{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:55:19Z","timestamp":1778082919623,"version":"3.51.4"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227935","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Electricity Theft Detection Scheme Based on CNN-AE-LSTM Hybrid Model Against Evasion Attacks"],"prefix":"10.1109","author":[{"given":"Zhuoqun","family":"Xia","sequence":"first","affiliation":[{"name":"Changsha University of Science and Technology,School of Computer,Changsha,China"}]},{"given":"Xi","family":"Lin","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology,School of Computer,Changsha,China"}]},{"given":"Kaixin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology,School of Computer,Changsha,China"}]},{"given":"Jingjing","family":"Tan","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology,School of Computer,Changsha,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3127649"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171229"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2973681"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.est.2022.104056"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3103272"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-212616"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3031843"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3544746"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9303013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3447555.3464859"},{"key":"ref11","author":"Lei","year":"2020","journal-title":"Advanced evasion attacks and mitigations on practical ml-based phishing website classifiers"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.107840"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2961136"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2890663"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106448"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3196403"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT48636.2020.9061565"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/en15082778"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2965276"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3049818"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0142331217740622"},{"key":"ref23","first-page":"321","article-title":"Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Demontis"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103227"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3116438"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951526"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/ijms232315379"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727557"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3047864"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2021.3135565"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/isgt45199.2020.9087649"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/icccn58024.2023.10230180"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3062722"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3447555.3464859"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3307772.3328314"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","location":"Rome, Italy","start":{"date-parts":[[2025,6,30]]},"end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227935.pdf?arnumber=11227935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:42:54Z","timestamp":1763192574000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227935","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}