Author of the publication

Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System.

, , , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 137-147. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Research of Trusted Acquisition Terminals Based on Domestic Password., , , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 633-640. Springer, (2019)A time series anomaly detection method based on series-parallel transformers with spatial and temporal association discrepancies., , , , , , , and . Inf. Sci., (February 2024)UAV-assisted Blockchain-based Electric Power Grid Inspection System., , , , and . CyberC, page 375-382. IEEE, (2023)A Privacy-Preserving Blockchain-based Energy Supply Chain System Supporting Supervision., , , , and . CyberC, page 66-75. IEEE, (2022)Design of a Miniature Communication Conversion Module Applied in the Power Internet of Things., , , , , , and . ICCT, page 800-806. IEEE, (2020)A robust multi-scale feature extraction framework with dual memory module for multivariate time series anomaly detection., , , , , , , and . Neural Networks, (2024)Research on the Interdisciplinary Cooperative Teaching Mode of Computer Major in Liberal Arts Major under the Background of Discipline Integration.. ICISCAE (ACM), page 1157-1160. ACM, (2021)Self-organized cyber physical power system blockchain architecture and protocol., , , , and . Int. J. Distributed Sens. Networks, (2018)Research on Data Security of New Energy Business Based on Hadoop., , , , and . PCCNT, page 66:1-66:5. ACM, (2023)Design of L-IDAKA Protocol for Lightweight Access Authentication and Encrypted Transmission of New Power System-Aware Terminals Based on Hash Pre-authentication., , , and . EITCE, page 766-771. ACM, (2022)