DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
暂无分享,去创建一个
[1] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[2] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[3] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[4] Marko Vukolic,et al. The Next 700 BFT Protocols , 2015, ACM Trans. Comput. Syst..
[5] Ahmed Ahmim,et al. ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network , 2017, Telecommun. Syst..
[6] Shilin Wen,et al. Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning , 2019, IEEE Transactions on Industrial Informatics.
[7] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[8] Wenjing Lou,et al. Distributed Consensus Protocols and Algorithms , 2019, Blockchain for Distributed Systems Security.
[9] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[10] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[11] Thomas H. Morris,et al. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.
[12] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.
[13] Mounir Ghogho,et al. Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).
[14] Xingrui Yu,et al. Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework , 2019, ArXiv.
[15] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[16] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[17] Michael K. Reiter,et al. Fault-scalable Byzantine fault-tolerant services , 2005, SOSP '05.
[18] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[19] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.
[20] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[21] Victor C. M. Leung,et al. Intrusion Detection and Prevention for ZigBee-Based Home Area Networks in Smart Grids , 2018, IEEE Transactions on Smart Grid.
[22] Mohamed Amine Ferrag. EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications , 2017, Telecommun. Syst..
[23] Qi Xia,et al. GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid , 2018, IEEE Access.
[24] Geoffrey E. Hinton,et al. Training Recurrent Neural Networks , 2013 .
[25] Mohamed Amine Ferrag,et al. A systematic review of data protection and privacy preservation schemes for smart grid communications , 2018 .
[26] Xiaojiang Du,et al. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.
[27] Song Tan,et al. Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.
[28] Sara Eftekharnejad,et al. Packet-data anomaly detection in PMU-based state estimator using convolutional neural network , 2019, International Journal of Electrical Power & Energy Systems.
[29] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[30] Deepa Kundur,et al. A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis , 2016, IEEE Transactions on Smart Grid.
[31] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[32] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[33] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[34] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[35] Mohamed Chtourou,et al. On the training of recurrent neural networks , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.
[36] Wei Guo,et al. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[37] Paul J. Werbos,et al. Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.
[38] F. Richard Yu,et al. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[39] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[40] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[41] Marcel Antal,et al. Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids , 2018, Sensors.
[42] Razvan Pascanu,et al. How to Construct Deep Recurrent Neural Networks , 2013, ICLR.
[43] Thomas H. Morris,et al. Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data , 2015, IEEE Transactions on Industrial Informatics.
[44] Xiaohui Liang,et al. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.
[45] Liuba Shrira,et al. HQ replication: a hybrid quorum protocol for byzantine fault tolerance , 2006, OSDI '06.
[46] Dan Boneh,et al. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups , 2008, Journal of Cryptology.
[47] Zhetao Li,et al. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[48] Ramakrishna Kotla,et al. Zyzzyva , 2007, SOSP.
[49] Yixian Yang,et al. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks , 2019, Applied Sciences.
[50] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[51] Xiaohong Zhang,et al. Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid , 2019, IEEE Access.
[52] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[53] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[54] Liang Zhou,et al. Cyber-Attack Classification in Smart Grid via Deep Neural Network , 2018, CSAE '18.
[55] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .