Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Information-theoretic approaches to privacy in estimation and control
Network control systems (NCSs) heavily rely on information and communication
technologies for sharing information between sensors and controllers as well as controllers …
technologies for sharing information between sensors and controllers as well as controllers …
A privacy-preserving framework using homomorphic encryption for smart metering systems
Smart metering systems (SMSs) have been widely used by industrial users and residential
customers for purposes such as real-time tracking, outage notification, quality monitoring …
customers for purposes such as real-time tracking, outage notification, quality monitoring …
Non-cooperative games for privacy-preserving and cost-efficient smart grid energy management
In this paper, we design privacy-preserving and cost-efficient energy management strategies
for smart grid users that are equipped with renewable energy sources. The adversary is …
for smart grid users that are equipped with renewable energy sources. The adversary is …
[HTML][HTML] Energy disaggregation using elastic matching algorithms
In this article an energy disaggregation architecture using elastic matching algorithms is
presented. The architecture uses a database of reference energy consumption signatures …
presented. The architecture uses a database of reference energy consumption signatures …
Privacy verification in POMDPs via barrier certificates
Privacy is an increasing concern in cyber-physical systems that operates over a shared
network. In this paper, we propose a method for privacy verification of cyber-physical …
network. In this paper, we propose a method for privacy verification of cyber-physical …
Energy disaggregation using two-stage fusion of binary device detectors
A data-driven methodology to improve the energy disaggregation accuracy during Non-
Intrusive Load Monitoring is proposed. In detail, the method uses a two-stage classification …
Intrusive Load Monitoring is proposed. In detail, the method uses a two-stage classification …
Smart meter privacy with renewable energy and a finite capacity battery
We address the smart meter (SM) privacy problem by considering the availability of a
renewable energy source (RES) and a battery which can be exploited by a consumer to …
renewable energy source (RES) and a battery which can be exploited by a consumer to …
Ensuring privacy of occupancy changes in smart buildings
Smart building management systems rely on sensors to optimize the operation of buildings.
If an unauthorized user gains access to these sensors, a privacy leak may occur. This paper …
If an unauthorized user gains access to these sensors, a privacy leak may occur. This paper …
Design framework for privacy-aware demand-side management with realistic energy storage model
Demand-side management (DSM) is a process by which the user demand patterns are
modified to meet certain desired objectives. Traditionally, DSM was utility-driven, but with an …
modified to meet certain desired objectives. Traditionally, DSM was utility-driven, but with an …
On the non-intrusive extraction of residents' privacy-and security-sensitive information from energy smart meters
Energy smart meters have become very popular in monitoring and smart energy
management applications. However, the acquired measurements except the energy …
management applications. However, the acquired measurements except the energy …