{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:16Z","timestamp":1775228716795,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Institutional Fund Projects","award":["IFPIP: 833-135-1442"],"award-info":[{"award-number":["IFPIP: 833-135-1442"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,6,15]]},"DOI":"10.1109\/jiot.2023.3243086","type":"journal-article","created":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T19:00:41Z","timestamp":1675796441000},"page":"11038-11053","source":"Crossref","is-referenced-by-count":53,"title":["A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure"],"prefix":"10.1109","volume":"10","author":[{"given":"Mahmoud M.","family":"Badr","sequence":"first","affiliation":[{"name":"Department of Network and Computer Security: Cybersecurity, College of Engineering, SUNY Polytechnic Institute, Utica, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8719-501X","authenticated-orcid":false,"given":"Mohamed M. E. A.","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"KINDI Center for Computing Research, Qatar University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1734-8399","authenticated-orcid":false,"given":"Mohammed","family":"Abdulaal","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Center of Excellence in Intelligent Engineering Systems (CEIES), King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9992-7177","authenticated-orcid":false,"given":"Abdulah Jeza","family":"Aljohani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Center of Excellence in Intelligent Engineering Systems, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0396-1347","authenticated-orcid":false,"given":"Fawaz","family":"Alsolami","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"given":"Abdullah","family":"Balamsh","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2807925"},{"key":"ref35","first-page":"1322","article-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"2008","journal-title":"Proc IEEE World Congr Comput Intell"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873814"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4314\/ijest.v2i2.59139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIASG.2014.7011557"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026692"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545748"},{"key":"ref36","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref31","article-title":"Exploiting vulnerabilities of deep learning-based energy theft detection in AMI through adversarial attacks","author":"li","year":"2020","journal-title":"arXiv 2010 09212"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0052"},{"key":"ref33","first-page":"28","article-title":"Neural networks learning improvement using the K-means clustering algorithm to detect network intrusions","volume":"5","author":"faraoun","year":"2006","journal-title":"INFOCOMP J Comput Sci"},{"key":"ref10","year":"2009","journal-title":"Electricity thefts surge in bad times"},{"key":"ref32","article-title":"Ensemble methods as a defense to adversarial perturbations against deep neural networks","author":"strauss","year":"2017","journal-title":"arXiv 1709 03423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120705"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2406311"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1620432.1620472"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1088\/1749-4699\/8\/1\/014008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2943115"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925322"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.114715"},{"key":"ref18","first-page":"1","article-title":"Methodology for extracting dynamic standard load profiles from smart meter data","author":"keitsch","year":"2016","journal-title":"Proc Symp Energieinnovation"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"ref23","year":"2020","journal-title":"State Grid Corporation of China"},{"key":"ref26","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv 1312 6199"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500822"},{"key":"ref20","year":"2022","journal-title":"Irish Social Science Data Archive"},{"key":"ref22","year":"2020","journal-title":"Solar home electricity data"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2833749"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.58"},{"key":"ref27","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref8","year":"2021","journal-title":"World Loses $89 3 Billion to Electricity Theft Annually $58 7 Billion in Emerging Markets"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3087580"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon48659.2022.9764093"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297246"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615628"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3230586"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10142029\/10039065.pdf?arnumber=10039065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T18:17:55Z","timestamp":1687198675000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10039065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,15]]},"references-count":39,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3243086","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,15]]}}}