With the continuous construction of HVDC, it has gradually become dis-tances and large capacity transmission, as well as one of the main technologies of regional power grid interconnection. The scale of AC-DC hybrid g...
详细信息
In this study, we integrate the Bidirectional Encoder Representations from Transformers (BERT) model with the Cycle Generative Adversarial Network (CycleGAN) to create a system for Chinese text style transfer. Natural...
详细信息
With the growing popularity of the Internet, digital images are used and transferred more frequently. Although this phenomenon facilitates easy access to information, it also creates security concerns and violates int...
详细信息
The stability of an HVDC transmission network is very important for the reliable transfer of power from renewable energy resources. Therefore, this paper proposes a region of attraction stability analysis method for g...
详细信息
The problem of achieving performance-guaranteed finite-time exact tracking for uncertain strict-feedback nonlinear systems with unknown control directions is addressed. A novel logic switching mechanism with monitorin...
详细信息
A multiresolution chain coding scheme for contours based on Freeman chain codes in four direction is proposed. It progressively refines the grid size and encodes by the proposed R11 chain codes. Encoding and decoding ...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals...
详细信息
Delay-sensitive applications are becoming more and more in demand as a result of the development of information systems and the expansion of communication in cloud computing technologies. Some of these requests will b...
详细信息
Despite the concerted efforts to provide electricity through the deployment of distributed renewable energy-based technologies, the sustainability of these infrastructures remains uncertain. One plausible explanation ...
详细信息
暂无评论