×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [80]
内容类型
期刊论文 [68]
会议论文 [12]
发表日期
2019 [28]
2018 [18]
2017 [6]
2016 [3]
2015 [1]
2014 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共80条,第1-10条
帮助
限定条件
专题:湖南大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Optimal Transmission Overloads Mitigation Following Disturbances in Power Systems
期刊论文
IEEE Transactions on Industrial Informatics, 2019, 卷号: Vol.15 No.5, 页码: 2592-2604
作者:
Liang Che
;
Xuan Liu
;
Zhikang Shuai
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/13
Security
Tools
Automatic generation control
Power system faults
Power system protection
Load modeling
Transient analysis
Emergency control
generation redispatch
load shedding (LS)
overload mitigation
A Multi-time Reactive Power Optimization Under Interval Uncertainty of Renewable Power Generation by an Interval Sequential Quadratic Programming Method
期刊论文
IEEE Transactions on Sustainable Energy, 2019, 卷号: Vol.10 No.3, 页码: 1086-1097
作者:
Cong Zhang
;
Haoyong Chen
;
Ke Shi
;
Zipeng Liang
;
Weike Mo
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/13
Mathematical model
Programming
Voltage control
Generators
Reactive power
Security
Load modeling
Interval uncertainty
renewable energy sources
reactive power optimization
interval sequential quadratic programming
optimizing-scenarios method
Deep Learning Aided Interval State Prediction for Improving Cyber Security in Energy Internet
期刊论文
Energy, 2019
作者:
H. Wang
;
J. Ruan
;
G. Cao
;
Z. Ma
;
B. Zhou
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/13
Energy internet
cyber physical energy system
cyber security
deep belief network
cyber-attack
HCIC: Hardware-Assisted Control-Flow Integrity Checking
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: Vol.6 No.1, 页码: 458-471
作者:
Zhang, JL
;
Qi, BH
;
Qin, Z
;
Qu, G
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2019/12/13
Runtime
Cryptography
Internet of Things
Malware
Programming
Resists
Code reuse attacks (CRAs)
control flow integrity (CFI)
hardware-assisted security
physical unclonable function (PUF)
Deep learning aided interval state prediction for improving cyber security in energy internet.
期刊论文
Energy, 2019, 卷号: Vol.174, 页码: 1292-1304
作者:
Wang, Huaizhi
;
Ruan, Jiaqi
;
Ma, Zhengwei
;
Zhou, Bin
;
Fu, Xueqian
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/13
Cyber physical energy system
Cyber security
Cyber-attack
Deep belief network
Energy internet
COMPREHENSIVE ASSESSMENT OF THE WATER ECOLOGICAL SECURITY OF THE XIANGJIANG RIVER BASIN BASED ON PHYSICO-CHEMISTRY AND ORGANISM INDICES.
期刊论文
Applied Ecology & Environmental Research, 2019, 卷号: Vol.17 No.2, 页码: 4547-4574
作者:
Xu, X
;
Sheng, D
;
Li, G
;
Chen, X
;
Wang, X
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/13
AHP
ecological security
indicator system
water environment
Xiangjiang River Basin
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: Vol.14 No.2, 页码: 445-458
作者:
Xia, Xiaofang
;
Xiao, Yang
;
Liang, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/13
Electricity theft
smart grid
security
group testing
Deep learning aided interval state prediction for improving cyber security in energy internet.
期刊论文
Energy, 2019, 卷号: Vol.174, 页码: 1292-1304
作者:
Wang, Huaizhi
;
Ruan, Jiaqi
;
Ma, Zhengwei
;
Zhou, Bin
;
Fu, Xueqian
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Cyber physical energy system
Cyber security
Cyber-attack
Deep belief network
Energy internet
A proxy for atmospheric daytime gaseous sulfuric acid concentration in urban Beijing
期刊论文
Atmospheric Chemistry and Physics, 2019, 卷号: Vol.19 No.3, 页码: 1971-1983
作者:
Yiqun Lu
;
Chao Yan
;
Yueyun Fu
;
Yan Chen
;
Yiliang Liu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/12/17
Online Scheduling for Multi-Hops Wireless Networks With Security Constraints
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 21409-21419
作者:
Qiuming Liu
;
Changjian Zhu
;
He Xiao
;
Xiaohong Qiu
;
Li Yu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/17
Encoding
Heuristic algorithms
Wireless networks
Spread spectrum communication
Security
Communication system security
Wireless networks
secrecy encoding
network control
Lyapunov optimization
©版权所有 ©2017 CSpace - Powered by
CSpace