Author of the publication

Achieving Differential Privacy against Non-Intrusive Load Monitoring in Smart Grid: a Fog Computing approach.

, , , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ECOSECURITY: Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet., , , , , , and . IEEE Consumer Electron. Mag., 8 (2): 61-65 (2019)Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach., , , , , and . ACM Trans. Internet Techn., 21 (1): 12:1-12:17 (2021)Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy., , , , , and . IEEE Access, (2017)Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach., , , , and . IEEE Internet Things J., 8 (10): 8632-8643 (2021)A Blockchain-Based Dual-Side Privacy-Preserving Multiparty Computation Scheme for Edge-Enabled Smart Grid., , , , and . IEEE Internet Things J., 9 (16): 14287-14299 (2022)Matrix partition-based detection scheme for false data injection in smart grid., , and . Int. J. Wirel. Mob. Comput., 9 (3): 250-256 (2015)Correlating processes for automatic memory evidence analysis., , , , , and . INFOCOM Workshops, page 115-120. IEEE, (2015)A Textual Adversarial Attack Scheme for Domain-Specific Models., , , , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 104-117. Springer, (2022)Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid., , , , and . IJDSN, (2014)Verification Code Recognition Based on Active and Deep Learning., , , , , , and . ICNC, page 453-456. IEEE, (2019)