{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:12Z","timestamp":1767339792062,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469047","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning"],"prefix":"10.1145","author":[{"given":"Kian","family":"Hamedani","sequence":"first","affiliation":[{"name":"ECE Department of Virginia Tech, Blacksburg, VA, USA, Marconi-Rosenblatt AI\/ML Innovation Lab, ANDRO Computational Solutions LLC, Rome, NY, USA"}]},{"given":"Lingjia","family":"Liu","sequence":"additional","affiliation":[{"name":"ECE Department of Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Jithin","family":"Jagannath","sequence":"additional","affiliation":[{"name":"Marconi-Rosenblatt AI\/ML Innovation Lab, ANDRO Computational Solutions LLC, Rome, NY, USA"}]},{"given":"Yang (Cindy)","family":"Yi","sequence":"additional","affiliation":[{"name":"ECE Department of Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining 1 (Aug","author":"Dalvi N.","year":"2004","unstructured":"N. Dalvi , P. Domingos , S. Sanghai , and D. Verma . 2004. Adversarial classification . in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining 1 (Aug 2004 ), 99--108. N. Dalvi, P. Domingos, S. Sanghai, and D. Verma. 2004. Adversarial classification. in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining 1 (Aug 2004), 99--108."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"Reservoir computing meets smart grids: attack detection using delayed feedback networks","volume":"14","author":"Hamedani K.","year":"2018","unstructured":"K. Hamedani , L. Liu , R. Atat , J. Wu , and Y. Yi . 2018 . Reservoir computing meets smart grids: attack detection using delayed feedback networks . IEEE Transaction On Ind Informatics 14 , 2 (Feb 2018), 734--743. K. Hamedani, L. Liu, R. Atat, J. Wu, and Y. Yi. 2018. Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Transaction On Ind Informatics 14, 2 (Feb 2018), 734--743.","journal-title":"IEEE Transaction On Ind Informatics"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101913"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA49378.2020.9095625"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2017.2782090"},{"key":"e_1_3_2_1_11_1","first-page":"48","article-title":"Machine learning methods for attack detection in the smart grid","volume":"27","author":"Ozay M.","year":"2016","unstructured":"M. Ozay , I. Esnaola , F. Vural , S. Kulkarni , and H. Poor . 2016 . Machine learning methods for attack detection in the smart grid . IEEE Transactions on Neural Nets and Learning Syts 27 , 48 (Aug. 2016), 1773--1786. M. Ozay, I. Esnaola, F. Vural, S. Kulkarni, and H. Poor. 2016. Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Nets and Learning Syts 27, 48 (Aug. 2016), 1773--1786.","journal-title":"IEEE Transactions on Neural Nets and Learning Syts"},{"key":"e_1_3_2_1_12_1","first-page":"5","article-title":"A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids","volume":"6","author":"Moslemi A. Mesbahi R.","year":"2018","unstructured":"A. Mesbahi R. Moslemi and J. Velni . 2018 . A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids . IEEE Transactions on Smart Grids 6 , 5 (Sep 2018), 14930--4941. A. Mesbahi R. Moslemi and J. Velni. 2018. A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids. IEEE Transactions on Smart Grids 6, 5 (Sep 2018), 14930--4941.","journal-title":"IEEE Transactions on Smart Grids"},{"key":"e_1_3_2_1_13_1","volume-title":"Coalitional game theory for communication networks. Ieee signal processing magazine 26, 5","author":"Saad Walid","year":"2009","unstructured":"Walid Saad , Zhu Han , M\u00e9rouane Debbah , Are Hjorungnes , and Tamer Basar . 2009. Coalitional game theory for communication networks. Ieee signal processing magazine 26, 5 ( 2009 ), 77--97. Walid Saad, Zhu Han, M\u00e9rouane Debbah, Are Hjorungnes, and Tamer Basar. 2009. Coalitional game theory for communication networks. Ieee signal processing magazine 26, 5 (2009), 77--97."},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"Game-Theory based dynamic pricing strategies for demand side management in smart grids","volume":"8","author":"Srinivasan D.","year":"2017","unstructured":"D. Srinivasan , S. Rajgarhia , B. Radhakrishnan , A. Sharma , and H. Khincha . 2017 . Game-Theory based dynamic pricing strategies for demand side management in smart grids . Energy 8 , 4 (July 2017), 21--32. D. Srinivasan, S. Rajgarhia, B. Radhakrishnan, A. Sharma, and H. Khincha. 2017. Game-Theory based dynamic pricing strategies for demand side management in smart grids. Energy 8, 4 (July 2017), 21--32.","journal-title":"Energy"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2971584"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727361"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2492827"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":18,"alternative-id":["10.1145\/3468218.3469047","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469047","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}