y (2022) Load data recovery method based on SOM-LSTM neural network. Energy Rep 8:129\u2013136","journal-title":"Energy Rep"},{"issue":"3","key":"8791_CR25","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.1109\/TASE.2021.3069003","volume":"19","author":"X Hu","year":"2022","unstructured":"Hu X, Zhang H, Ma D, Wang R (2022) Hierarchical pressure data recovery for pipeline network via generative adversarial networks. IEEE Trans Autom Sci Eng 19(3):1960\u20131970","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"8791_CR26","doi-asserted-by":"publisher","first-page":"119988","DOI":"10.1016\/j.apenergy.2022.119988","volume":"327","author":"L Liu","year":"2022","unstructured":"Liu L, Liu Y (2022) Load image inpainting: an improved u-net based load missing data recovery method. Appl Energy 327:119988","journal-title":"Appl Energy"},{"issue":"3","key":"8791_CR27","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TBDATA.2020.2979443","volume":"8","author":"Y Yu","year":"2022","unstructured":"Yu Y, Li VOK, Lam JCK (2022) Missing air pollution data recovery based on long-short term context encoder. IEEE Trans Big Data 8(3):711\u2013722","journal-title":"IEEE Trans Big Data"},{"issue":"1","key":"8791_CR28","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TBDATA.2021.3123819","volume":"9","author":"Y Yu","year":"2023","unstructured":"Yu Y, Li VOK, Lam JCK (2023) Hierarchical recovery of missing air pollution data via improved long-short term context encoder network. IEEE Trans Big Data 9(1):93\u2013105","journal-title":"IEEE Trans Big Data"},{"key":"8791_CR29","doi-asserted-by":"publisher","first-page":"28590","DOI":"10.1109\/ACCESS.2022.3158342","volume":"10","author":"A Khaled","year":"2022","unstructured":"Khaled A, Han J-J, Ghaleb TA (2022) Multi-model medical image segmentation using multi-stage generative adversarial networks. IEEE Access 10:28590\u201328599","journal-title":"IEEE Access"},{"key":"8791_CR30","doi-asserted-by":"crossref","unstructured":"Zhang H, Xu T, Li H, Zhang S, Wang X, Huang X, Metaxas DN (2017) Stackgan: text to photo-realistic image synthesis with stacked generative adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 5907\u20135915","DOI":"10.1109\/ICCV.2017.629"},{"issue":"8","key":"8791_CR31","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TPAMI.2018.2856256","volume":"41","author":"H Zhang","year":"2018","unstructured":"Zhang H, Xu T, Li H, Zhang S, Wang X, Huang X, Metaxas DN (2018) Stackgan++: realistic image synthesis with stacked generative adversarial networks. IEEE Trans Pattern Anal Mach Intell 41(8):1947\u20131962","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8791_CR32","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.neunet.2021.01.023","volume":"138","author":"D Peng","year":"2021","unstructured":"Peng D, Yang W, Liu C, L\u00fc S (2021) Sam-gan: self-attention supporting multi-stage generative adversarial networks for text-to-image synthesis. Neural Netw 138:57\u201367","journal-title":"Neural Netw"},{"key":"8791_CR33","doi-asserted-by":"crossref","unstructured":"Xiong W, Luo W, Ma L, Liu W, Luo J (2018) Learning to generate time-lapse videos using multi-stage dynamic generative adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2364\u20132373","DOI":"10.1109\/CVPR.2018.00251"},{"key":"8791_CR34","doi-asserted-by":"crossref","unstructured":"Vatanparvar K, Al\u00a0Faruque MA (2019) Self-secured control with anomaly detection and recovery in automotive cyber-physical systems. In: 2019 Design, automation & test in Europe conference & exhibition (DATE), IEEE, pp 788\u2013793","DOI":"10.23919\/DATE.2019.8714833"},{"key":"8791_CR35","first-page":"102544","volume":"54","author":"F Skopik","year":"2020","unstructured":"Skopik F, Landauer M, Wurzenberger M, Vormayr G, Milosevic J, Fabini J, Pr\u00fcggler W, Kruschitz O, Widmann B, Truckenthanner K et al (2020) Synergy: cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. J Inf Secur Appl 54:102544","journal-title":"J Inf Secur Appl"},{"key":"8791_CR36","doi-asserted-by":"crossref","unstructured":"Shoukry Y, Martin P, Tabuada P, Srivastava M (2013) Non-invasive spoofing attacks for anti-lock braking systems. In: International conference on cryptographic hardware and embedded systems, Springer, pp 55\u201372","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"8791_CR37","volume-title":"Spoofers use fake GPS signals to knock a yacht off course","author":"AH Rutkin","year":"2013","unstructured":"Rutkin AH (2013) Spoofers use fake GPS signals to knock a yacht off course. MIT"},{"issue":"2015","key":"8791_CR38","first-page":"995","volume":"11","author":"J Petit","year":"2015","unstructured":"Petit J, Stottelaar B, Feiri M, Kargl F (2015) Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Eur 11(2015):995","journal-title":"Black Hat Eur"},{"key":"8791_CR39","doi-asserted-by":"publisher","first-page":"101048","DOI":"10.1016\/j.pmcj.2019.101048","volume":"59","author":"A Maw","year":"2019","unstructured":"Maw A, Adepu S, Mathur A (2019) Ics-blockops: blockchain for operational data security in industrial control system. Pervasive Mob Comput 59:101048","journal-title":"Pervasive Mob Comput"},{"key":"8791_CR40","doi-asserted-by":"crossref","unstructured":"Van\u00a0Vliet P, Kechadi M-T, Le-Khac N-A (2015) Forensics in industrial control system: a case study. In: Security of Industrial Control Systems and Cyber Physical Systems, Springer, pp 147\u2013156","DOI":"10.1007\/978-3-319-40385-4_10"},{"issue":"11","key":"8791_CR41","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative adversarial networks. Commun ACM 63(11):139\u2013144","journal-title":"Commun ACM"},{"key":"8791_CR42","unstructured":"Zhang H, Goodfellow I, Metaxas D, Odena A (2019) Self-attention generative adversarial networks. In: International conference on machine learning, PMLR, pp 7354\u20137363"},{"key":"8791_CR43","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Junejo KN, Mathur A (2016) A dataset to support research in the design of secure water treatment systems. In: International conference on critical information infrastructures security, Springer, pp 88\u201399","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"8791_CR44","doi-asserted-by":"crossref","unstructured":"Rodofile NR, Schmidt T, Sherry ST, Djamaludin C, Radke K, Foo E (2017) Process control cyber-attacks and labelled datasets on s7comm critical infrastructure. In: Australasian conference on information security and privacy, Springer, pp 452\u2013459","DOI":"10.1007\/978-3-319-59870-3_30"},{"key":"8791_CR45","doi-asserted-by":"crossref","unstructured":"Li D, Chen D, Jin B, Shi L, Goh J, Ng S-K (2019) Mad-gan: multivariate anomaly detection for time series data with generative adversarial networks. In: International Conference on Artificial Neural Networks, Springer, pp 703\u2013716","DOI":"10.1007\/978-3-030-30490-4_56"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08791-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08791-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08791-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T00:18:56Z","timestamp":1693354736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08791-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,24]]},"references-count":45,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["8791"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08791-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,24]]},"assertion":[{"value":"5 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}