Conditional access smart meter privacy based on multi-resolution wavelet analysis
暂无分享,去创建一个
[1] M. Lisovich,et al. Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems , 2008 .
[2] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[3] E. Quinn. Privacy and the New Energy Infrastructure , 2009 .
[4] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[5] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[6] David P. Varodayan,et al. Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Jian Liang,et al. Load Signature Study—Part I: Basic Concept, Structure, and Methodology , 2010, IEEE Transactions on Power Delivery.
[8] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[9] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[10] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[11] Jianqing Zhang,et al. Application-Aware Secure Multicast for Power Grid Communications , 2010 .
[12] I. Daubechies,et al. Factoring wavelet transforms into lifting steps , 1998 .
[13] Ross J. Anderson,et al. On the Security Economics of Electricity Metering , 2010, WEIS.
[14] Todd Baumeister,et al. Literature Review on Smart Grid Cyber Security , 2010 .
[15] M. Dohler,et al. Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[16] H. Y. Lam,et al. A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.
[17] Stephen B. Wicker,et al. Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.
[18] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.