A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks
暂无分享,去创建一个
[1] Steven Lanzisera,et al. @Scale: Insights from a large, long-lived appliance energy WSN , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[2] Wen Hu,et al. Efficient background subtraction for real-time tracking in embedded camera networks , 2012, SenSys '12.
[3] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[4] Mingyan Liu,et al. In-situ soil moisture sensing: Measurement scheduling and estimation using compressive sensing , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[5] Hamid Sharif,et al. Resource-aware secure ECG healthcare monitoring through body sensor networks , 2010, IEEE Wireless Communications.
[6] David K. Y. Yau,et al. Supero: A sensor system for unsupervised residential power usage monitoring , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[7] Sriram Vishwanath,et al. Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.
[8] S.B. Leeb,et al. Transient event detection for nonintrusive load monitoring and demand side management using voltage distortion , 2006, Twenty-First Annual IEEE Applied Power Electronics Conference and Exposition, 2006. APEC '06..
[9] T. Baldwin,et al. Power system observability with minimal phasor measurement placement , 1993 .
[10] Stephen P. Boyd,et al. Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.
[11] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[12] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[13] David E. Culler,et al. Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[14] André Brinkmann,et al. Evaluation of a hash-compress-encrypt pipeline for storage system applications , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).
[15] J. Haupt,et al. Compressive wireless sensing , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[16] Margaret Martonosi,et al. Data compression algorithms for energy-constrained devices in delay tolerant networks , 2006, SenSys '06.
[17] Jun Sun,et al. Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.
[18] David E. Culler,et al. Experiences with a high-fidelity wireless building energy auditing network , 2009, SenSys '09.
[19] Wenyuan Xu,et al. Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.
[20] Wenyuan Xu,et al. Current Events: Identifying Webpages by Tapping the Electrical Outlet , 2013, ESORICS.
[21] Chenyang Lu,et al. Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.
[22] Cong Wang,et al. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.
[23] Piotr Indyk,et al. Combining geometry and combinatorics: A unified approach to sparse signal recovery , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[24] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[25] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[26] Prasant Misra,et al. Efficient cross-correlation via sparse representation in sensor networks , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[27] E. Candès,et al. Sparsity and incoherence in compressive sampling , 2006, math/0611957.
[28] Ruby B. Lee,et al. Performance impact of data compression on virtual private network transactions , 2000, Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000.
[29] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[30] Ami Wiesel,et al. Linear Regression With Gaussian Model Uncertainty: Algorithms and Bounds , 2008, IEEE Transactions on Signal Processing.
[31] Wen-Tsai Sung,et al. Improving the compression and encryption of images using FPGA-based cryptosystems , 2006, Multimedia Tools and Applications.
[32] E.J. Candes. Compressive Sampling , 2022 .
[33] Shwetak N. Patel,et al. Televisions, video privacy, and powerline electromagnetic interference , 2011, CCS '11.
[34] Richard G. Baraniuk,et al. A new compressive imaging camera architecture using optical-domain compression , 2006, Electronic Imaging.
[35] G. Sharma,et al. On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[36] S. Santoso,et al. Power quality assessment via wavelet transform analysis , 1996 .