{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:27:04Z","timestamp":1770334024631,"version":"3.49.0"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP180102828"],"award-info":[{"award-number":["DP180102828"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP200101374"],"award-info":[{"award-number":["DP200101374"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi, China","award":["2020L0338"],"award-info":[{"award-number":["2020L0338"]}]},{"name":"Shanxi Province Science Foundation for Youth, China","award":["201901D211306"],"award-info":[{"award-number":["201901D211306"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1109\/tii.2021.3089976","type":"journal-article","created":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T19:57:50Z","timestamp":1623873470000},"page":"7824-7833","source":"Crossref","is-referenced-by-count":43,"title":["A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1932-1440","authenticated-orcid":false,"given":"Lei","family":"Cui","sequence":"first","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1559-6022","authenticated-orcid":false,"given":"Lei","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Information and Computer, Taiyuan University of Technology, Shanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1216-5166","authenticated-orcid":false,"given":"Borui","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"ref11","first-page":"2484","article-title":"Simple black-box adversarial attacks","author":"guo","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2229397"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854703"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2921232"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3006299.3006310"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2017.8378347"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.3048784"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2892595"},{"key":"ref28","first-page":"10 544","article-title":"Class-weighted classification: Trade-offs and robust approaches","author":"xu","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2010.11.037"},{"key":"ref27","first-page":"5276","article-title":"Towards fast computation of certified robustness for Relu networks","author":"weng","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref3","article-title":"Electricity theft and non-technical losses: Global markets, solutions and vendors","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2965276"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753738"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102808"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903312"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2818167"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2890663"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2519506"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2889729"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3000184"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1002\/for.1125","article-title":"Robust forecasting with exponential and holt-winters smoothing","volume":"29","author":"gelper","year":"2010","journal-title":"J Forecasting"},{"key":"ref25","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9895125\/09457156.pdf?arnumber=9457156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T23:58:10Z","timestamp":1725235090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9457156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":28,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3089976","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11]]}}}