{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:09:16Z","timestamp":1772042956690,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["503329135"],"award-info":[{"award-number":["503329135"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707823","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:30:17Z","timestamp":1747247417000},"page":"1800-1809","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4605-4762","authenticated-orcid":false,"given":"Viet","family":"Ha The","sequence":"first","affiliation":[{"name":"Bosch Global Software Technologies, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4365-1762","authenticated-orcid":false,"given":"Dustin","family":"Kern","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6435-2134","authenticated-orcid":false,"given":"Phat","family":"Nguyen Tan","sequence":"additional","affiliation":[{"name":"Bosch Global Software Technologies, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7574","authenticated-orcid":false,"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Plug In Electric Vehicles in Smart Grids","author":"Abedi Sajjad","unstructured":"Sajjad Abedi, Ata Arvani, and Reza Jamalzadeh. 2015. Cyber security of plug-in electric vehicles in smart grids: application of intrusion detection methods. In Plug In Electric Vehicles in Smart Grids. Springer, 129\u2013147."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13020322"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3647444.3652440"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/info12090375"},{"key":"e_1_3_2_1_5_1","unstructured":"Robert Buechler Emmanuel Balogun Arun Majumdar and Ram Rajagopal. 2021. EVGen: Adversarial Networks for Learning Electric Vehicle Charging Loads and Hidden Representations. arXiv:2108.03762 [cs.LG] https:\/\/arxiv.org\/abs\/2108.03762"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","volume":"4","author":"Checkoway Stephen","year":"2011","unstructured":"Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive experimental analyses of automotive attack surfaces.. In USENIX Security Symposium, Vol. 4. San Francisco, 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3574159"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC48692.2020.9161576"},{"key":"e_1_3_2_1_9_1","volume-title":"Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736","author":"Cumplido Jesus","year":"2022","unstructured":"Jesus Cumplido, Cristina Alcaraz, and Javier Lopez. 2022. Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736."},{"key":"e_1_3_2_1_10_1","unstructured":"Mathias Dalheimer. 2017. Chaos Computer Club hacks e-motor charging stations. https:\/\/www.ccc.de\/en\/updates\/2017\/e-motor"},{"key":"e_1_3_2_1_11_1","volume-title":"Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging","author":"Dey Satadru","year":"2020","unstructured":"Satadru Dey and Munmun Khanra. 2020. Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging. IEEE Transactions on Industrial Electronics (2020)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102367"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437258"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_26"},{"key":"e_1_3_2_1_15_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Networks. arXiv:1406.2661 [stat.ML] https:\/\/arxiv.org\/abs\/1406.2661"},{"key":"e_1_3_2_1_16_1","volume-title":"Global EV Outlook","author":"IEA.","year":"2024","unstructured":"IEA. 2024. Global EV Outlook 2024. https:\/\/www.iea.org\/reports\/global-evoutlook-2024"},{"key":"e_1_3_2_1_17_1","first-page":"15118","article-title":"Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements","author":"IEC.","year":"2014","unstructured":"ISO\/IEC. 2014. Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements. ISO Standard 15118-2.","journal-title":"ISO Standard"},{"key":"e_1_3_2_1_18_1","first-page":"2022","article-title":"Road vehicles - Vehicle to grid communication interface - Part 20: 2nd generation network and application protocol requirements","volume":"15118","author":"IEC.","year":"2022","unstructured":"ISO\/IEC. 2022. Road vehicles - Vehicle to grid communication interface - Part 20: 2nd generation network and application protocol requirements. ISO 15118-20:2022. ISO.","journal-title":"ISO"},{"key":"e_1_3_2_1_19_1","volume-title":"Efros","author":"Isola Phillip","year":"2016","unstructured":"Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2016. Image-to-Image Translation with Conditional Adversarial Networks. CoRR abs\/1611.07004 (2016). arXiv:1611.07004 http:\/\/arxiv.org\/abs\/1611.07004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00042"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627127"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3664512"},{"key":"e_1_3_2_1_24_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2017","unstructured":"Diederik P. Kingma and Jimmy Ba. 2017. Adam: A Method for Stochastic Optimization. arXiv:1412.6980 [cs.LG] https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733"},{"key":"e_1_3_2_1_26_1","volume-title":"IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs\/1809.02077","author":"Lin Zilong","year":"2018","unstructured":"Zilong Lin, Yong Shi, and Zhi Xue. 2018. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs\/1809.02077 (2018). arXiv:1809.02077 http:\/\/arxiv.org\/abs\/1809.02077"},{"key":"e_1_3_2_1_27_1","volume-title":"False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security","author":"Liu Yao","year":"2011","unstructured":"Yao Liu, Peng Ning, and Michael Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (2011)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031315"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110173"},{"key":"e_1_3_2_1_31_1","volume-title":"SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks. CoRR abs\/1912.09303","author":"Msika Simon","year":"2019","unstructured":"Simon Msika, Alejandro Quintero, and Foutse Khomh. 2019. SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks. CoRR abs\/1912.09303 (2019). arXiv:1912.09303 http:\/\/arxiv.org\/abs\/1912.09303"},{"key":"e_1_3_2_1_32_1","volume-title":"Lupu","author":"Mu\u00f1oz-Gonz\u00e1lez Luis","year":"2019","unstructured":"Luis Mu\u00f1oz-Gonz\u00e1lez, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, and Emil C. Lupu. 2019. Poisoning Attacks with Generative Adversarial Nets. arXiv:1906.07773 [cs.LG] https:\/\/arxiv.org\/abs\/1906.07773"},{"key":"e_1_3_2_1_33_1","volume-title":"Open Charge Point Protocol 2.0.1. Open Standard","author":"OCA.","unstructured":"OCA. 2020. Open Charge Point Protocol 2.0.1. Open Standard. Open Charge Alliance, Netherlands. www.openchargealliance.org\/protocols\/ocpp-201\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462614"},{"key":"e_1_3_2_1_35_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 458\u2013463","author":"Sagstetter Florian","year":"2013","unstructured":"Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty. 2013. Security challenges in automotive hardware\/software architecture design. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 458\u2013463."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN57995.2023.10200297"},{"key":"e_1_3_2_1_37_1","volume-title":"Mohammad Ashiqur Rahman, and Miguel Alonso Jr.","author":"Shahriar Md Hasan","year":"2020","unstructured":"Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, and Miguel Alonso Jr. 2020. G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. CoRR abs\/2006.00676 (2020). arXiv:2006.00676 https:\/\/arxiv.org\/abs\/2006.00676"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626"},{"key":"e_1_3_2_1_39_1","volume-title":"27th USENIX Security Symposium.","author":"Soltan Saleh","year":"2018","unstructured":"Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2936474"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3615336"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568136"},{"key":"e_1_3_2_1_44_1","volume-title":"ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. arXiv preprint arXiv:2305.08037","author":"Zhou Ce","year":"2023","unstructured":"Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, and Alireza Safdari Ghanhdari. 2023. ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. arXiv preprint arXiv:2305.08037 (2023)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/PHM-Qingdao46334.2019.8942842"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":45,"alternative-id":["10.1145\/3672608.3707823","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707823","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}