{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:41:35Z","timestamp":1777657295488,"version":"3.51.4"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3452476","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T17:46:33Z","timestamp":1725039993000},"page":"121169-121184","source":"Crossref","is-referenced-by-count":12,"title":["Adversarially Robust Fault Zone Prediction in Smart Grids With Bayesian Neural Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3812-436X","authenticated-orcid":false,"given":"Emad","family":"Efatinasab","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0404-6200","authenticated-orcid":false,"given":"Alberto","family":"Sinigaglia","sequence":"additional","affiliation":[{"name":"Human Inspired Technology Research Center, University of Padua, Padua, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0238-762X","authenticated-orcid":false,"given":"Nahal","family":"Azadi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5739-9639","authenticated-orcid":false,"given":"Gian","family":"Antonio Susto","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0881-0131","authenticated-orcid":false,"given":"Mirco","family":"Rampazzo","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.08.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/en16010472"},{"key":"ref3","volume-title":"3 Alarming Threats to the U.S. Energy Grid\u2014Cyber, Physical, and Existential Events","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-64171-8_26"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3565570"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70879-4_19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AMPS.2018.8494849"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/hve.2016.0005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/en16052280"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/en13092149"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0364"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon42311.2019.9020355"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/en13133460"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2517620"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3155327"},{"issue":"3","key":"ref18","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/S0893-6080(00)00098-8","article-title":"Bayesian approach for neural networks\u2014Review and case studies","volume":"14","author":"Lampinen","year":"2001","journal-title":"Neural Netw."},{"key":"ref19","first-page":"4629","article-title":"What are Bayesian neural network posteriors really like?","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Izmailov"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2889774"},{"key":"ref23","first-page":"1613","article-title":"Weight uncertainty in neural network","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Blundell"},{"key":"ref24","article-title":"Evaluating the robustness of Bayesian neural networks against different types of attacks","author":"Pang","year":"2021","journal-title":"arXiv:2106.09223"},{"key":"ref25","article-title":"Flipout: Efficient pseudo-independent weight perturbations on mini-batches","author":"Wen","year":"2018","journal-title":"arXiv:1803.04386"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-886-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(02)00174-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00202-011-0218-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2007.4441599"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1049\/oap-cired.2017.0007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.11.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEP.2009.5212044"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/61.905590"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586471"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.844307"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107399"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2017.00151"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988909"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00202-020-01074-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s22020458"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT50606.2022.9817473"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2021.107766"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.858774"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2357780"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106254"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557612"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2017.02.006"},{"key":"ref49","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref51","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref52","article-title":"Comment on \u2018Adv-BNN: Improved adversarial defense through robust Bayesian neural network","author":"Zimmermann","year":"2019","journal-title":"arXiv:1907.00895"},{"key":"ref53","volume-title":"IntelLabs\/Bayesian-torch: Bayesian-torch 0.5.0","author":"Krishnan","year":"2024"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162853"},{"key":"ref55","article-title":"Deep ensembles: A loss landscape perspective","author":"Fort","year":"2019","journal-title":"arXiv:1912.02757"},{"key":"ref56","article-title":"Understanding measures of uncertainty for adversarial example detection","author":"Smith","year":"2018","journal-title":"arXiv:1803.08533"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2828414"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2330624"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2895634"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809045"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2129544"},{"key":"ref62","article-title":"Torchattacks: A PyTorch repository for adversarial attacks","author":"Kim","year":"2020","journal-title":"arXiv:2010.01950"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10659889.pdf?arnumber=10659889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:03:07Z","timestamp":1726030987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10659889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3452476","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}