{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:38:22Z","timestamp":1762868302703,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207525","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-7","source":"Crossref","is-referenced-by-count":16,"title":["Semi-Supervised Domain-Adversarial Training for Intrusion Detection against False Data Injection in the Smart Grid"],"prefix":"10.1109","author":[{"given":"Yongxuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"journal-title":"IEEE 30-Bus System","year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","volume":"24","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","article-title":"The 2015 ukraine blackout: Implications for false data injection attacks","volume":"32","author":"liang","year":"2016","journal-title":"IEEE Transactions on Power Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"cortes","year":"1995","journal-title":"Machine Learning"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref35","article-title":"The truth of the f-measure","author":"sasaki","year":"2007","journal-title":"Teach Tutor Mater"},{"journal-title":"ISO New England-Energy Load and Demand Reports","year":"2019","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2018.8566601"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03493-1_58"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909793"},{"key":"ref14","first-page":"2096","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"ganin","year":"2016","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851777"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851925"},{"key":"ref19","article-title":"Semi-supervised domain adaptation by covariance matching","author":"li","year":"2018","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref28"},{"journal-title":"Business blackout The insurance implications of a cyber attack on the US power grid","year":"2015","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851841"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref29","first-page":"318","article-title":"Parallel distributed processing: Explorations in the microstructure of cognition","volume":"1","author":"rumelhart","year":"1986","journal-title":"Learning Internal Representations by Error Propagation"},{"journal-title":"Cyber-Attack Against Ukrainian Critical Infrastructure","year":"2019","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727361"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966342"},{"journal-title":"Dataset Shift in Machine Learning","year":"2009","author":"quionero-candela","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966339"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.04.011"},{"key":"ref22","first-page":"181","article-title":"Exploiting weakly-labeled web images to improve object classification: a domain adaptation approach","author":"bergamo","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref21","article-title":"Fredholm multiple kernel learning for semi-supervised domain adaptation","author":"wang","year":"2017","journal-title":"Thirty-First AAAI Conference on Artificial Intelligence"},{"key":"ref24","first-page":"213","article-title":"Adapting visual category models to new domains","author":"saenko","year":"2010","journal-title":"European Conference on Computer Vision"},{"article-title":"Learning with augmented features for heterogeneous domain adaptation","year":"2012","author":"duan","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170749"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23461-8_8"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207525.pdf?arnumber=9207525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:18Z","timestamp":1656453198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207525","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}