Power data attribution revocation searchable encrypted cloud storage

J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …

Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model

P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …

Research and Application of APN Network Security Access Management Technology Based on Zero Trust Model for Power Grid IOT Terminal

Y Wang, A Jiang, X Zhu, M Yan… - 2024 6th International …, 2024 - ieeexplore.ieee.org
With the development of smart grid technology, the security of APN network of power grid
IOT terminal is facing greater challenges. If outsiders steal accounts or insiders engage in …

Continuous Trust Assessment of Power Terminals Based on Conditional Variational Autoencoders

L Zhang, M Li, R Xu, G Zhang… - 2024 6th International …, 2024 - ieeexplore.ieee.org
The increasing scale of power IoT terminal access, in order to ensure that Web-based
services are not damaged, automatic anomaly detection methods are needed to monitor …

A comprehensive assessment method for the power structured data classification and grading based on hierarchical analysis

Y Zhai, X Huang, C Shi, S Liu… - 2023 5th International …, 2023 - ieeexplore.ieee.org
With the transformation of the digital development of power grids, the classification and
grading of structured data for electricity is an important basis for data security protection …

Robust zero-watermarking for semi-structured power data tracking

L Zhao, Y Zou, C Xu, Y Ma, W Shen… - Ninth International …, 2024 - spiedigitallibrary.org
In the process of sharing power data through online channels, there exists a potential risk of
data leakage, necessitating effective data traceability of leaked information. This paper …

Decentralized federated learning privacy protection aggregation

C Hu, T Lei, S Wang, Z Yao, P Wang… - Sixth International …, 2023 - spiedigitallibrary.org
The basic idea of federated learning is to aggregate the local model parameters of all
participants to obtain a global model, which is more universal and has better performance …

Secure Access for Massive Devices in the Industrial Internet of Things (IIoT)

B Zhang, Z **, J Zhou, C He, B Lu… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the context of the widespread adoption of Industrial Internet of Things (IIoT) technology,
the number of IoT devices is rapidly increasing, leading to a significant security concern in …

Privacy preservation for federated learning based on Gaussian noise scrambling

C Hu, T Lei, S Wang, Z Yao, P Wang… - Sixth International …, 2023 - spiedigitallibrary.org
This article discusses a privacy preservation for federated learning based on gaussian noise
scrambling. The main objective of this model is to protect user data privacy and security by …

Power IoT Terminal Exploit Script Generated Based on Attack Vector

W Wang, G Wei, X Sun, L Han… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In this article, a rich attack vector library is constructed. The attack vector generation method
based on operator expression is adopted, and the attack vector is modeled based on the …