Author of the publication

Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.

, , , and . ICETE (Selected Papers), volume 1795 of Communications in Computer and Information Science, page 305-333. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Battery energy storage system load shifting control based on real time load forecast and dynamic programming., , , and . CASE, page 815-820. IEEE, (2012)Generalized Space Vector Modulation for Current Source Converter in Continuous and Discontinuous Current Modes., , , and . IEEE Trans. Ind. Electron., 67 (11): 9348-9357 (2020)Differentially Private k-Means Clustering with Guaranteed Convergence., and . CoRR, (2020)Blockchain abnormal behavior awareness methods: a survey., , , , , and . Cybersecur., 5 (1): 5 (2022)MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER., , , , , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 43-54. Springer, (2020)CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification., , , , and . Comput. Networks, (2020)Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates., , , and . SECRYPT, page 283-294. SCITEPRESS, (2021)isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting., , , , and . IJCNN, page 1-8. IEEE, (2019)Power system reactive power optimization based on direct neural dynamic programming., and . ISKE, page 862-866. IEEE, (2008)A Fuzzy Neural Network Based E-Commerce Reputation Estimation Model., and . ICNC (2), page 235-239. IEEE Computer Society, (2008)