Cooperative state estimation for preserving privacy of user behaviors in smart grid
暂无分享,去创建一个
[1] Robert J. Thomas,et al. MATPOWER's extensible optimal power flow architecture , 2009, 2009 IEEE Power & Energy Society General Meeting.
[2] Mani B. Srivastava,et al. Challenges in resource monitoring for residential spaces , 2009, BuildSys '09.
[3] Peter Vinter,et al. Using continuous state estimation in grid planning , 2009 .
[4] Jack I. Lerner,et al. Taking the 'Long View' on the Fourth Amendment: Stored Records and the Sanctity of the Home , 2008 .
[5] Marie-Luce Picard,et al. A data stream model for home device description , 2009, 2009 Third International Conference on Research Challenges in Information Science.
[6] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Stephen B. Wicker,et al. Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.
[8] Jianyang Li,et al. Time Series Similar Pattern Matching Based on Empirical Mode Decomposition , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[9] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[10] Sukho Lee,et al. Efficient Pattern Matching of Time Series Data , 2002, IEA/AIE.
[11] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[12] A. Abur,et al. Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.
[13] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[14] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[15] Jan Beyea. The Smart Electricity Grid and Scientific Research , 2010, Science.
[16] Tanya L. Brewer,et al. Smart Grid Cyber Security Strategy and Requirements , 2009 .
[17] Aryya Gangopadhyay,et al. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.
[18] Xia Li,et al. A Time Series Similar Pattern Matching Algorithm Based on Singularity Event Features , 2009, 2009 International Conference on Information Engineering and Computer Science.
[19] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[20] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[21] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[22] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[23] Ma Shiying,et al. PMU placement based on power system characteristics , 2009, 2009 International Conference on Sustainable Power Generation and Supply.