[1] 赵安军, 王鹏柱, 荆竞, 等. 考虑电动汽车影响的农村家庭新能源容量优化配置方法[J]. 中国电力, 2022, 55(8): 31–39, 50 ZHAO Anjun, WANG Pengzhu, JING Jing, et al. Optimal configuration method of new energy capacity for rural households considering impact of electric vehicles[J]. Electric Power, 2022, 55(8): 31–39, 50 [2] 尹利, 于波, 马飞, 等. 基于深度学习算法的非侵入式工业负荷分解方法[J]. 电工电能新技术, 2022, 41(5): 61–70 YIN Li, YU Bo, MA Fei, et al. Non-intrusive load monitoring of industrial load based on deep learning algorithm[J]. Advanced Technology of Electrical Engineering and Energy, 2022, 41(5): 61–70 [3] 袁健, 王迪, 申泽宇. 大数据环境中交互式查询差分隐私保护模型[J]. 计算机应用研究, 2019, 36(6): 1782–1787 YUAN Jian, WANG Di, SHEN Zeyu. Interactive queries differential privacy protection model in big data environment[J]. Application Research of Computers, 2019, 36(6): 1782–1787 [4] 熊星星, 刘树波, 李丹, 等. 基于局部差分隐私的电动汽车充电位置隐私汇聚[J]. 工程科学与技术, 2019, 51(2): 137–143 XIONG Xingxing, LIU Shubo, LI Dan, et al. Private electric vehicle charging location aggregation based on local differential privacy[J]. Advanced Engineering Sciences, 2019, 51(2): 137–143 [5] 王辈, 胡红钢. 基于椭圆曲线中配对的密码学研究综述[J]. 密码学报, 2022, 9(2): 189–209 WANG Bei, HU Honggang. A survey of pairings on elliptic curve-based cryptography[J]. Journal of Cryptologic Research, 2022, 9(2): 189–209 [6] 蔡宇, 董树锋, 徐航, 等. 基于行为影响因子的非侵入式负荷实时分解算法[J]. 电力自动化设备, 2021, 41(12): 193–199 CAI Yu, DONG Shufeng, XU Hang, et al. Real-time disaggregation algorithm of nonintrusive load based on usage influencing factor[J]. Electric Power Automation Equipment, 2021, 41(12): 193–199 [7] FAN H, YANG H, DUAN S. A blockchain-based smart agriculture privacy protection data aggregation scheme[C]// 2021 2 nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE). Hangzhou, China. IEEE: 49–52. [8] GOPE P, SIKDAR B. Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(6): 1554–1566. [9] 吴云, 吕伟东, 李春哲, 等. 基于身份认证和聚合加密的智能电表数据隐私保护方案[J]. 东北电力大学学报, 2018, 38(5): 91–96 WU Yun, LV Weidong, LI Chunzhe, et al. Smart meter data privacy protection scheme based on authentication and aggregation encryption[J]. Journal of Northeast Electric Power University, 2018, 38(5): 91–96 [10] SONG F G, MA T H, TIAN Y, et al. A new method of privacy protection: random k-anonymous[J]. IEEE Access, 2019, 7: 75434–75445. [11] SU X, FAN K, SHI W B. Privacy-preserving distributed data fusion based on attribute protection[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5765–5777. [12] 李坤昌, 石润华, 李恩. 智能电网中数据聚合与用户查询隐私保护研究[J]. 信息网络安全, 2021, 21(11): 65–74 LI Kunchang, SHI Runhua, LI En. Survey on data aggregation and privacy protection of user query in smart grid[J]. Netinfo Security, 2021, 21(11): 65–74 [13] MEHRABI M A, DOCHE C, JOLFAEI A. Elliptic curve cryptography point multiplication core for hardware security module[J]. IEEE Transactions on Computers, 2020, 69(11): 1707–1718. [14] SOWJANYA K, DASGUPTA M, RAY S, et al. An efficient elliptic curve cryptography-based without pairing KPABE for internet of things[J]. IEEE Systems Journal, 2020, 14(2): 2154–2163. [15] 柳炼. 基于ECC的RFID认证协议的研究与应用[D]. 武汉: 武汉理工大学, 2018. LIU Lian. Research and application of ECC-based RFID authentication protocol [D]. Wuhan: Wuhan University of Technology, 2018. [16] DUEMONG F, PREECHAVEERAKUL L, Applying pell numbers for efficient elliptic curve large scalar multiplication[C]// 2018 22 nd International Computer Science and Engineering Conference (ICSEC). Chiang Mai, Thailand. IEEE, : 1–4. [17] 李艳梅, 殷新春, 邵梦丽. 基于多基表示的滑动窗口椭圆曲线多标量乘算法[J]. 计算机与现代化, 2019(1): 11–16 LI Yanmei, YIN Xinchun, SHAO Mengli. Multi-scalar multiplication algorithm for elliptic curve based on MBNS and sliding window[J]. Computer and Modernization, 2019(1): 11–16 [18] LIU Z, GROßSCHÄDL J, HU Z, et al. Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things[J]. IEEE Transactions on Computers, 2017, 66(5): 773–785. [19] MA R, DU L Y. Attribute-based blind signature scheme based on elliptic curve cryptography[J]. IEEE Access, 2022, 10: 34221–34227. [20] Pecan street database. [Online]. Available:http://www.pecanstreet.org/ [21] 蒋炜华, 马临超, 郑先锋. 基于隐马尔可夫的非入侵式负载监测方法研究[J]. 电子技术应用, 2017, 43(5): 98–101 JIANG Weihua, MA Linchao, ZHENG Xianfeng. Research on non-intrusive load monitoring method based on hidden Markov[J]. Application of Electronic Technique, 2017, 43(5): 98–101
|