SIA OpenIR

Browse/Search Results:  1-10 of 77 Help

Selected(0)Clear Items/Page:    Sort:
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
View  |  Adobe PDF(3069Kb)  |  Favorite  |  View/Download:17/1  |  Submit date:2019/10/10
Smart grid  electricity theft  suspicion assessment  malicious meter inspection  security  
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid 期刊论文
IEEE Transactions on Information Forensics and Security, 2019, 卷号: 14, 期号: 2, 页码: 445-458
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
View  |  Adobe PDF(2010Kb)  |  Favorite  |  View/Download:214/14  |  Submit date:2018/07/31
Electricity Theft  Smart Grid  Security  Group Testing  
An Approach for Dynamic Scheduling of Data Analysis Algorithms 会议论文
2019 4th IEEE International Conference on Big Data Analytics, ICBDA 2019, Suzhou, China, March 15-18, 2019
Authors:  Gui J(桂珺);  Zheng ZY(郑泽宇);  Gao Y(高原);  Qin, Zhaobo
View  |  Adobe PDF(149Kb)  |  Favorite  |  View/Download:15/4  |  Submit date:2019/06/18
data analysis  Scheduling Strategy  Monitoring algorithm  
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 页码: 1-11
Authors:  Shang WL(尚文利);  Gong TY(巩天宇);  Chen CY(陈春雨);  Hou J(侯静);  Zeng P(曾鹏)
View  |  Adobe PDF(1752Kb)  |  Favorite  |  View/Download:85/7  |  Submit date:2019/04/13
Towards secure industrial iot: Blockchain system with credit-based consensus mechanism 期刊论文
IEEE Transactions on Industrial Informatics, 2019, 卷号: 15, 期号: 6, 页码: 3680-3689
Authors:  Huang, Junqin;  Kong LH(孔令和);  Chen, Guihai;  Wu, Min-You;  Liu, Xue;  Zeng P(曾鹏)
View  |  Adobe PDF(1788Kb)  |  Favorite  |  View/Download:33/6  |  Submit date:2019/06/29
Blockchain  credit-based  directed acyclic graph (DAG)  efficiency  industrial IoT (IIoT)  privacy  proof-of-work (PoW)  security  
A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Shen, Li;  Shen, Yang;  Song CH(宋纯贺);  Li, Zhao;  Ran, Ran;  Zeng P(曾鹏)
View  |  Adobe PDF(277Kb)  |  Favorite  |  View/Download:35/7  |  Submit date:2019/08/18
Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Song CH(宋纯贺);  Li H(李欢);  Wang ZF(王忠锋);  Ren S(任帅);  Zeng P(曾鹏)
View  |  Adobe PDF(1658Kb)  |  Favorite  |  View/Download:35/8  |  Submit date:2019/08/18
NB-IoT  Coverage Substation  Experimental study  
Towards Edge Computing Based Distributed Data Analytics Framework in Smart Grids 会议论文
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings, New York city, NY, United states, July 26-28, 2019
Authors:  Song CH(宋纯贺);  Li T(李桐);  Huang, Xu;  Wang ZF(王忠锋);  Zeng P(曾鹏)
View  |  Adobe PDF(586Kb)  |  Favorite  |  View/Download:36/7  |  Submit date:2019/08/18
Intelligent Human-UAV Interaction System with Joint Cross-Validation over Action-Gesture Recognition and Scene Understanding 期刊论文
APPLIED SCIENCES-BASEL, 2019, 卷号: 9, 期号: 16, 页码: 1-22
Authors:  Chen B(陈博);  Hua CS(华春生);  Li DC(李德才);  He YQ(何玉庆);  Han JD(韩建达)
View  |  Adobe PDF(8976Kb)  |  Favorite  |  View/Download:20/1  |  Submit date:2019/09/27
action detection  gesture recognition  scene understanding  joint cross validation  
面向智能电网邻域网的窃电用户查找算法研究 学位论文
博士, 沈阳: 中国科学院沈阳自动化研究所, 2018
Authors:  夏小芳
Adobe PDF(3456Kb)  |  Favorite  |  View/Download:59/12  |  Submit date:2018/12/16
智能电网邻域网  窃电用户  查找  机器学习  实时测量