Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200157-7.doi: 10.11896/jsjkx.241200157
• Information Security • Previous Articles Next Articles
JIANG Yakun, LIN Xu
CLC Number:
| [1]SONG L,FAN Y,LIU M,et al.State estimation method of anew energy power system based on SC-DNN and multi-source data fusion[J].Power System Protection and Control,2023,51:177-187. [2]WU B,HU Y.Analysis of substation joint safety control system and model based on multi-source heterogeneous data fusion[J].IEEE Access,2023,11:35281-35297. [3]SAHU A,MAO Z,WLAZLO P,et al.Multi-source data fusion for cyberattack detection in power systems[J].arXiv:2101.06897. [4]GUO H,LIU Y,XU L,et al.Recognition of demand response potential resident users based on multi-source heterogeneous data association rule analysis[J].Dianwang Jishu/Power System Technology,2023,47(5):1950-1960. [5]HE J,JIANG W,LIU G,et al.Advanced monitoring infrastructure system architecture for massive multi-source data[C]//2023 IEEE 13th International Conference on Electronics Information and Emergency Communication(ICEIEC).IEEE,2023:148-152. [6]JIANG L,WANG W,ZHENG S,et al.A novel data edge mining algorithm with euclidean distance weighted optimization for integrated energy station[C]//2023 IEEE 7th Information Technology and Mechatronics Engineering Conference(ITOEC).IEEE,2023,7:67-71. [7]PARK J K,LEE H,KIM W,et al.Degradation feature extraction method for prognostics of an extruder screw using multi-source monitoring data[J].Sensors,2023,23(2):637. [8]LI Y,YU X.The multi-mode FBN multi-source heterogeneous data fusion technology based on AES algorithm[C]//2023 IEEE 5th International Conference on Civil Aviation Safety and Information Technology(ICCASIT).IEEE,2023:1198-1202. [9]DONG Y,WEN C,WANG Z.A motor bearing fault diagnosis method based on multi-source data and one-dimensional lightweight convolution neural network[C]//Proceedings of the Institution of Mechanical Engineers,Part I:Journal of Systems and Control Engineering.2023:272-283. [10]XIONG Z,LI W,CAI Z.Federated generative model on multi-source heterogeneous data in iot[C]//Proceedings of the AAAI Conference on Artificial Intelligence.202310537-10545. [11]ANKITDESHPANDE Y,KARTHI R.Development of intru-sion detection system using deep learning for classifying attacks in power systems[C]//Soft Computing:Theories and Applications(SoCTA 2019).Singapore:Springer,2020:755-766. [12]HAN Y,WANG Y,CAO Y,et al.A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2023,53(11):7066-7076. [13]DASGUPTA R,PRAMANIK M,MITRA P,et al.Intrusion detection for power grid:a review[J].International Journal of Information Security,2024,23(2):1317-1329. [14]LIU J Q,WANG R,CAO J W.An overview of new informationtransmission methods for power systems[J].Journal of Northeast Dianli University,2024,44(4):1-8,76. [15]ZHANG D,ZHANG Y,ZANG X X.Anomalous Intrusion Detection Method for Surveillance Video Based on Self-Organising Mathematical Models[J].Journal of Northeast Dianli University,2022,42(4):63-69. [16]DURAIRA D,VENKATASAMY T K,MEHBODNIYA A,et al.Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network[J].Energy Sources,Part A:Recovery,Utilization,and Environmental Effects,2024,46(1):1519-1541. [17]RAJASOUNDARAN S,KUMAR S V N S,SELVI M,et al.Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks[J].Wireless Networks,2024,30(1):209-231. [18]NUGROHO S A,TAHA A F,QI J J.Robust dynamic state estimation of synchronous machines with asymptotic state estimation error performance guarantees[J].IEEE Transactions on Power Systems,2020,35(3):1923-1935. |
| [1] | GONG Zian, GU Zhenghui, CHEN Di. Cross-subject Driver Fatigue Detection Based on Local and Global Feature Integrated Network [J]. Computer Science, 2025, 52(6): 200-210. |
| [2] | SUN Hongbin, WANG Su, WANG Zhiliang, JIANG Zheyu, YANG Jiahai, ZHANG Hui. Augmenter:Event-level Intrusion Detection Based on Data Provenance Graph [J]. Computer Science, 2025, 52(2): 344-352. |
| [3] | HE Yuankang, MA Hailong, HU Tao, JIANG Yiming, ZHANG Peng, LIANG Hao. Traffic Adversarial Example Defense Based on Feature Transfer [J]. Computer Science, 2025, 52(2): 362-373. |
| [4] | LI Xiaogeng, HAN Xiao, XIAO Haiyi. Cooperative Defense Method for Network Space Object of Power Monitoring System [J]. Computer Science, 2025, 52(11A): 241200158-7. |
| [5] | HE Hao, ZHANG Hui. Intrusion Detection Method Based on Improved Active Learning [J]. Computer Science, 2025, 52(10): 357-365. |
| [6] | QIAN Zekai, DING Xiaoou, SUN Zhe, WANG Hongzhi, ZHANG Yan. Intelligent Evidence Set Selection Method for Diverse Data Cleaning Tasks [J]. Computer Science, 2024, 51(8): 124-132. |
| [7] | LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8. |
| [8] | LOU Ren, HE Renqiang, ZHAO Sanyuan, HAO Xin, ZHOU Yueqi, WANG Xinyuan, LI Fangfang. Single Stage Unsupervised Visible-infrared Person Re-identification [J]. Computer Science, 2024, 51(6A): 230600138-7. |
| [9] | PENG Bo, LI Yaodong, GONG Xianfu. Improved K-means Photovoltaic Energy Data Cleaning Method Based on Autoencoder [J]. Computer Science, 2024, 51(6A): 230700070-5. |
| [10] | WANG Chundong, LEI Jiebin. Intrusion Detection Model Based on Combinatorial Optimization of Improved Pigeon SwarmAlgorithm [J]. Computer Science, 2024, 51(11A): 231100054-7. |
| [11] | WANG Chundong, ZHANG Jiakai. Study on Open Set Based Intrusion Detection Method [J]. Computer Science, 2024, 51(11A): 231000033-6. |
| [12] | FAN Yi, HU Tao, YI Peng. System Call Host Intrusion Detection Technology Based on Generative Adversarial Network [J]. Computer Science, 2024, 51(10): 408-415. |
| [13] | BING Ying’ao, WANG Wenting, SUN Shengze, LIU Xin, NIE Qigui, LIU Jing. Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy ComprehensiveEvaluation Method [J]. Computer Science, 2023, 50(6A): 220400293-7. |
| [14] | YANG Pengfei, CAI Ruijie, GUO Shichen, LIU Shengli. Container-based Intrusion Detection Method for Cisco IOS-XE [J]. Computer Science, 2023, 50(4): 298-307. |
| [15] | LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU [J]. Computer Science, 2023, 50(3): 380-390. |
|
||