Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Smart meter data privacy: A survey
Automated and smart meters are devices that are able to monitor the energy consumption of
electricity consumers in near real-time. They are considered key technological enablers of …
electricity consumers in near real-time. They are considered key technological enablers of …
Privacy-preserving data aggregation in smart metering systems: An overview
Growing energy needs are forcing governments to look for alternative resources and ways to
better manage the energy grid and load balancing. As a major initiative, many countries …
better manage the energy grid and load balancing. As a major initiative, many countries …
Sok: Secure aggregation based on cryptographic schemes for federated learning
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …
without disclosing these individual inputs. Secure aggregation has been found useful for …
Energy theft detection with energy privacy preservation in the smart grid
As a prominent early instance of the Internet of Things in the smart grid, the advanced
metering infrastructure (AMI) provides real-time information from smart meters to both grid …
metering infrastructure (AMI) provides real-time information from smart meters to both grid …
PPFA: Privacy preserving fog-enabled aggregation in smart grid
For constrained end devices in Internet of Things, such as smart meters (SMs), data
transmission is an energy-consuming operation. To address this problem, we propose an …
transmission is an energy-consuming operation. To address this problem, we propose an …
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …
privacy concerns. For instance, face recognition and personalized recommendations rely on …
Rofl: Robustness of secure federated learning
Even though recent years have seen many attacks exposing severe vulnerabilities in
Federated Learning (FL), a holistic understanding of what enables these attacks and how …
Federated Learning (FL), a holistic understanding of what enables these attacks and how …
A privacy-preserving scheme for incentive-based demand response in the smart grid
The advanced metering infrastructure (AMI) in the smart grid provides real-time information
to both grid operators and customers, exploiting the full potential of demand response (DR) …
to both grid operators and customers, exploiting the full potential of demand response (DR) …
Efficient private statistics with succinct sketches
Large-scale collection of contextual information is often essential in order to gather statistics,
train machine learning models, and extract knowledge from data. The ability to do so in a …
train machine learning models, and extract knowledge from data. The ability to do so in a …
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
Smart grid, as the next generation of power grid featured with efficient, reliable, and flexible
characteristics, has received considerable attention in recent years. However, the full …
characteristics, has received considerable attention in recent years. However, the full …