Smart grids have become an emerging topic due to net-zero emissions and the rapid development of artificial intelligence (AI) technology focused on achieving targeted energy distribution and maintaining operating rese...
详细信息
Smart grids have become an emerging topic due to net-zero emissions and the rapid development of artificial intelligence (AI) technology focused on achieving targeted energy distribution and maintaining operating reserves. In order to prevent cyber-physical attacks, issues related to the security and privacy of grid systems are receiving much attention from researchers. In this paper, privacy-aware energy grid management systems with anomaly detection networks and distributed learning mechanisms are proposed. The anomaly detection network consists of a server and a client learning network, which collaboratively learn patterns without sharing data, and periodically train and exchange knowledge. We also develop learning mechanisms with federated, distributed, and split learning to improve privacy and use Q-learning for decision-making to facilitate interpretability. To demonstrate the effectiveness and robustness of the proposed schemes, extensive simulations are conducted in different energy grid environments with different target distributions, ORRs, and attack scenarios. The experimental results show that the proposed schemes not only improve management performance but also enhance privacy and security levels. We also compare the management performance and privacy level of the different learning machines and provide usage recommendations.
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were careful...
详细信息
ISBN:
(数字)9783319083261
ISBN:
(纸本)9783319083254
This book constitutes the refereed proceedings of the 21st International Symposium on Methodologies for Intelligent systems, ISMIS 2014, held in Roskilde, Denmark, in June 2014. The 61 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on complex networks and data stream mining; data mining methods; intelligent systems applications; knowledge representation in databases and systems; textual data analysis and mining; special session: challenges in text mining and semantic information retrieval; special session: warehousing and OLAPing complex, spatial and spatio-temporal data; ISMIS posters.
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cyc...
详细信息
ISBN:
(数字)9783642194320
ISBN:
(纸本)9783642194313
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions subline is on patterns, pattern collections, and pattern languages themselves. The journal also includes reviews, survey articles, criticisms of patterns and pattern languages, as well as other research on patterns and pattern languages.
This book, the second volume in the Transactions on Pattern Languages of Programming series, presents five papers that have been through a careful peer review process involving both pattern experts and domain experts. The papers demonstrate techniques for applying patterns in an industrial or research setting. Some have confronted the topic within software engineering; others offer approaches in other pattern domains, which is an indication of the diverse fields where patterns are applied.
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhängigkeiten komplex und schwer erfassbar sind. In diesem Buch wird das Thema Sicherheit da...
详细信息
ISBN:
(数字)9783642558344
ISBN:
(纸本)9783540411642;9783642625060
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhängigkeiten komplex und schwer erfassbar sind. In diesem Buch wird das Thema Sicherheit daher systematisch betrachtet: Lösungen für immer wiederkehrende Sicherheitsprobleme werden erstmals in Form von "Security Patterns" dargestellt. Die Grundlage hierfür bilden langjährige Erfahrungen, die im Rahmen des "Hacker Contest" gesammelt wurden. Die Grundsätze des Hackens bzw. Crackens sowie prinzipieller Angriffs- und Schutzkonzepte werden vermittelt. Um Sicherheitslücken erkennen und effizient schliessen zu können, muss ein Sicherheitsexperte in der Lage sein, Netze und Systeme aus der Sicht eines Angreifers zu verstehen. Hierbei hilft ihm die konsequent praxisbezogene Darstellung der Autoren.
This book contains interesting findings of some state-of-the-art research in the field of signal and image processing. It contains twenty one chapters covering a wide range of signal processing applications involving ...
详细信息
ISBN:
(数字)9789811088636
ISBN:
(纸本)9789811088629
This book contains interesting findings of some state-of-the-art research in the field of signal and image processing. It contains twenty one chapters covering a wide range of signal processing applications involving filtering, encoding, classification, segmentation, clustering, feature extraction, denoising, watermarking, object recognition, reconstruction and fractal analysis. Various types of signals including image, video, speech, non-speech audio, handwritten text, geometric diagram, ECG and EMG signals, MRI, PET and CT scan images, THz signals, solar wind speed signals (SWS) and photoplethysmogram (PPG) signals have been dealt with. It demonstrates how new paradigms of intelligent computing like quantum computing can be applied to process and analyze signals in a most precise and effective manner. Processing of high precision signals for real time target recognition by radar and processing of brain images, ECG and EMG signals that feature in this book have significant implications in defense mechanism and medical diagnosis. There are also applications of hybrid methods, algorithms and image filters which are proving to be better than the individual techniques or algorithms. Thus the present volume, enriched in depth and variety of techniques and algorithms concerning processing of various types of signals, is likely to be used as a compact yet handy reference for the young researchers, academicians and scientists working in the domain of signal and image processing and also to the post graduate students of computerscience and information technology.
暂无评论