Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jinyuan Stella Sun"'
Publikováno v:
AsiaCCS
Recent research demonstrated that the superficially well-trained machine learning (ML) models are highly vulnerable to adversarial examples. As ML techniques are becoming a popular solution for cyber-physical systems (CPSs) applications in research l
Publikováno v:
MASS
Implicit authentication (IA) is gaining popularity over recent years due to its use of user behavior as the main input, relieving users from explicit actions such as remembering and entering passwords. However, such convenience comes with a cost of a
Publikováno v:
SmartGridComm
Energy theft causes large economic losses to utility companies around the world. In recent years, energy theft detection approaches based on machine learning (ML) techniques, especially neural networks, become popular in the research literature and a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06f80b252882124190cb50176cb752ac
http://arxiv.org/abs/2006.03504
http://arxiv.org/abs/2006.03504
Publikováno v:
ICC
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud.
Autor:
Gang Zhou, Roozbeh Jafari, Paolo Bonato, Krishna K. Venkatasubramanian, Honggang Wang, Jinyuan Stella Sun, Dalei Wu
Publikováno v:
IEEE Internet of Things Journal. 2:1-4
The articles in this special section are focused on two major aspects of Internet of things (IoT) technologies for smart and connected health services (SCH): 1) monitoring and assisting individuals by means of smart systems including sensors, devices
Publikováno v:
MASS
With the rapid growth of the smart device market, associated security issues become more threatening and diverse than ever before. Due to the limitations of the traditional explicit authentication mechanisms (e.g., Password-based, biometrics), resear
Publikováno v:
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research.