Abstract is missing.
- Application and Research of Power Communication Trusted Access GatewayWeiwei Kong, Jie Zhang, Peichun Pan, Jia Yu. 3-14 [doi]
- The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification AlgorithmYa Wei, Rongyan Cai, Lan Zhang, Qian Guo. 15-26 [doi]
- Research on Application Technology and Security of VoLTE in Power Wireless Private NetworkWeiwei Kong, Long Liu, Xingqi Wei, Shanyu Bi, Xinlei Yang. 27-40 [doi]
- Semi-supervised Time Series Anomaly Detection Model Based on LSTM AutoencoderHui Xiao, Donghai Guan, Rui Zhao, Weiwei Yuan, Yaofeng Tu, Asad Masood Khattak. 41-53 [doi]
- Fault Inspection of Brake Shoe Wear for TEDS Based on Machine VisionMengqiong Ge, Shengfang Lu, Yan Zhang, Cui Qin. 54-59 [doi]
- Android Malware Detection Method Based on App-Image ConversionNannan Xie, Hongpeng Bai, Yanfeng Shi, Haiwei Wu. 60-74 [doi]
- Research on IMS Security Access and Mechanism in Power SystemXiaoyuan Zhang, Peng Jia, Shaopeng Wanyan. 75-85 [doi]
- Research on the Role-Based Access Control Model and Data Security MethodJunhua Deng, Lei Zhao, Xuechong Yuan, Zhu Tang, Qian Guo. 86-96 [doi]
- Research on Network Optimization and Network Security in Power Wireless Private NetworkJunyao Zhang, Shanyu Bi, Liangliang Gong, Weiwei Kong, Xiaoyuan Zhang. 97-110 [doi]
- Research on Location Planning of Multi-station Integration Based on Particle Swarm OptimizationXincong Li, Mingze Zhang, Jun Wang, Minhao Xia. 111-121 [doi]
- Quick Response Code Based on Least Significant BitZhuohao Weng, Jian Zhang, Cui Qin, Yan Zhang. 122-132 [doi]
- ∞ Control for Networked Control System with Saturation ConstraintsWenlin Zou, Lisheng Jia, Liuwen Li. 133-141 [doi]
- Privacy Preserving Data Sharing in Online Social NetworksRanda Aljably. 142-152 [doi]
- Indoor and Outdoor Fusion Positioning and Security Technology Based on Beidou SatelliteBingsen Xia, Zhaozheng Zhou, Zhanghuang Zhang, Yang Li, Jia Yu. 153-164 [doi]
- Research on Safety Protection Scheme of Distribution Network AutomationXue Gao, Sai Liu, Jun Liu, Jia Yu. 165-176 [doi]
- Research on Experimental Verification Scheme of 5G in Power SystemNingzhe Xing, Shen Jin, Wei Song, Yang Li, Jia Yu. 177-193 [doi]
- Immune Network Based Anomaly Detection AlgorithmXinlei Hu, Zhengxia Wang, Yunbing Hu. 194-203 [doi]
- Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation AlgorithmYongliang Jia, Peng Tao 0002, Dapeng Zhou, Bing Li. 204-214 [doi]
- The Privacy Data Protection Model Based on Random Projection TechnologyWen Shen, Qian Guo, Hui Zhu, Kejian Tang, Shaohui Zhan, Zhiguo Hao. 215-226 [doi]
- ∞ Control for Networked Control Systems with Random Actuator NonlinearityLiuwen Li, Wenlin Zou, Haiqiang Liu. 227-237 [doi]
- Research on the Sensitive Data Protection Method Based on Game Theory AlgorithmYunfeng Zou, Pengfei Yu, Chao Shan, Meng Wu. 238-248 [doi]
- Research on Differential Protection and Security in Power System Under 5G EnvironmentGuofeng Tong, Yuanwen Jin, Kangyi Li, Jia Yu. 249-260 [doi]
- Research on Intelligent Fault and Security Handling Based on IMS in Power SystemPeng Jia, Shaopeng Wanyan, Xiaoyuan Zhang. 261-273 [doi]
- Research on System Simulation and Data Analysis of Power Wireless Private NetworkWeiwei Yan, hui Chu. 274-284 [doi]
- Research on Attitude Control System of Four-Rotor AircraftZhan Shi, Yonghui Liu, Fengxian Zhao, Chenxu Liu. 285-296 [doi]
- A Method for Image Big Data Utilization: Automated Progress Monitoring Based on Image Data for Large Construction SiteChengtao Li, Li Chen, Jiafeng Wang, Tianjian Xia. 299-313 [doi]
- Big Data from Collection to Use in Competitive Games - A Study Case on BadmintonGuanzhe Zhao, Zaichao Duan, Chengbo Zhang, Zilong Jin, Benjamin Kwapong Osibo. 314-326 [doi]
- The Interactive Query Method with Clustering and Differential Privacy Protection Model Under Big Data EnvironmentHuanyu Fan, Yunan Zhu 0002, Chao Shan. 327-336 [doi]
- Research on Spatio-Temporal Characteristics of Distribution Network Voltage Based on Big DataXin He, Zhentao Han, Nan Zhang, Yixin Hou, Yutong Liu. 337-352 [doi]
- Oracle Data Privacy Protection System of Virtual DatabaseShenglong Liu, Hongbin Zhu, Tao Zhao, Heng Wang, Xianzhou Gao, Ruxia Yang. 353-363 [doi]
- Enterprise Credit Decisions Using Logistic Regression and Particle Swarm Optimization Based on Massive Data RecordsCaixin Kang, Mingrui Wan, Murong Du, Daokang Zhang. 364-376 [doi]
- A Novel Artificial Immune Model on Hadoop for Anomaly DetectionXinlei Hu, Zhengxia Wang, Yunbing Hu. 377-390 [doi]
- Research on Accurate Location of Line Loss Anomaly in Substation Area Based on Data DrivenZuobin Liang, Zhaojun Lu, Fei Yuan, Qing Wang, Guangfeng Zhao, Han Zhang, Wei Zhang. 391-405 [doi]
- A Reactive Power Reserve Prediction Method for EV Charging Piles Based on Big Data and Optimized Neural NetworkYibin Guan, Wenlong Wu, Jianhua Chen, Xiaochun Xu, Kanglin Cai, Wenhui Yuan. 406-419 [doi]
- Research on Scattered Point Cloud Coordinate Reduction and Hole Repair Technology Based on Big Data ModelLiu Lei, Zhu Hao, WeiYe Xu. 420-432 [doi]
- Survey on Computation Offloading Schemes in Resource-Constrained Mobile Edge ComputingHuiting Sun, Yanfang Fan, Shuang Yuan, Ying Cai. 433-444 [doi]
- Discussion on the Influence of 5G and Blockchain Technology on Digital Virtual AssetsYanan Li, Hui Pang, Zhixin Liu 0005, Shijie Li. 447-457 [doi]
- Research on Power Universal Service Access Gateway Based on BlockchainShaopeng Wanyan, Peng Jia, Xiaoyuan Zhang. 458-470 [doi]
- Application of Whole-Service Ubiquitous Internet of Things in Power SystemWeiwei Yan, hui Chu. 471-482 [doi]
- Learning Depth from Light Field via Deep Convolutional Neural NetworkLei Han 0002, Xiaohua Huang, Zhan Shi, Shengnan Zheng. 485-496 [doi]
- Cycle-Derain: Enhanced CycleGAN for Single Image DerainingYuting Guo, Zifan Ma, Zhiying Song, Ruocong Tang, Linfeng Liu 0001. 497-509 [doi]
- Sensitive Data Recognition and Filtering Model of Webpage Content Based on Decision Tree AlgorithmSheng Ye, Yong Cheng, Yonggang Yang, Qian Guo. 510-521 [doi]
- Hard Disk Failure Prediction via Transfer LearningRui Zhao, Donghai Guan, Yuanfeng Jin, Hui Xiao, Weiwei Yuan, Yaofeng Tu, Asad Masood Khattak. 522-536 [doi]
- Design and Application of CMAC Neural Network Based on Software Hardening TechnologyHao Zhu, Mulan Wang, WeiYe Xu. 537-548 [doi]
- Research on Path Planning of Mobile Robot Based on Deep Reinforcement LearningShi Zhan 0002, Tingting Zhang, Han Lei, Qian Yin, Lu Ali. 549-560 [doi]
- Research on K-Means Clustering Algorithm Based on Improved Genetic AlgorithmLulu Zhang, Yu-shu. 561-571 [doi]
- Research on Low Voltage Early Warning of Distribution Network Based on Improved DNN-LSTM AlgorithmZeyu Zhang, Xizhong Li, Xuan Fei, Xin Cao, Qian Xu. 572-584 [doi]
- Cross-Task and Cross-Model Active Learning with Meta FeaturesGuo-Xiang Li, Yao-Feng Tu, Sheng-Jun Huang. 585-598 [doi]
- Improved Random Forest Algorithm Based on Attribute Comprehensive Weighting Used in Identification of Missing Data in Power GridYihe Wang, Yufei Jin, Yuancheng Zhu, Xiyuan Li, Dazhi Li. 599-611 [doi]
- Course Classification of Online Learning Platform Based on Sentence-Bert ModelJiaze He, Qian Lu, Ying Tong, Yiyang Chen. 612-623 [doi]
- Analysis of Economic Loss of Voltage Sag Based on Artificial Intelligence AlgorithmBo Yang, Bo Jia, Wanchao Jiang, Yongxin Miao, Yang Wang. 624-638 [doi]
- Posterior Transfer Learning with Active SamplingJie Pan, Yaofeng Tu. 639-651 [doi]