{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:47:30Z","timestamp":1776955650034,"version":"3.51.4"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003833","name":"Hydro-Qu\u00e9bec","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003833","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008583","name":"McGill University in the framework of the NSERC\/Hydro-Qu\u00e9bec Industrial Research Chair in Interactive Information Infrastructure for the Power Grid","doi-asserted-by":"publisher","award":["IRCPJ406021-14"],"award-info":[{"award-number":["IRCPJ406021-14"]}],"id":[{"id":"10.13039\/100008583","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tsg.2023.3300239","type":"journal-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:30:04Z","timestamp":1690824604000},"page":"2073-2088","source":"Crossref","is-referenced-by-count":14,"title":["Adversarial Dynamic Load-Altering Cyberattacks Against Peak Shaving Using Residential Electric Water Heaters"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-0267","authenticated-orcid":false,"given":"El-Nasser S.","family":"Youssef","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, McGill University, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-9156","authenticated-orcid":false,"given":"Fabrice","family":"Labeau","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, McGill University, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3007-2350","authenticated-orcid":false,"given":"Marthe","family":"Kassouf","sequence":"additional","affiliation":[{"name":"System Resiliency Unit, Hydro-Qu&#x00E9;bec&#x2019;s Research Institute, Varennes, Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cyberattack detection and mitigation for direct load control of electric water heaters","author":"Abdelhafez","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913984"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277206"},{"key":"ref8","first-page":"1115","article-title":"Not everything is dark and gloomy: Power grid protections against IoT demand attacks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Huang"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM48719.2022.9916999"},{"key":"ref10","volume-title":"How hacked water heaters could trigger mass blackouts, Wired","author":"Greenberg","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2922131"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3134176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3231563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2622686"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3070313"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107113"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MED54222.2022.9837241"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT50606.2022.9910418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/en15207807"},{"key":"ref20","article-title":"Botnets breaking transformers: Localization of power botnet attacks against the distribution grid","author":"Pepin","year":"2022","journal-title":"arXiv:2203.10158"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/stg2.12066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.116015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref25","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Represent. (ICLR)","author":"Szegedy"},{"key":"ref26","first-page":"1","article-title":"Adversarial machine learning at scale","volume-title":"Proc. 5th Int. Conf. Learn. Represent. (ICLR)","author":"Kurakin"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3447555.3464859"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087789"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3062722"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RWS47064.2019.8971816"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2018.8587547"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087649"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3057525"},{"key":"ref35","first-page":"1","article-title":"Adversarial examples in the physical world","volume-title":"Proc. Workshop Track 5th Int. Conf. Learn. Represent. (ICLR)","author":"Kurakin"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102517"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2013.6707934"},{"key":"ref39","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Workshop Track 5th Int. Conf. Learn. Represent. (ICLR)","author":"Goodfellow"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02300-7_4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2011.6018239"},{"key":"ref42","volume-title":"MITRE ATT&CK\u00ae, v12.1","year":"2022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref44","volume-title":"APT1: Exposing one of China\u2019s cyber espionage units","year":"2013"},{"key":"ref45","article-title":"Analysis of the cyber attack on the Ukrainian power grid, defense use case","volume-title":"Elect. Inf. Sharing Anal. Centre (E-ISAC)","author":"Lee","year":"2016"},{"key":"ref46","volume-title":"The Ukrainian power grid was hacked again, Motherboard, tech by vice","author":"Zetter","year":"2017"},{"key":"ref47","article-title":"Personal data of 2.7 million people leaked from Desjardins","author":"Montpetit","year":"2019","journal-title":"CBC News"},{"key":"ref48","volume-title":"Capital one data breach compromises data of over 100 million","author":"Flitter","year":"2019"},{"key":"ref49","volume-title":"Trade secret theft: Investigation into theft of intellectual property from GE leads to two guilty pleas, FBI news stories","year":"2020"},{"key":"ref50","volume-title":"Tesla data theft case illustrates the danger of the insider threat, Digital guardian\u2019s data insider","author":"Brook","year":"2021"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047374"},{"key":"ref52","volume-title":"Reliability standards for the bulk electric systems of North America","year":"2022"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2492950"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/9781118627372"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3532-1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.sorms.2012.08.001"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1017\/S0962492913000032"},{"key":"ref59","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldenberg","year":"1989"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1126\/science.220.4598.671"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1.3.190"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2.1.4"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/ICNN.1995.488968","article-title":"Particle swarm optimization","volume-title":"Proc. Int. Conf. Neural Netw. (ICNN)","volume":"4","author":"Kennedy"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68913-5"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1137\/040603371"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9234-1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-008-0089-2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.02.044"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2005.1470372"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1916461.1916468"},{"key":"ref72","volume-title":"OPTI toolbox: A free MATLAB toolbox for optimization","author":"Currie","year":"2021"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1137\/080716980"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1137\/070692662"},{"key":"ref75","volume-title":"GA: Find minimum of function using genetic algorithm","year":"2023"},{"key":"ref76","first-page":"1","article-title":"ROC graphs: Notes and practical considerations for researchers","volume":"31","author":"Fawcett","year":"2004","journal-title":"Mach. Learn."}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/10440375\/10197626.pdf?arnumber=10197626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:11:01Z","timestamp":1710364261000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10197626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":76,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2023.3300239","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}