{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:20:04Z","timestamp":1772644804493,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Engineering Secure Systems of the Helmholtz Association (HGF) and by KASTEL Security Research Labs","award":["46.23.02"],"award-info":[{"award-number":["46.23.02"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,4]]},"DOI":"10.1145\/3632775.3661984","type":"proceedings-article","created":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T15:31:37Z","timestamp":1720539097000},"page":"589-595","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6634-8315","authenticated-orcid":false,"given":"Gustavo","family":"S\u00e1nchez","sequence":"first","affiliation":[{"name":"KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1137-1782","authenticated-orcid":false,"given":"Ghada","family":"Elbez","sequence":"additional","affiliation":[{"name":"KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3572-9083","authenticated-orcid":false,"given":"Veit","family":"Hagenmeyer","sequence":"additional","affiliation":[{"name":"KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Afia Afrin and Omid Ardakanian. 2023. Adversarial Attacks on Machine Learning-Based State Estimation in Power Distribution Systems. In eEnergy \u201923.","DOI":"10.1145\/3575813.3597352"},{"key":"e_1_3_2_1_2_1","volume":"202","author":"Agwan Utkarsha","unstructured":"Utkarsha Agwan, Lucas Spangher, William Arnold, Tarang Srivastava, Kameshwar Poolla, and Costas\u00a0J Spanos. 2021. Pricing in prosumer aggregations using reinforcement learning. In eEnergy \u201921.","journal-title":"J Spanos."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids. arXiv","author":"Ardito Carmelo","year":"2023","unstructured":"Carmelo Ardito, Yashar Deldjoo, Tommaso Di\u00a0Noia, Eugenio Di\u00a0Sciascio, Fatemeh Nazary, and Giovanni Servedio. 2023. Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids. arXiv (2023)."},{"key":"e_1_3_2_1_4_1","unstructured":"Daniel Arp Erwin Quiring Feargus Pendlebury Alexander Warnecke Fabio Pierazzi Christian Wressnegger Lorenzo Cavallaro and Konrad Rieck. 2022. Dos and don\u2019ts of machine learning in computer security. In USENIX Security \u201922."},{"key":"e_1_3_2_1_5_1","volume-title":"Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information fusion","author":"Arrieta Alejandro\u00a0Barredo","year":"2020","unstructured":"Alejandro\u00a0Barredo Arrieta, Natalia D\u00edaz-Rodr\u00edguez, Javier Del\u00a0Ser, Adrien Bennetot, Siham Tabik, Alberto Barbado, Salvador Garc\u00eda, Sergio Gil-L\u00f3pez, Daniel Molina, Richard Benjamins, 2020. Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information fusion (2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Shameek Bhattacharjee Mohammad\u00a0Jaminur Islam and Sahar Abedzadeh. 2022. Robust anomaly based attack detection in smart grids under data poisoning attacks. In CPSS \u201922.","DOI":"10.1145\/3494107.3522778"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"e_1_3_2_1_8_1","volume-title":"Novel Evasion Attacks against Adversarial Training Defense for Smart Grid Federated Learning. Access","author":"Bondok H","year":"2023","unstructured":"Atef\u00a0H Bondok, Mohamed Mahmoud, Mahmoud\u00a0M Badr, Mostafa\u00a0M Fouda, Mohamed Abdallah, and Maazen Alsabaan. 2023. Novel Evasion Attacks against Adversarial Training Defense for Smart Grid Federated Learning. Access (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In SP \u201917.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. In SPW \u201918.","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Yize Chen Yushi Tan and Baosen Zhang. 2019. Exploiting vulnerabilities of load forecasting through adversarial attacks. In eEnergy \u201919.","DOI":"10.1145\/3307772.3328314"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Richard Colbaugh and Kristin Glass. 2011. Proactive defense for evolving cyber threats. In ISI \u201911.","DOI":"10.2172\/1059470"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Nilesh Dalvi Pedro Domingos Mausam Sumit Sanghai and Deepak Verma. 2004. Adversarial classification. In KDD \u201904.","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_14_1","unstructured":"Ambra Demontis Marco Melis Maura Pintor Matthew Jagielski Battista Biggio Alina Oprea Cristina Nita-Rotaru and Fabio Roli. 2019. Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks. In USENIX Security \u201919."},{"key":"e_1_3_2_1_15_1","volume-title":"A sentence-level text adversarial attack algorithm against IIoT based smart grid. Computer Networks","author":"Dong Jialiang","year":"2021","unstructured":"Jialiang Dong, Zhitao Guan, Longfei Wu, Xiaojiang Du, and Mohsen Guizani. 2021. A sentence-level text adversarial attack algorithm against IIoT based smart grid. Computer Networks (2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3312376"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Zhang Guihai and Biplab Sikdar. 2021. Adversarial machine learning against false data injection attack detection for smart grid demand response. In SmartGridComm\u201921.","DOI":"10.1109\/SmartGridComm51999.2021.9632316"},{"key":"e_1_3_2_1_18_1","volume":"202","author":"Gunn Sam","unstructured":"Sam Gunn, Doseok Jang, Orr Paradise, Lucas Spangher, and Costas\u00a0J Spanos. 2022. Adversarial poisoning attacks on reinforcement learning-driven energy pricing. In BuildSys \u201922.","journal-title":"J Spanos."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Kian Hamedani Lingjia Liu Jithin Jagannath and Yang Yi. 2021. Adversarial classification of the attacks on smart grids using game theory and deep learning. In WiseML @ WiSec \u201921.","DOI":"10.1145\/3468218.3469047"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3217060"},{"key":"e_1_3_2_1_21_1","volume-title":"Online false data injection attack detection with wavelet transform and deep neural networks","author":"James JQ","year":"2018","unstructured":"JQ James, Yunhe Hou, and Victor\u00a0OK Li. 2018. Online false data injection attack detection with wavelet transform and deep neural networks. IEEE Transactions on Industrial Informatics (2018)."},{"key":"e_1_3_2_1_22_1","unstructured":"KASTEL. 2023. KASTEL - Security and Privacy for Future Energy Systems. Available at https:\/\/www.kastel.kit.edu\/english\/energie.php (accessed 20\/03\/2024)."},{"key":"e_1_3_2_1_23_1","volume-title":"Short-term residential load forecasting based on LSTM recurrent neural network","author":"Kong Weicong","year":"2017","unstructured":"Weicong Kong, Zhao\u00a0Yang Dong, Youwei Jia, David\u00a0J Hill, Yan Xu, and Yuan Zhang. 2017. Short-term residential load forecasting based on LSTM recurrent neural network. IEEE transactions on smart grid (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Tian Liu and Tao Shu. 2019. Adversarial false data injection attack against nonlinear ac state estimation with ann in smart grid. In SecureComm \u201919.","DOI":"10.1007\/978-3-030-37231-6_21"},{"key":"e_1_3_2_1_26_1","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In NIPS \u201917."},{"key":"e_1_3_2_1_27_1","volume-title":"Adversarial Examples in Deep Learning for Multivariate Time Series Regression. arXiv:2009.11911","author":"Mode Gautam\u00a0Raj","year":"2020","unstructured":"Gautam\u00a0Raj Mode and Khaza\u00a0Anuarul Hoque. 2020. Adversarial Examples in Deep Learning for Multivariate Time Series Regression. arXiv:2009.11911 (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Aneeqa Mumrez Muhammad\u00a0M Roomi Heng\u00a0Chuan Tan Daisuke Mashima Ghada Elbez and Veit Hagenmeyer. 2023. Comparative Study on Smart Grid Security Testbeds Using MITRE ATT&CK Matrix. In SmartGridComm \u201923.","DOI":"10.1109\/SmartGridComm57358.2023.10333902"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Aneeqa Mumrez Gustavo S\u00e1nchez Ghada Elbez and Veit Hagenmeyer. 2023. On Evasion of Machine Learning-based Intrusion Detection in Smart Grids. In SmartGridComm \u201923.","DOI":"10.1109\/SmartGridComm57358.2023.10333966"},{"key":"e_1_3_2_1_30_1","unstructured":"Fatemeh Nazary Yashar Deldjoo Tommaso Di\u00a0Noia Carmelo Ardito and Eugenio Di\u00a0Sciascio. 2023. Smart Electrical grids Under the Lens of Adversarial Attacks. (2023)."},{"key":"e_1_3_2_1_31_1","volume-title":"Security Conferences. In CCS \u201923","author":"Olszewski Daniel","year":"2023","unstructured":"Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin Butler, and Patrick Traynor. 2023. \" Get in Researchers; We\u2019re Measuring Reproducibility\": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. In CCS \u201923."},{"key":"e_1_3_2_1_32_1","volume-title":"Improving robustness of reinforcement learning for power system control with adversarial training. RL4RL @ ICML \u201921","author":"Pan Alexander","year":"2021","unstructured":"Alexander Pan, Yongkyun Lee, Huan Zhang, Yize Chen, and Yuanyuan Shi. 2021. Improving robustness of reinforcement learning for power system control with adversarial training. RL4RL @ ICML \u201921 (2021)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Fabio Pierazzi Feargus Pendlebury Jacopo Cortellazzi and Lorenzo Cavallaro. 2020. Intriguing properties of adversarial ml attacks in the problem space. In SP.","DOI":"10.1109\/SP40000.2020.00073"},{"key":"e_1_3_2_1_34_1","volume-title":"Vulnerability analysis, robustness verification, and mitigation strategy for machine learning-based power system stability assessment model under adversarial examples","author":"Ren Chao","year":"2021","unstructured":"Chao Ren, Xiaoning Du, Yan Xu, Qun Song, Yang Liu, and Rui Tan. 2021. Vulnerability analysis, robustness verification, and mitigation strategy for machine learning-based power system stability assessment model under adversarial examples. IEEE Transactions on Smart Grid (2021)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Moein Sabounchi and Jin Wei-Kocsis. 2022. A practical adversarial attack on contingency detection of smart energy systems. In ISGT \u201922.","DOI":"10.1109\/ISGT50606.2022.9817468"},{"key":"e_1_3_2_1_36_1","volume-title":"Detecting and mitigating adversarial examples in regression tasks: a photovoltaic power generation forecasting case study. Information","author":"Santana Everton\u00a0Jose","year":"2021","unstructured":"Everton\u00a0Jose Santana, Ricardo\u00a0Petri Silva, Bruno\u00a0Bogaz Zarpel\u00e3o, and Sylvio Barbon\u00a0Junior. 2021. Detecting and mitigating adversarial examples in regression tasks: a photovoltaic power generation forecasting case study. Information (2021)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Ali Sayghe Junbo Zhao and Charalambos Konstantinou. 2020. Evasion attacks with adversarial deep learning against power system state estimation. In PESGM\u201920.","DOI":"10.1109\/PESGM41954.2020.9281719"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Qun Song Rui Tan Chao Ren and Yan Xu. 2021. Understanding credibility of adversarial examples against smart grid: A case study for voltage stability assessment. In eEnergy \u201921.","DOI":"10.1145\/3447555.3464859"},{"key":"e_1_3_2_1_39_1","volume-title":"Robust Graph Autoencoder-Based Detection of False Data Injection Attacks Against Data Poisoning in Smart Grids","author":"Takiddin Abdulrahman","year":"2023","unstructured":"Abdulrahman Takiddin, Muhammad Ismail, Rachad Atat, Katherine\u00a0R Davis, and Erchin Serpedin. 2023. Robust Graph Autoencoder-Based Detection of False Data Injection Attacks Against Data Poisoning in Smart Grids. IEEE Transactions on Artificial Intelligence (2023)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Abdulrahman Takiddin Muhammad Ismail and Erchin Serpedin. 2021. Robust detection of electricity theft against evasion attacks in smart grids. In ICC \u201921.","DOI":"10.1109\/ICC42927.2021.9500822"},{"key":"e_1_3_2_1_41_1","volume-title":"Robust data-driven detection of electricity theft adversarial evasion attacks in smart grids","author":"Takiddin Abdulrahman","year":"2022","unstructured":"Abdulrahman Takiddin, Muhammad Ismail, and Erchin Serpedin. 2022. Robust data-driven detection of electricity theft adversarial evasion attacks in smart grids. IEEE Transactions on Smart Grid (2022)."},{"key":"e_1_3_2_1_42_1","volume-title":"Robust electricity theft detection against data poisoning attacks in smart grids","author":"Takiddin Abdulrahman","year":"2020","unstructured":"Abdulrahman Takiddin, Muhammad Ismail, Usman Zafar, and Erchin Serpedin. 2020. Robust electricity theft detection against data poisoning attacks in smart grids. IEEE Transactions on Smart Grid (2020)."},{"key":"e_1_3_2_1_43_1","volume-title":"Adversarial attack and defense methods for neural network based state estimation in smart grid. IET Renewable Power Generation","author":"Tian Jiwei","year":"2022","unstructured":"Jiwei Tian, Buhong Wang, Jing Li, and Charalambos Konstantinou. 2022. Adversarial attack and defense methods for neural network based state estimation in smart grid. IET Renewable Power Generation (2022)."},{"key":"e_1_3_2_1_44_1","volume-title":"Adversarial attacks and defense for CNN based power quality recognition in smart grid","author":"Tian Jiwei","year":"2021","unstructured":"Jiwei Tian, Buhong Wang, Jing Li, and Zhen Wang. 2021. Adversarial attacks and defense for CNN based power quality recognition in smart grid. IEEE Transactions on Network Science and Engineering (2021)."},{"key":"e_1_3_2_1_45_1","unstructured":"Zhiqiang Wan Hepeng Li Hang Shuai Yan\u00a0Lindsay Sun and Haibo He. 2021. Adversarial attack for deep reinforcement learning based demand response. In PESGM\u201921."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3263243"},{"key":"e_1_3_2_1_47_1","volume-title":"On detecting adversarial inputs with entropy of saliency maps. CV-COPS @ CVPR \u201919","author":"Yap Dian\u00a0Ang","year":"2019","unstructured":"Dian\u00a0Ang Yap, Joyce Xu, and Vinay\u00a0Uday Prabhu. 2019. On detecting adversarial inputs with entropy of saliency maps. CV-COPS @ CVPR \u201919 (2019)."},{"key":"e_1_3_2_1_48_1","volume-title":"Resilience enhancement of multi-agent reinforcement learning-based demand response against adversarial attacks. Applied Energy","author":"Zeng Lanting","year":"2022","unstructured":"Lanting Zeng, Dawei Qiu, and Mingyang Sun. 2022. Resilience enhancement of multi-agent reinforcement learning-based demand response against adversarial attacks. Applied Energy (2022)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Guihai Zhang and Biplab Sikdar. 2022. Ensemble and Transfer Adversarial Attack on Smart Grid Demand-Response Mechanisms. In SmartGridComm \u201922.","DOI":"10.1109\/SmartGridComm52983.2022.9960966"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2926023"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Yu Zhang Chao Huo Huifeng Bai and Ganghong Zhang. 2023. Adversarial Defense Based on Mimic Defense and Reinforcement Learning for Power Vision Task in Smart Grid. In ACCES \u201923.","DOI":"10.1007\/978-981-97-1068-3_46"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3349381"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Xingyu Zhou Yi Li Carlos\u00a0A Barreto Jiani Li Peter Volgyesi Himanshu Neema and Xenofon Koutsoukos. 2019. Evaluating resilience of grid load predictions under stealthy adversarial attacks. In RWS \u201919.","DOI":"10.1109\/RWS47064.2019.8971816"},{"key":"e_1_3_2_1_54_1","volume-title":"Research on Data Poisoning Attack against Smart Grid Cyber\u2013Physical System Based on Edge Computing. Sensors","author":"Zhu Yanxu","year":"2023","unstructured":"Yanxu Zhu, Hong Wen, Runhui Zhao, Yixin Jiang, Qiang Liu, and Peng Zhang. 2023. Research on Data Poisoning Attack against Smart Grid Cyber\u2013Physical System Based on Edge Computing. Sensors (2023)."}],"event":{"name":"e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems","location":"Singapore Singapore","acronym":"e-Energy '24"},"container-title":["The 15th ACM International Conference on Future and Sustainable Energy Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632775.3661984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632775.3661984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:36:23Z","timestamp":1755884183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632775.3661984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,31]]},"references-count":54,"alternative-id":["10.1145\/3632775.3661984","10.1145\/3632775"],"URL":"https:\/\/doi.org\/10.1145\/3632775.3661984","relation":{},"subject":[],"published":{"date-parts":[[2024,5,31]]},"assertion":[{"value":"2024-05-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}