{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:48:10Z","timestamp":1773780490714,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302071"],"award-info":[{"award-number":["62302071"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Chongqing, China","award":["CSTB2023NSCQ-MSX0693"],"award-info":[{"award-number":["CSTB2023NSCQ-MSX0693"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tmc.2025.3590765","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T18:10:33Z","timestamp":1753121433000},"page":"13696-13709","source":"Crossref","is-referenced-by-count":11,"title":["Preventing Non-Intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8643-0647","authenticated-orcid":false,"given":"Jialing","family":"He","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1252-8761","authenticated-orcid":false,"given":"Jiacheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1381-7952","authenticated-orcid":false,"given":"Ning","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-5308","authenticated-orcid":false,"given":"Shangwei","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4623","authenticated-orcid":false,"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3211408"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2848237"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4108\/inis.2.2.e4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"ref6","first-page":"1472","article-title":"Approximate inference in additive factorial HMMs with application to energy disaggregation","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Kolter"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2327041"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2631238"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821672"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11873"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011150"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3236792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3427771.3429390"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25636"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2953225"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/en14040847"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2684806"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3042421"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s21238087"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700155"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.12.114"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3157472"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2803782"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2425422"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3130402"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3038757"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851936"},{"key":"ref29","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref31","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref33","article-title":"Understanding and enhancing the transferability of adversarial examples","author":"Wu","year":"2018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2986319"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05933-9_38"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3135565"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2024.3384208"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTAsia54193.2022.10003611"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3193989"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.11.007"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685910"},{"key":"ref43","article-title":"An adversarial attacker for neural networks in regression problems","volume-title":"Proc. IJCAI Workshop Artif. Intell. Saf.","author":"Gupta"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3302838"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3516128"},{"key":"ref46","first-page":"59","article-title":"REDD: A public data set for energy disaggregation research","volume-title":"Proc. Workshop Data Mining Appl. Sustainability","author":"Kolter"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2015.7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6119826"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472104"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2938068"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3027491"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-020-01501-5"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265884"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2021.3114307"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3134018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380291"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2965276"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11229982\/11086413.pdf?arnumber=11086413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T05:46:56Z","timestamp":1762408016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11086413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":58,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3590765","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}