{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T01:10:32Z","timestamp":1774746632978,"version":"3.50.1"},"reference-count":195,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62303126"],"award-info":[{"award-number":["62303126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62362008"],"award-info":[{"award-number":["62362008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833015"],"award-info":[{"award-number":["61833015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293503"],"award-info":[{"award-number":["62293503"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293502"],"award-info":[{"award-number":["62293502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293500"],"award-info":[{"award-number":["62293500"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073285"],"award-info":[{"award-number":["62073285"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62103371"],"award-info":[{"award-number":["62103371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LR23F030001"],"award-info":[{"award-number":["LR23F030001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LZ23F030009"],"award-info":[{"award-number":["LZ23F030009"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["226-2022-0010"],"award-info":[{"award-number":["226-2022-0010"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["226-2023-00111"],"award-info":[{"award-number":["226-2023-00111"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Research Foundation Singapore and MOE Tier 1","award":["RG87\/22"],"award-info":[{"award-number":["RG87\/22"]}]},{"name":"Key Laboratory of CS&AUS of Zhejiang Province"},{"name":"Guizhou Provincial Science and Technology Projects","award":["ZK[2022]149"],"award-info":[{"award-number":["ZK[2022]149"]}]},{"name":"Guizhou Provincial Research Project (Youth) for Universities","award":["[2022]104"],"award-info":[{"award-number":["[2022]104"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,1]]},"DOI":"10.1109\/jiot.2024.3349381","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T19:55:24Z","timestamp":1704311724000},"page":"18951-18975","source":"Crossref","is-referenced-by-count":106,"title":["Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0950-1525","authenticated-orcid":false,"given":"Zhenyong","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, the Text Computing and Cognitive Intelligence Engineering Research Center of National Education Ministry, and the Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology, Guizhou University, Guiyang, China"}]},{"given":"Mengxiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Automatic Control and Systems Engineering, University of Sheffield, Sheffield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5790-5025","authenticated-orcid":false,"given":"Mingyang","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8158-150X","authenticated-orcid":false,"given":"Ruilong","family":"Deng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-2162","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9090-3614","authenticated-orcid":false,"given":"Mo-Yuen","family":"Chow","sequence":"additional","affiliation":[{"name":"UMCSJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3155-3145","authenticated-orcid":false,"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2021.000161"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2606888"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2021.690237"},{"key":"ref4","article-title":"Artificial intelligence technology strategy","volume-title":"Strategic Council for AI 2225 Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)65191-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/59.32481"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/PSCC.2018.8442500"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2016.02.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631895"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2805723"},{"key":"ref11","first-page":"2643","article-title":"Learning schemes for power system planning and control","volume-title":"Proc. 51st Hawaii Int. Conf. Syst. Sci. (HICSS)","author":"Lassetter"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2082575"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753802"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2019.000565"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106914"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2018.00520"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS.2016.7764166"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2283064"},{"key":"ref20","first-page":"1","article-title":"Winning the l2RPN challenge: Power grid management via semi-Markov afterstate actor-critic","volume-title":"Proc. Int. Conf. Learn. Represent. (ICRL)","author":"Yoon"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339697"},{"key":"ref23","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62238"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"ref26","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref27","article-title":"Security and privacy for artificial intelligence: Opportunities and challenges","author":"Oseni","year":"2021","journal-title":"arXiv:2102.04661"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3036778"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref30","volume-title":"NERC Critical Infrastructure Protection (CIP) Reliability Standards","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134639"},{"key":"ref32","first-page":"3","volume-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid; Defense Use Case","year":"2016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2018.8587547"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.026"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974752"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3136132"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1259"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3453158"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205184"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3485133"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975048"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3374217"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3470493"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref49","article-title":"Adversarial examples in modern machine learning: A review","author":"Wiyatno","year":"2019","journal-title":"arXiv:1911.05268"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.20"},{"key":"ref51","article-title":"TextBugger: Generating adversarial text against real-world applications","author":"Li","year":"2018","journal-title":"arXiv:1812.05271"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref56","first-page":"1345","article-title":"High accuracy and high fidelity extraction of neural networks","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Security 20)","author":"Jagielski"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00027"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref60","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.58"},{"key":"ref62","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref65","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.05.046"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437513"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3009401"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37231-6_21"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/549"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3192558"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3169139"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3159842"},{"key":"ref76","article-title":"Towards adversarial-resilient deep neural networks for false data injection attack detection in power grids","author":"Li","year":"2021","journal-title":"arXiv:2102.09057"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2905348"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2050344"},{"key":"ref79","article-title":"Introducing machine learning for power system operation support","author":"Donnot","year":"2017","journal-title":"arXiv:1709.09527"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2988715"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.09.008"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/61.660853"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926441"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833730"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110256"},{"key":"ref88","article-title":"Major power outage in India possibly caused by hackers: Reports","author":"Kovacs","year":"2020"},{"key":"ref89","volume-title":"Electric Sector Failure Scenarios and Impact Analyses","author":"Lee","year":"2013"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2863256"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.12334"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632336"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3846\/13928619.2006.9637758"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3145285"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3133604"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123252"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3207517"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9281719"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3125345"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3147040"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087649"},{"key":"ref107","article-title":"Exploiting vulnerabilities of deep learning-based energy theft detection in AMI through adversarial attacks","author":"Li","year":"2020","journal-title":"arXiv:2010.09212"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3062722"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632316"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3175252"},{"key":"ref112","article-title":"Understanding the safety requirements for learning-based power systems operations","author":"Chen","year":"2021","journal-title":"arXiv:2110.04983"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909713"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3135565"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2017.08.004"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3307772.3328314"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3062700"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.119688"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2023.3313526"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.12853"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3047864"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TASC.2021.3091116"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066494"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/su11051501"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/60.475850"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2019.8881664"},{"key":"ref127","article-title":"Evaluating the robustness of neural networks: An extreme value theory approach","author":"Weng","year":"2018","journal-title":"arXiv:1801.10578"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171262"},{"key":"ref129","volume-title":"Lights off! the darkness of the smart meters","author":"Illera","year":"2014"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80131-5"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2919157"},{"key":"ref132","article-title":"Maximal Jacobian-based saliency map attack","author":"Wiyatno","year":"2018","journal-title":"arXiv:1808.07945"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.873014"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3063088"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.821457"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2019.00920"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref138","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref139","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Mnih"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2020.000522"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106732"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/en16031480"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753738"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3284681"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3243086"},{"key":"ref146","volume-title":"Smart Grid Awareness-Hacking a Smart Meter and Killing the Grid","author":"Weaver","year":"2024"},{"key":"ref147","volume-title":"Electric Smart Meter Hack","author":"Sun","year":"2017"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23415"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref151","first-page":"2817","article-title":"Robust adversarial reinforcement learning","volume-title":"proc. Int. Conf. Mach. Learn. (ICML)","author":"Pinto"},{"key":"ref152","article-title":"Robust reinforcement learning on state observations with learned optimal adversary","author":"Zhang","year":"2021","journal-title":"arXiv:2101.08452"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref154","article-title":"Evaluating robustness of neural networks with mixed integer programming","author":"Tjeng","year":"2017","journal-title":"arXiv:1711.07356"},{"key":"ref155","article-title":"To prune, or not to prune: Exploring the efficacy of pruning for model compression","author":"Zhu","year":"2017","journal-title":"arXiv:1710.01878"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/3603620"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrs.2024.3376828"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000196"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2936712"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3084934"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700401"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3292532"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.004.2100182"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3157299"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2470218"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3129195"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3222793"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123039"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref174","volume-title":"Secure historian access in SCADA systems","author":"McNamee","year":"2011"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2020.3019501"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288689"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3275988"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3226868"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3049818"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ICHQP.2018.8378902"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106635"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3486611.3492226"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2021.100092"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2933191"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2929702"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Europe47291.2020.9248967"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3162473"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928624"},{"key":"ref190","volume-title":"Essentials of Robust Control","volume":"104","author":"Zhou","year":"1998"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2021.3123613"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2023.3315543"},{"key":"ref193","first-page":"1","article-title":"A framework for leveraging ChatGPT on programming tasks in energy systems","volume-title":"Proc. CORR","author":"Li"},{"key":"ref194","article-title":"BadGPT: Exploring security vulnerabilities of ChatGPT via backdoor attacks to InstructGPT","author":"Shi","year":"2023","journal-title":"arXiv:2304.12298"},{"key":"ref195","article-title":"MasterKey: Automated jailbreak across multiple large language model chatbots","author":"Deng","year":"2023","journal-title":"arXiv:2307.08715"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10536937\/10380506.pdf?arnumber=10380506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:01:57Z","timestamp":1738004517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10380506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,1]]},"references-count":195,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3349381","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,1]]}}}