A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks
暂无分享,去创建一个
Benjamin Turnbull | Kim-Kwang Raymond Choo | Nour Moustafa | Dinusha Vatsalan | Marwa Keshk | K. Choo | Marwa Keshk | Nour Moustafa | B. Turnbull | Dinusha Vatsalan
[1] Deepak Puthal,et al. The Blockchain as a Decentralized Security Framework , 2018 .
[2] N. Nagaveni,et al. Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario , 2013, Inf. Sci..
[3] Beibei Li,et al. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..
[4] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[5] Zhao Yang Dong,et al. Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.
[6] Zahir Tari,et al. PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..
[7] Ibrahim Khalil,et al. Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform , 2019, Knowl. Based Syst..
[8] Byeong Man Kim,et al. A layer-wise Perturbation based Privacy Preserving Deep Neural Networks , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[9] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[10] George J. Pappas,et al. Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[11] Biplab Sikdar,et al. An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication , 2019, IEEE Transactions on Smart Grid.
[12] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[13] Zuyi Li,et al. Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.
[14] Jiankun Hu,et al. An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems , 2019, IEEE Transactions on Sustainable Computing.
[15] Raymond K. Wong,et al. Insider Threat Detection with Long Short-Term Memory , 2019, ACSW.
[16] Elena Sitnikova,et al. Privacy preservation intrusion detection technique for SCADA systems , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[17] Beibei Li,et al. On Reliability Analysis of Smart Grids under Topology Attacks , 2018, ACM Trans. Cyber Phys. Syst..
[18] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[19] Glenn A. Fink,et al. Security and Privacy in Cyber-Physical Systems , 2017 .
[20] Mohsen Guizani,et al. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.
[21] Xue Liu,et al. Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism , 2019, IEEE Transactions on Industrial Informatics.
[22] Ruslan Salakhutdinov,et al. Importance Weighted Autoencoders , 2015, ICLR.
[23] Sungzoon Cho,et al. Variational Autoencoder based Anomaly Detection using Reconstruction Probability , 2015 .
[24] Deepak Puthal,et al. The Blockchain as a Decentralized Security Framework [Future Directions] , 2018, IEEE Consumer Electronics Magazine.
[25] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[26] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[27] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[28] Rebecca Petersen. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks , 2015 .