{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T02:35:20Z","timestamp":1773023720875,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/smartgridcomm.2019.8909732","type":"proceedings-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T01:39:16Z","timestamp":1574732356000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Xin","family":"Lou","sequence":"first","affiliation":[]},{"given":"Cuong","family":"Tran","sequence":"additional","affiliation":[]},{"given":"David K.Y.","family":"Yau","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Tom Zhengjia","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Marianne","family":"Winslett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973631"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2503429"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref19","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"International Conference on Neural Information Processing Systems (NIPS)"},{"key":"ref4","article-title":"Stuxnet worm impact on industrial cyberphysical system security","author":"zhang","year":"2011","journal-title":"IECON"},{"key":"ref3","year":"0","journal-title":"Hackers infiltrated power grids in U S Spain"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672740"},{"key":"ref5","year":"0","journal-title":"The VPNFilter Botnet Is Attempting a Comeback"},{"key":"ref8","first-page":"847","article-title":"A cyber-physical control framework for transient stability in smart grids","volume":"4","author":"farraj","year":"2013","journal-title":"IEEE Trans Smart Grid"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.1403002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3195182"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3311042"},{"key":"ref1","article-title":"Detecting stepping stones","author":"zhang","year":"2000","journal-title":"USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298725"},{"key":"ref22","article-title":"Deep bidirectional and unidirectional LSTM recurrent neural network for network-wide traffic speed prediction","author":"cui","year":"2018","journal-title":"arXiv preprint arXiv 1801 01000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479109"},{"key":"ref23","year":"0","journal-title":"Thermal Power"},{"key":"ref26","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref25","year":"0","journal-title":"Open Modelica"}],"event":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","location":"Beijing, China","start":{"date-parts":[[2019,10,21]]},"end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8901543\/8909688\/08909732.pdf?arnumber=8909732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:41Z","timestamp":1658155961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2019.8909732","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}