{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:58:36Z","timestamp":1762271916182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,7]],"date-time":"2015-06-07T00:00:00Z","timestamp":1433635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,7]]},"DOI":"10.1145\/2744769.2747930","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Impact assessment of net metering on smart home cyberattack detection"],"prefix":"10.1145","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[{"name":"Michigan Technological University, Houghton, MI"}]},{"given":"Shiyan","family":"Hu","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, MI"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Yiyu","family":"Shi","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Yu","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture ICT of CAS, Beijing, China"}]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Architecture ICT of CAS, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{Online}. Available: http:\/\/www.solarcity.com\/learn\/understanding-netmetering.aspx  {Online}. Available: http:\/\/www.solarcity.com\/learn\/understanding-netmetering.aspx"},{"key":"e_1_3_2_1_2_1","unstructured":"Distributed generation and renewable energy current programs for businesses. {Online}. Available: http:\/\/docs.cpuc.ca.gov\/published\/newsrelease\/7408.htm  Distributed generation and renewable energy current programs for businesses. {Online}. Available: http:\/\/docs.cpuc.ca.gov\/published\/newsrelease\/7408.htm"},{"key":"e_1_3_2_1_3_1","volume-title":"V. Govindaraju and C. R. Rao","author":"Botev Z. I.","year":"2013","unstructured":"Z. I. Botev , D. P. Kroese , R. Y. Rubinstein , The cross entropy method for optimization. Machine Learning: Theory and Applications , V. Govindaraju and C. R. Rao , Eds, Chennai : Elsevier BV , 31: 35--59, 2013 . Z. I. Botev, D. P. Kroese, R. Y. Rubinstein, et al. The cross entropy method for optimization. Machine Learning: Theory and Applications, V. Govindaraju and C. R. Rao, Eds, Chennai: Elsevier BV, 31:35--59, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1643275.1643301"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of IEEE Energytech","author":"Li B.","year":"2011","unstructured":"B. Li , S. Gangadhar , S. Cheng , and P. Verma . Maximize user rewards in distributed generation environments using reinforcement learning . In Proceedings of IEEE Energytech , pages 1 -- 6 , 2011 . B. Li, S. Gangadhar, S. Cheng, and P. Verma. Maximize user rewards in distributed generation environments using reinforcement learning. In Proceedings of IEEE Energytech, pages 1--6, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2014.6908427"},{"key":"e_1_3_2_1_7_1","article-title":"Leveraging strategic defense techniques for smart home pricing cyberattacks. Accepted to","author":"Liu Y.","unstructured":"Y. Liu , S. Hu , and T.-Y. Ho . Leveraging strategic defense techniques for smart home pricing cyberattacks. Accepted to IEEE Transactions on Dependable and Secure Computing. Y. Liu, S. Hu, and T.-Y. Ho. Leveraging strategic defense techniques for smart home pricing cyberattacks. Accepted to IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2691365.2691404"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2089069"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of European Symposium on Artificial Neural Networks","author":"Tuomas K.","year":"2006","unstructured":"K. Tuomas , F. Rossi , and A. Lendasse . Ls-svm functional network for time series prediction . In Proceedings of European Symposium on Artificial Neural Networks , 2006 . K. Tuomas, F. Rossi, and A. Lendasse. Ls-svm functional network for time series prediction. In Proceedings of European Symposium on Artificial Neural Networks, 2006."}],"event":{"name":"DAC '15: The 52nd Annual Design Automation Conference 2015","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"San Francisco California","acronym":"DAC '15"},"container-title":["Proceedings of the 52nd Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2744769.2747930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2744769.2747930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:36Z","timestamp":1750227156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2744769.2747930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,7]]},"references-count":10,"alternative-id":["10.1145\/2744769.2747930","10.1145\/2744769"],"URL":"https:\/\/doi.org\/10.1145\/2744769.2747930","relation":{},"subject":[],"published":{"date-parts":[[2015,6,7]]},"assertion":[{"value":"2015-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}