PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
暂无分享,去创建一个
Erchin Serpedin | Waleed Alasmary | Muhammad Ismail | Mahmoud Nabil | Mohamed Mahmoud | Waleed S. Alasmary | E. Serpedin | W. Alasmary | Muhammad Ismail | Mahmoud Nabil | Mohamed Mahmoud
[1] Mohamed Baza,et al. Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units , 2018, 2019 IEEE International Conference on Blockchain (Blockchain).
[2] Mariana Raykova,et al. Secure Computation for Machine Learning With SPDZ , 2019, ArXiv.
[3] Mohamed M. Abdallah,et al. Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks , 2018, 2018 25th International Conference on Telecommunications (ICT).
[4] Muhammad Tariq,et al. Electricity Theft Detection and Localization in Grid-Tied Microgrids , 2018, IEEE Transactions on Smart Grid.
[5] Surya Ganguli,et al. Resurrecting the sigmoid in deep learning through dynamical isometry: theory and practice , 2017, NIPS.
[6] Erchin Serpedin,et al. A Deep Learning Approach for Detection of Electricity Theft Cyber Attacks in Smart Grids , 2018 .
[7] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[10] Mohamed Baza,et al. Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval , 2019, 2019 International Conference on Smart Applications, Communications and Networking (SmartNets).
[11] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[12] Marcel Keller,et al. Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..
[13] Farrukh Nagi,et al. Improving SVM-Based Nontechnical Loss Detection in Power Utility Using the Fuzzy Inference System , 2011, IEEE Transactions on Power Delivery.
[14] Victor C. M. Leung,et al. Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.
[15] Chongqing Kang,et al. A Novel Combined Data-Driven Approach for Electricity Theft Detection , 2019, IEEE Transactions on Industrial Informatics.
[16] Léon Bottou,et al. Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.
[17] Xiaohui Liang,et al. Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.
[18] Haibo He,et al. ADASYN: Adaptive synthetic sampling approach for imbalanced learning , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[19] C C O Ramos,et al. A New Approach for Nontechnical Losses Detection Based on Optimum-Path Forest , 2011, IEEE Transactions on Power Systems.
[20] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[22] Pan Li,et al. Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach , 2013 .
[23] Zibin Zheng,et al. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids , 2018, IEEE Transactions on Industrial Informatics.
[24] Paul Dierckx,et al. Curve and surface fitting with splines , 1994, Monographs on numerical analysis.
[25] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[26] Pan Li,et al. Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach , 2016, IEEE Transactions on Power Systems.
[27] Kemal Akkaya,et al. EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks , 2018, IEEE Internet of Things Journal.
[28] Mahmoud Nabil,et al. EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks , 2019, IEEE Access.
[29] Mohamed Baza,et al. Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid , 2019, ArXiv.
[30] Pedro Antmann,et al. Reducing Technical and Non-Technical Losses in the Power Sector , 2009 .
[31] Erchin Serpedin,et al. Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).
[32] Yoshua Bengio,et al. Convolutional networks for images, speech, and time series , 1998 .
[33] Roi Livni,et al. On the Computational Efficiency of Training Neural Networks , 2014, NIPS.
[34] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[35] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[36] Neeraj Kumar,et al. Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.
[37] Mohamed Baza,et al. Mimic Learning to Generate a Shareable Network Intrusion Detection Model , 2019, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[38] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[39] Mostafa M. Fouda,et al. An efficient distributed approach for key management in microgrids , 2015, 2015 11th International Computer Engineering Conference (ICENCO).
[40] David Evans,et al. Obliv-C: A Language for Extensible Data-Oblivious Computation , 2015, IACR Cryptol. ePrint Arch..
[41] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[42] Mohamed Baza,et al. Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.
[43] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[44] Pan Li,et al. Privacy-preserving energy theft detection in smart grids , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[45] Kemal Akkaya,et al. Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[46] Mohamed Baza,et al. Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[47] Nicholas J. P. Race,et al. A privacy preserving approach to energy theft detection in smart grids , 2016, 2016 IEEE International Smart Cities Conference (ISC2).