{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:07:36Z","timestamp":1772042856062,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OAC-2017289, SATC 2030611"],"award-info":[{"award-number":["OAC-2017289, SATC 2030611"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522778","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust Anomaly based Attack Detection in Smart Grids under Data Poisoning Attacks"],"prefix":"10.1145","author":[{"given":"Shameek","family":"Bhattacharjee","sequence":"first","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]},{"given":"Mohammad Jaminur","family":"Islam","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]},{"given":"Sahar","family":"Abedzadeh","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2889729"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426739"},{"key":"e_1_3_2_1_3_1","first-page":"1092","article-title":"Limiting the Impact of Stealthy Attacks on Industrial Control Systems","author":"Urbina D.","year":"2016","unstructured":"D. Urbina , J. Giraldo , A. Cardenas , N. Tippenhauer , J. Valente , M. Faisal , J. Ruths , R. Candell and H. Sandberg , \u201c Limiting the Impact of Stealthy Attacks on Industrial Control Systems \", ACM CCS) , pp. 1092 -- 1105 , 2016 . D. Urbina, J. Giraldo, A. Cardenas, N. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell and H. Sandberg, \u201cLimiting the Impact of Stealthy Attacks on Industrial Control Systems\", ACM CCS), pp. 1092--1105, 2016.","journal-title":"ACM CCS)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322072"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196551"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00063"},{"key":"e_1_3_2_1_7_1","volume-title":"ICLR","author":"Goodfellow I.","year":"2015","unstructured":"I. Goodfellow , J. Shlens , and C. Szegedy , \u201c Explaining and harnessing adversarial examples \", ICLR , 2015 . I. Goodfellow, J. Shlens, and C. Szegedy, \u201cExplaining and harnessing adversarial examples\", ICLR, 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"?Adversarial machine learning at scale,\" ICLR","author":"Kurakin A.","year":"2017","unstructured":"A. Kurakin , I. J. Goodfellow , and S. Bengio , ?Adversarial machine learning at scale,\" ICLR 2017 . A. Kurakin, I. J. Goodfellow, and S. Bengio, ?Adversarial machine learning at scale,\" ICLR 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"Ensemble adversarial training: Attacks and defenses,\" ICLR 2018","author":"Tramer F.","unstructured":"F. Tramer , A. Kurakin , N. Papernot , I. Goodfellow , D. Boneh , P. McDaniel , \u201c Ensemble adversarial training: Attacks and defenses,\" ICLR 2018 . F. Tramer, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, \u201cEnsemble adversarial training: Attacks and defenses,\" ICLR 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322072"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. Urbina J. Giraldo A. A. Cardenas N. Tippenhauer J. Valente M. Faisal R. Candell H. Sandberg \u201cLimiting the Impact of Stealthy Attacks on Industrial Control Systems\" ACM CCS 2016.  D. Urbina J. Giraldo A. A. Cardenas N. Tippenhauer J. Valente M. Faisal R. Candell H. Sandberg \u201cLimiting the Impact of Stealthy Attacks on Industrial Control Systems\" ACM CCS 2016.","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_12_1","volume-title":"Survey and New Directions for Physics-Based Attack Detection in Cyber-Physical Systems\", ACM Computing Surveys","author":"Urbina D.","unstructured":"D. Urbina , J. Giraldo , A. A. Cardenas , N. Tippenhauer , J. Valente , M. Faisal , J. Ruths , R. Candell , H. Sandberg , \u201c Survey and New Directions for Physics-Based Attack Detection in Cyber-Physical Systems\", ACM Computing Surveys , Vol. 51(10), 2018 . D. Urbina, J. Giraldo, A. A. Cardenas, N. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell, H. Sandberg, \u201cSurvey and New Directions for Physics-Based Attack Detection in Cyber-Physical Systems\", ACM Computing Surveys, Vol. 51(10), 2018."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23047"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"N. Dalvi P. Domingos M. Mausam S. Sanghai D. Verma \u201cAdversarial Classification\" ACM SIGKDD 2004.  N. Dalvi P. Domingos M. Mausam S. Sanghai D. Verma \u201cAdversarial Classification\" ACM SIGKDD 2004.","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P. Huber E. Ronchetti \u201cRobust Statistics\" Wiley Probability and Statistics ISBN 978-0470129906 Feb. 2009.  P. Huber E. Ronchetti \u201cRobust Statistics\" Wiley Probability and Statistics ISBN 978-0470129906 Feb. 2009.","DOI":"10.1002\/9780470434697"},{"key":"e_1_3_2_1_16_1","volume-title":"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning","author":"Jaglieski M.","year":"2018","unstructured":"M. Jaglieski , A. Oprea , C. Liu , C. Rotaru , B. Li , \u201c Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning \", IEEE S & P Oakland , 2018 . M. Jaglieski, A. Oprea, C. Liu, C. Rotaru, B. Li, \u201cManipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning\", IEEE S & P Oakland, 2018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"A. Ghafouri Y. Vorobeychik X. Koutsoukos \u201cAdversarial Regression for Detecting Attacks in Cyber-Physical Systems\" IJCAI 2018.  A. Ghafouri Y. Vorobeychik X. Koutsoukos \u201cAdversarial Regression for Detecting Attacks in Cyber-Physical Systems\" IJCAI 2018.","DOI":"10.24963\/ijcai.2018\/524"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876327"},{"key":"e_1_3_2_1_19_1","unstructured":"[Online] Pecan Street Project Datasethttps:\/\/www.pecanstreet.org\/  [Online] Pecan Street Project Datasethttps:\/\/www.pecanstreet.org\/"},{"key":"e_1_3_2_1_20_1","unstructured":"[Online] https:\/\/www.globalsign.com\/en\/blog\/cyber-autopsy-series-ukranian-power-grid-attack-makes-history  [Online] https:\/\/www.globalsign.com\/en\/blog\/cyber-autopsy-series-ukranian-power-grid-attack-makes-history"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3494107.3522778","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522778","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":20,"alternative-id":["10.1145\/3494107.3522778","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522778","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}