{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:06:47Z","timestamp":1769184407453,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447826","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"41-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids"],"prefix":"10.1145","author":[{"given":"Thusitha","family":"Dayaratne","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Ariel","family":"Liebman","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Mahsa","family":"Salehi","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2615158"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385728"},{"key":"e_1_3_2_2_3_1","volume-title":"Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes","author":"Amini Sajjad","year":"2016","unstructured":"Sajjad Amini , Fabio Pasqualetti , and Hamed Mohsenian-Rad . 2016. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes . IEEE Transactions on Smart Grid ( 2016 ), 1--1. Sajjad Amini, Fabio Pasqualetti, and Hamed Mohsenian-Rad. 2016. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes . IEEE Transactions on Smart Grid (2016), 1--1."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664284"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2973951"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2019.8905473"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jup.2016.04.001"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2521339"},{"key":"e_1_3_2_2_9_1","volume-title":"International Workshop on Constraint Modelling and Reformulation. 36--51","author":"He Shan","year":"2014","unstructured":"Shan He , Ariel Liebman , Andrea Rendl , Mark Wallace , and Campbell Wilson . 2014 . Modelling RTP-based residential load scheduling for demand response in smart grids . In International Workshop on Constraint Modelling and Reformulation. 36--51 . Shan He, Ariel Liebman, Andrea Rendl, Mark Wallace, and Campbell Wilson. 2014. Modelling RTP-based residential load scheduling for demand response in smart grids. In International Workshop on Constraint Modelling and Reformulation. 36--51."},{"key":"e_1_3_2_2_10_1","volume-title":"Principles and Practice of Constraint Programming","author":"He Shan","unstructured":"Shan He , Mark Wallace , Graeme Gange , Ariel Liebman , and Campbell Wilson . 2018. A Fast and Scalable Algorithm for Scheduling Large Numbers of Devices Under Real-Time Pricing . In Principles and Practice of Constraint Programming , John Hooker (Ed.). Springer International Publishing , Cham , 649--666. Shan He, Mark Wallace, Graeme Gange, Ariel Liebman, and Campbell Wilson. 2018. A Fast and Scalable Algorithm for Scheduling Large Numbers of Devices Under Real-Time Pricing. In Principles and Practice of Constraint Programming, John Hooker (Ed.). Springer International Publishing, Cham, 649--666."},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 28th USENIX Security Symposium","author":"Huang Bing","year":"2019","unstructured":"Bing Huang , Alvaro A. Cardenas , and Ross Baldick . 2019 . Not everything is dark and gloomy: Power grid protections against IoT demand attacks . Proceedings of the 28th USENIX Security Symposium (2019), 1115--1132. Bing Huang, Alvaro A. Cardenas, and Ross Baldick. 2019. Not everything is dark and gloomy: Power grid protections against IoT demand attacks . Proceedings of the 28th USENIX Security Symposium (2019), 1115--1132."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.313"},{"key":"e_1_3_2_2_13_1","volume-title":"Optimized Day-Ahead Pricing for Smart Grids with Device-Speci fi c Scheduling Flexibility","author":"Carlee","year":"2012","unstructured":"Carlee Joe-wong, Student Member , Soumya Sen , and Sangtae Ha. 2012. Optimized Day-Ahead Pricing for Smart Grids with Device-Speci fi c Scheduling Flexibility . IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , , Vol. 30 , 6 ( 2012 ), 1075--1085. Carlee Joe-wong, Student Member, Soumya Sen, and Sangtae Ha. 2012. Optimized Day-Ahead Pricing for Smart Grids with Device-Speci fi c Scheduling Flexibility . IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, , Vol. 30, 6 (2012), 1075--1085."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2014.7094460"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"e_1_3_2_2_16_1","volume-title":"Optimal demand response based on utility maximization in power networks. In 2011 IEEE power and energy society general meeting","author":"Li Na","unstructured":"Na Li , Lijun Chen , and Steven H Low . 2011. Optimal demand response based on utility maximization in power networks. In 2011 IEEE power and energy society general meeting . IEEE , 1--8. Na Li, Lijun Chen, and Steven H Low. 2011. Optimal demand response based on utility maximization in power networks. In 2011 IEEE power and energy society general meeting. IEEE, 1--8."},{"key":"e_1_3_2_2_17_1","volume-title":"GLOBECOM - IEEE Global Telecommunications Conference. 760--765","author":"Lin Jie","year":"2013","unstructured":"Jie Lin , Wei Yu , and Xinyu Yang . 2013 . On false data injection attack against multistep electricity price in electricity market in smart grid . In GLOBECOM - IEEE Global Telecommunications Conference. 760--765 . Jie Lin, Wei Yu, and Xinyu Yang. 2013. On false data injection attack against multistep electricity price in electricity market in smart grid. In GLOBECOM - IEEE Global Telecommunications Conference. 760--765."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.26"},{"key":"e_1_3_2_2_19_1","volume-title":"IEEE\/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD","volume":"190","author":"Liu Yang","year":"2015","unstructured":"Yang Liu , Shiyan Hu , and Tsung Yi Ho . 2015 . Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks . In IEEE\/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD , Vol. 2015-Janua. 183-- 190 . Yang Liu, Shiyan Hu, and Tsung Yi Ho. 2015. Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In IEEE\/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD , Vol. 2015-Janua. 183--190."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427841"},{"key":"e_1_3_2_2_21_1","first-page":"1","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu Yao","year":"2009","unstructured":"Yao Liu , Peng Ning , and Michael K. Reiter . 2009 . False data injection attacks against state estimation in electric power grids . Ccs , Vol. 14 , 1 (2009), 1 -- 33 . Yao Liu, Peng Ning, and Michael K. Reiter. 2009. False data injection attacks against state estimation in electric power grids . Ccs , Vol. 14, 1 (2009), 1--33.","journal-title":"Ccs"},{"key":"e_1_3_2_2_22_1","volume-title":"Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems","author":"Liu Yang","year":"2017","unstructured":"Yang Liu , Yuchen Zhou , and Shiyan Hu. 2017. Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( 2017 ). Yang Liu, Yuchen Zhou, and Shiyan Hu. 2017. Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2017)."},{"key":"e_1_3_2_2_23_1","volume-title":"A Fast Distributed Algorithm for Large-Scale Demand Response Aggregation. CoRR","author":"Mhanna Sleiman","year":"2016","unstructured":"Sleiman Mhanna , Archie C. Chapman , and Gregor Verbic . 2016. A Fast Distributed Algorithm for Large-Scale Demand Response Aggregation. CoRR , Vol. abs\/ 1603 .00149 ( 2016 ). Sleiman Mhanna, Archie C. Chapman, and Gregor Verbic. 2016. A Fast Distributed Algorithm for Large-Scale Demand Response Aggregation. CoRR , Vol. abs\/1603.00149 (2016)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2235088"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00460-z"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790298"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence (IJCAI '13)","author":"Den Briel Menkes Van","year":"2013","unstructured":"Menkes Van Den Briel , Paul Scott , and Sylvie Thi\u00e9baux . 2013 . Randomized Load Control: A Simple Distributed Approach for Scheduling Smart Appliances . In Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence (IJCAI '13) . AAAI Press, 2915--2922. Menkes Van Den Briel, Paul Scott, and Sylvie Thi\u00e9baux. 2013. Randomized Load Control: A Simple Distributed Approach for Scheduling Smart Appliances. In Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence (IJCAI '13). AAAI Press, 2915--2922."},{"key":"e_1_3_2_2_29_1","volume-title":"Kayem","author":"Weldehawaryat Goitom K.","year":"2017","unstructured":"Goitom K. Weldehawaryat , Pacome L. Ambassa , Anesu M.C. Marufu , Stephen D. Wolthusen , and Anne V.D.M . Kayem . 2017 . Decentralised scheduling of power consumption in micro-grids: Optimisation and security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10166 LNCS. 69--86. Goitom K. Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen D. Wolthusen, and Anne V.D.M. Kayem. 2017. Decentralised scheduling of power consumption in micro-grids: Optimisation and security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10166 LNCS. 69--86."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820657"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2546259"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":31,"alternative-id":["10.1145\/3422337.3447826","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447826","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}