{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:50:37Z","timestamp":1767423037546,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,16]]},"DOI":"10.1109\/icat54566.2022.9811128","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:12:35Z","timestamp":1656965555000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning"],"prefix":"10.1109","author":[{"given":"Alvin","family":"Huseinovic","sequence":"first","affiliation":[{"name":"University of Sarajevo,Faculty of Electrical Engineering,Dept. of Computer Science"}]},{"given":"Yusuf","family":"Korkmaz","sequence":"additional","affiliation":[{"name":"University of Michigan - Flint,Dept. of Computer Science"}]},{"given":"Halil","family":"Bisgin","sequence":"additional","affiliation":[{"name":"University of Michigan - Flint,Dept. of Computer Science"}]},{"given":"Sasa","family":"Mrdovic","sequence":"additional","affiliation":[{"name":"University of Sarajevo,Faculty of Electrical Engineering,Dept. of Computer Science"}]},{"given":"Suleyman","family":"Uludag","sequence":"additional","affiliation":[{"name":"University of Michigan - Flint,Dept. of Computer Science"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-1-4842-4976-5"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ISAP48318.2019.9065966"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/NAPS46351.2019.9000400"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TSG.2019.2898676"},{"key":"ref30","first-page":"1","article-title":"Unsupervised clustering on PMU data for event characterization on smart grid","author":"klinginsmith","year":"2016","journal-title":"2016 IEEE International Smart Cities Conference (ISC2)"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ISGT.2015.7131877"},{"year":"0","journal-title":"Epfl campus pmu dataset","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.epsr.2018.02.018"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/OAJPE.2021.3061648"},{"year":"2013","author":"xiao","journal-title":"Security and Privacy in Smart Grids","key":"ref10"},{"year":"2021","author":"chollet","journal-title":"Deep Learning with Python","key":"ref40"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ACCESS.2020.3026923"},{"year":"2018","journal-title":"Tech Rep","article-title":"Surviving a Catastrophic Power Outage","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/MC.2017.4451203"},{"year":"0","article-title":"The Global Risks Report 2018 13th Edition","key":"ref14"},{"key":"ref15","article-title":"Framework for Improving Critical Infrastructure Cybersecurity Version 1.1","author":"barrett","year":"2018","journal-title":"Tech Rep"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/JPROC.2010.2060450"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIE.2021.3053897"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ACCESS.2018.2878436"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ACCESS.2017.2716440"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TPWRS.2020.3022588"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","article-title":"Security and Privacy Challenges in the Smart Grid","volume":"7","author":"systems","year":"2009","journal-title":"Security & Privacy IEEE"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/IGSC48788.2019.8957211"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SURV.2011.101911.00087"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TSG.2010.2046347"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TSG.2018.2859339"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MSP.2010.49"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SURV.2011.122111.00145"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.comnet.2012.12.017"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.rser.2016.01.011"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MCOM.2012.6257525"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MPE.2009.934876"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.jprot.2012.09.006"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TSG.2015.2499766"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1162\/089976603321891855"},{"year":"2020","author":"jiang","article-title":"Defending against adversarial attacks in transmission- and distribution-level pmu data","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ISGTEurope.2016.7856326"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.tifs.2006.06.005"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.ijepes.2018.11.013"},{"key":"ref41","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"year":"2019","author":"jiang","journal-title":"Defending against adversarial attacks in electric power systems A machine learning approach","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1023\/A:1009715923555"},{"key":"ref26","first-page":"1","article-title":"Fast sequence component analysis for attack detection in smart grid","author":"landford","year":"2016","journal-title":"2016 IEEE International Smart Cities Conference (ISC2)"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.3390\/s17102261"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/JSYST.2019.2963546"}],"event":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","start":{"date-parts":[[2022,6,16]]},"location":"Sarajevo, Bosnia and Herzegovina","end":{"date-parts":[[2022,6,18]]}},"container-title":["2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810982\/9811105\/09811128.pdf?arnumber=9811128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:43:45Z","timestamp":1659660225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,16]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icat54566.2022.9811128","relation":{},"subject":[],"published":{"date-parts":[[2022,6,16]]}}}