Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Power data attribution revocation searchable encrypted cloud storage
J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model
P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …
terminals connected to the network, linking all aspects of energy production, transmission …
Research and Application of APN Network Security Access Management Technology Based on Zero Trust Model for Power Grid IOT Terminal
Y Wang, A Jiang, X Zhu, M Yan… - 2024 6th International …, 2024 - ieeexplore.ieee.org
With the development of smart grid technology, the security of APN network of power grid
IOT terminal is facing greater challenges. If outsiders steal accounts or insiders engage in …
IOT terminal is facing greater challenges. If outsiders steal accounts or insiders engage in …
Continuous Trust Assessment of Power Terminals Based on Conditional Variational Autoencoders
L Zhang, M Li, R Xu, G Zhang… - 2024 6th International …, 2024 - ieeexplore.ieee.org
The increasing scale of power IoT terminal access, in order to ensure that Web-based
services are not damaged, automatic anomaly detection methods are needed to monitor …
services are not damaged, automatic anomaly detection methods are needed to monitor …
A comprehensive assessment method for the power structured data classification and grading based on hierarchical analysis
Y Zhai, X Huang, C Shi, S Liu… - 2023 5th International …, 2023 - ieeexplore.ieee.org
With the transformation of the digital development of power grids, the classification and
grading of structured data for electricity is an important basis for data security protection …
grading of structured data for electricity is an important basis for data security protection …
Robust zero-watermarking for semi-structured power data tracking
L Zhao, Y Zou, C Xu, Y Ma, W Shen… - Ninth International …, 2024 - spiedigitallibrary.org
In the process of sharing power data through online channels, there exists a potential risk of
data leakage, necessitating effective data traceability of leaked information. This paper …
data leakage, necessitating effective data traceability of leaked information. This paper …
Decentralized federated learning privacy protection aggregation
C Hu, T Lei, S Wang, Z Yao, P Wang… - Sixth International …, 2023 - spiedigitallibrary.org
The basic idea of federated learning is to aggregate the local model parameters of all
participants to obtain a global model, which is more universal and has better performance …
participants to obtain a global model, which is more universal and has better performance …
Secure Access for Massive Devices in the Industrial Internet of Things (IIoT)
B Zhang, Z **, J Zhou, C He, B Lu… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the context of the widespread adoption of Industrial Internet of Things (IIoT) technology,
the number of IoT devices is rapidly increasing, leading to a significant security concern in …
the number of IoT devices is rapidly increasing, leading to a significant security concern in …
Privacy preservation for federated learning based on Gaussian noise scrambling
C Hu, T Lei, S Wang, Z Yao, P Wang… - Sixth International …, 2023 - spiedigitallibrary.org
This article discusses a privacy preservation for federated learning based on gaussian noise
scrambling. The main objective of this model is to protect user data privacy and security by …
scrambling. The main objective of this model is to protect user data privacy and security by …
Power IoT Terminal Exploit Script Generated Based on Attack Vector
W Wang, G Wei, X Sun, L Han… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In this article, a rich attack vector library is constructed. The attack vector generation method
based on operator expression is adopted, and the attack vector is modeled based on the …
based on operator expression is adopted, and the attack vector is modeled based on the …