{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:08Z","timestamp":1755780008981,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T00:00:00Z","timestamp":1700784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,24]]},"DOI":"10.1145\/3656766.3656816","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:34:34Z","timestamp":1717266874000},"page":"290-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Design of Active Security Protection Strategy for Charging Piles Based on Vulnerability Mining"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5260-8833","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"first","affiliation":[{"name":"state grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6134-7825","authenticated-orcid":false,"given":"Xin","family":"Zhou","sequence":"additional","affiliation":[{"name":"state grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6086-7031","authenticated-orcid":false,"given":"Hongbiao","family":"Wang","sequence":"additional","affiliation":[{"name":"state grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9081-3914","authenticated-orcid":false,"given":"Zhou","family":"Sun","sequence":"additional","affiliation":[{"name":"state grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3704-690X","authenticated-orcid":false,"given":"Zhuoqun","family":"Li","sequence":"additional","affiliation":[{"name":"state grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2085-4411","authenticated-orcid":false,"given":"Yutong","family":"Zhao","sequence":"additional","affiliation":[{"name":"state grid beijing electric power company, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2145","volume-title":"Proceedings of the CSEE","author":"Yu Dongmin","year":"2022","unstructured":"Dongmin Yu, Chao Yang, Linru Jiang, Taoyong Li, Gangui Yan, Fengkai Gao, Huanan Liu, \u201cReview on Safety Protection of Electric Vehicle Charging,\u201d Proceedings of the CSEE, 2022, vol .42, pp. 2145-2164."},{"key":"e_1_3_2_1_2_1","first-page":"6455","volume-title":"Proceedings of the CSEE","author":"Liu Hong","year":"2020","unstructured":"Hong Liu, Jun Yan, Shaoyun Ge, Jun Han, \u201cDynamic Response of Electric Vehicle and Fast Charging Stations Considering Multi-vehicle Interaction,\u201d Proceedings of the CSEE, 2020, vol .40, pp. 6455-6467."},{"key":"e_1_3_2_1_3_1","first-page":"6271","volume-title":"Proceedings of the CSEE","author":"Yan Gangui","year":"2021","unstructured":"Gangui Yan, Huanan Liu, Ninghui Han, Songsong Chen, Dongming Yu, \u201cAn Optimization Method for Location and Capacity Determination of Charging Stations Considering Spatial and Temporal Distribution of Electric Vehicles,\u201d Proceedings of the CSEE, 2021, vol .41, pp. 6271-6284."},{"key":"e_1_3_2_1_4_1","first-page":"216","article-title":"Review on Electric Vehicle Safety Issues Considering International Regulations","volume":"38","author":"Li Nan","year":"2020","unstructured":"Nan Li, \u201cReview on Electric Vehicle Safety Issues Considering International Regulations,\u201d Environmental Technology, 2020, vol. 38, pp. 216-223.","journal-title":"Environmental Technology"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25479-1_5"},{"key":"e_1_3_2_1_6_1","first-page":"55","article-title":"Design and Implementation of Information Security Protection Scheme of Electric Vehicle Charging Pile-Background Service Management Center","volume":"40","author":"Wang Weixian","year":"2019","unstructured":"Weixian Wang, Jie Zhu, Heping Tian, Zhen Chen, Xiaoxi Yuan, \u201cDesign and Implementation of Information Security Protection Scheme of Electric Vehicle Charging Pile-Background Service Management Center,\u201d Electric Power Construction, 2019, vol. 40, pp.55-62.","journal-title":"Electric Power Construction"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.02.062"},{"key":"e_1_3_2_1_8_1","first-page":"102","article-title":"Research on Cyber Security Requirements of Charging Station for Vehicles","volume":"43","author":"Ye Qiongyu","year":"2022","unstructured":"Qiongyu Ye, Qian Zhang, Yimin Xin, \u201cResearch on Cyber Security Requirements of Charging Station for Vehicles,\u201d Process Automation Insterumentation, 2022, vol. 43, pp. 102-105.","journal-title":"Process Automation Insterumentation"},{"key":"e_1_3_2_1_9_1","first-page":"138","article-title":"Key Management Scheme of Charging Pile Based on Blockchain Technology","volume":"19","author":"Gao Lan","year":"2020","unstructured":"Lan Gao, Guangcun Wei, Qing Li, \u201cKey Management Scheme of Charging Pile Based on Blockchain Technology,\u201d Software Guide, 2020, vol. 19, pp. 138-141.","journal-title":"Software Guide"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/08982112.2022.2132404"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15050185"}],"event":{"name":"ICBAR 2023: 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management","acronym":"ICBAR 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656766.3656816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:13:10Z","timestamp":1755778390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,24]]},"references-count":11,"alternative-id":["10.1145\/3656766.3656816","10.1145\/3656766"],"URL":"https:\/\/doi.org\/10.1145\/3656766.3656816","relation":{},"subject":[],"published":{"date-parts":[[2023,11,24]]},"assertion":[{"value":"2024-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}