Energy Theft Detection With Energy Privacy Preservation in the Smart Grid
暂无分享,去创建一个
Xiaohui Liang | Mi Wen | Kai Zhang | Zipeng Fu | Donghuan Yao | Baojia Yang | Xiaohui Liang | Zipeng Fu | M. Wen | Kai Zhang | Donghuan Yao | Baojia Yang
[1] Chao-Kai Wen,et al. Electricity theft detection in low voltage networks with smart meters using state estimation , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[2] Tanveer Ahmad,et al. Non-Technical Loss Detection, Prevention and Suppression Issues for AMI in Smart Grid , 2015 .
[3] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[4] Rongxing Lu,et al. A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications , 2015, IEEE Internet of Things Journal.
[5] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[6] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[7] Jun Luo,et al. Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.
[8] Xiaohui Liang,et al. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[9] Pan Li,et al. Privacy-preserving energy theft detection in smart grids , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[10] Tara N. Sainath,et al. Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[11] Neeraj Kumar,et al. Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.
[12] Sook-Chin Yip,et al. Energy theft and defective meters detection in AMI using linear regression , 2017, 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe).
[13] Zibin Zheng,et al. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids , 2018, IEEE Transactions on Industrial Informatics.
[14] Jiaying Lin,et al. Energy theft detection via integrated distribution state estimation based on AMI and SCADA measurements , 2015, 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT).
[15] Zekeriya Erkin,et al. Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.
[16] 필립 듀플레시스,et al. Access network, gateway and management server for a cellular wireless communication system , 2006 .
[17] Pan Li,et al. State estimation for energy theft detection in microgrids , 2014, 9th International Conference on Communications and Networking in China.
[18] Robert P. Sheridan,et al. Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..
[19] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[20] João Paulo Papa,et al. Social-Spider Optimization-based Support Vector Machines applied for energy theft detection , 2016, Comput. Electr. Eng..
[21] S. Shankar Sastry,et al. Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.
[22] Chan-Nan Lu,et al. Non-technical loss detection using state estimation and analysis of variance , 2013, 2013 IEEE Power & Energy Society General Meeting.
[23] Gang Wang,et al. Gated Siamese Convolutional Neural Network Architecture for Human Re-identification , 2016, ECCV.
[24] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[25] Xuemin Shen,et al. Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-Side Networks , 2017, IEEE Transactions on Smart Grid.
[26] Vincent W. S. Wong,et al. Smart Meter Privacy: Exploiting the Potential of Household Energy Storage Units , 2018, IEEE Internet of Things Journal.
[27] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[28] Léon Bottou,et al. Stochastic Gradient Descent Tricks , 2012, Neural Networks: Tricks of the Trade.
[29] Mi Wen,et al. A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[30] Bin Liu,et al. Loss analysis simulation of SVC / DC Deicer under SVC mode , 2016, 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).
[31] Pan Li,et al. Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach , 2016, IEEE Transactions on Power Systems.
[32] Nicholas J. P. Race,et al. A privacy preserving approach to energy theft detection in smart grids , 2016, 2016 IEEE International Smart Cities Conference (ISC2).
[33] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[34] Lingfeng Wang,et al. Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[35] Xiaohui Liang,et al. ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[36] Syed Khaleel Ahmed,et al. Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[37] S. Shankar Sastry,et al. A game theory model for electricity theft detection and privacy-aware control in AMI systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[38] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..