SIA OpenIR

Browse/Search Results:  1-10 of 78 Help

Selected(0)Clear Items/Page:    Sort:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
View  |  Adobe PDF(3069Kb)  |  Favorite  |  View/Download:49/4  |  Submit date:2019/10/10
Smart grid  electricity theft  suspicion assessment  malicious meter inspection  security  
Intelligent Human-UAV Interaction System with Joint Cross-Validation over Action-Gesture Recognition and Scene Understanding 期刊论文
APPLIED SCIENCES-BASEL, 2019, 卷号: 9, 期号: 16, 页码: 1-22
Authors:  Chen B(陈博);  Hua CS(华春生);  Li DC(李德才);  He YQ(何玉庆);  Han JD(韩建达)
View  |  Adobe PDF(8976Kb)  |  Favorite  |  View/Download:43/4  |  Submit date:2019/09/27
action detection  gesture recognition  scene understanding  joint cross validation  
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid 期刊论文
IEEE Transactions on Information Forensics and Security, 2019, 卷号: 14, 期号: 2, 页码: 445-458
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
View  |  Adobe PDF(2010Kb)  |  Favorite  |  View/Download:224/16  |  Submit date:2018/07/31
Electricity Theft  Smart Grid  Security  Group Testing  
Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Song CH(宋纯贺);  Li H(李欢);  Wang ZF(王忠锋);  Ren S(任帅);  Zeng P(曾鹏)
View  |  Adobe PDF(1658Kb)  |  Favorite  |  View/Download:53/9  |  Submit date:2019/08/18
NB-IoT  Coverage Substation  Experimental study  
Towards Edge Computing Based Distributed Data Analytics Framework in Smart Grids 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Song CH(宋纯贺);  Li T(李桐);  Huang, Xu;  Wang ZF(王忠锋);  Zeng P(曾鹏)
View  |  Adobe PDF(586Kb)  |  Favorite  |  View/Download:46/10  |  Submit date:2019/08/18
A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Shen, Li;  Shen, Yang;  Song CH(宋纯贺);  Li, Zhao;  Ran, Ran;  Zeng P(曾鹏)
View  |  Adobe PDF(277Kb)  |  Favorite  |  View/Download:44/10  |  Submit date:2019/08/18
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 页码: 1-11
Authors:  Shang WL(尚文利);  Gong TY(巩天宇);  Chen CY(陈春雨);  Hou J(侯静);  Zeng P(曾鹏)
View  |  Adobe PDF(1752Kb)  |  Favorite  |  View/Download:107/8  |  Submit date:2019/04/13
Towards secure industrial iot: Blockchain system with credit-based consensus mechanism 期刊论文
IEEE Transactions on Industrial Informatics, 2019, 卷号: 15, 期号: 6, 页码: 3680-3689
Authors:  Huang, Junqin;  Kong LH(孔令和);  Chen, Guihai;  Wu, Min-You;  Liu, Xue;  Zeng P(曾鹏)
View  |  Adobe PDF(1788Kb)  |  Favorite  |  View/Download:40/10  |  Submit date:2019/06/29
Blockchain  credit-based  directed acyclic graph (DAG)  efficiency  industrial IoT (IIoT)  privacy  proof-of-work (PoW)  security  
An Approach for Dynamic Scheduling of Data Analysis Algorithms 会议论文
2019 4th IEEE International Conference on Big Data Analytics, ICBDA 2019, Suzhou, China, March 15-18, 2019
Authors:  Gui J(桂珺);  Zheng ZY(郑泽宇);  Gao Y(高原);  Qin, Zhaobo
View  |  Adobe PDF(149Kb)  |  Favorite  |  View/Download:20/6  |  Submit date:2019/06/18
data analysis  Scheduling Strategy  Monitoring algorithm  
面向边缘计算的工业互联网工厂内网络架构及关键技术探究 会议论文
2019全国边缘计算学术研讨会论文集, 北京, 43724
Authors:  李庆;  刘金娣;  李栋
Adobe PDF(1564Kb)  |  Favorite  |  View/Download:7/2  |  Submit date:2019/12/14
边缘计算  软件定义网络  时间敏感网络  工业网络