Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks
暂无分享,去创建一个
Keke Gai | Liehuang Zhu | Lei Xu | Yan Zhang | Yulu Wu | Yan Zhang | Lei Xu | Keke Gai | Liehuang Zhu | Yulu Wu
[1] Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
[2] Ioannis Psaras,et al. Decentralised Edge-Computing and IoT through Distributed Trust , 2018, MobiSys.
[3] Li Lin,et al. PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments , 2018, IEEE Access.
[4] Xing Zhang,et al. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.
[5] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.
[6] Keke Gai,et al. Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.
[7] Samiran Chattopadhyay,et al. On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.
[8] Robert H. Deng,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] JooSeok Song,et al. Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.
[10] Bin Li,et al. Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing , 2013, IEEE Transactions on Dependable and Secure Computing.
[11] Hong Liu,et al. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.
[12] Mohsen Guizani,et al. Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.
[13] Der-Jiunn Deng,et al. Wireless Big Data Computing in Smart Grid , 2017, IEEE Wireless Communications.
[14] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[15] Victor C. M. Leung,et al. Computation Offloading and Content Caching in Wireless Blockchain Networks With Mobile Edge Computing , 2018, IEEE Transactions on Vehicular Technology.
[16] Quanyan Zhu,et al. Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.
[17] Shengli Xie,et al. Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.
[18] Yan Zhang,et al. Optimal Resource Sharing in 5G-Enabled Vehicular Networks: A Matrix Game Approach , 2016, IEEE Transactions on Vehicular Technology.
[19] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[20] Yuriy Brun,et al. Entrusting Private Computation and Data to Untrusted Networks , 2013, IEEE Transactions on Dependable and Secure Computing.
[21] Ying Wang,et al. A novel design for content delivery over software defined mobile social networks , 2015, IEEE Network.
[22] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[23] Tilman Wolf,et al. Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[24] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[25] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[26] Jian Weng,et al. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise , 2017, IEEE Transactions on Smart Grid.
[27] Yan Zhang,et al. HERO: Hierarchical Energy Optimization for Data Center Networks , 2015, IEEE Systems Journal.
[28] Sajad Najafi Ravadanegh,et al. Optimal Power Dispatch of Multi-Microgrids at Future Smart Distribution Grids , 2015, IEEE Transactions on Smart Grid.
[29] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[30] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[31] Ke Zhang,et al. Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading , 2017, IEEE Veh. Technol. Mag..
[32] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[33] Ritwik Majumder,et al. Integration of Distributed Generation in the Volt/VAR Management System for Active Distribution Networks , 2015, IEEE Transactions on Smart Grid.
[34] Zhetao Li,et al. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[35] Mamidala Sagar,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing In Cloud Storage , 2017 .
[36] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[37] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing: Challenges and Applications , 2017, ArXiv.
[38] Yan Zhang,et al. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.
[39] Keke Gai,et al. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..
[40] Dusit Niyato,et al. Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).
[41] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[42] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[43] Yijia Cao,et al. Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.
[44] Doo-Kwon Baik,et al. Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System , 2018, IEEE Access.
[45] Kai Wang,et al. Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.
[46] Liehuang Zhu,et al. When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).
[47] Ke Zhang,et al. Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things , 2018, IEEE Communications Magazine.
[48] Keke Gai,et al. Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.
[49] Xin Chen,et al. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.
[50] Jason Dykes,et al. Attribute Signatures: Dynamic Visual Summaries for Analyzing Multivariate Geographical Data , 2014, IEEE Transactions on Visualization and Computer Graphics.
[51] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.