From post

Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.

, , , и . ICETE (Selected Papers), том 1795 из Communications in Computer and Information Science, стр. 305-333. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generalized Space Vector Modulation for Current Source Converter in Continuous and Discontinuous Current Modes., , , и . IEEE Trans. Ind. Electron., 67 (11): 9348-9357 (2020)CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification., , , , и . Comput. Networks, (2020)A Fuzzy Neural Network Based E-Commerce Reputation Estimation Model., и . ICNC (2), стр. 235-239. IEEE Computer Society, (2008)Power system reactive power optimization based on direct neural dynamic programming., и . ISKE, стр. 862-866. IEEE, (2008)Differentially Private k-Means Clustering with Guaranteed Convergence., и . CoRR, (2020)Blockchain abnormal behavior awareness methods: a survey., , , , , и . Cybersecur., 5 (1): 5 (2022)Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates., , , и . SECRYPT, стр. 283-294. SCITEPRESS, (2021)MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER., , , , , , и . NPC, том 12639 из Lecture Notes in Computer Science, стр. 43-54. Springer, (2020)isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting., , , , и . IJCNN, стр. 1-8. IEEE, (2019)Battery energy storage system load shifting control based on real time load forecast and dynamic programming., , , и . CASE, стр. 815-820. IEEE, (2012)