Energy meters evolution in smart grids: A review

DB Avancini, JJPC Rodrigues, SGB Martins… - Journal of cleaner …, 2019 - Elsevier
Abstract Intelligent Energy Networks are comprised of devices capable of fulfilling their
functions in an energy-efficient fashion and with communication and remote control …

A survey on smart metering and smart grid communication

Y Kabalci - Renewable and Sustainable Energy Reviews, 2016 - Elsevier
The smart metering and communication methods used in smart grid are being extensively
studied owing to widespread applications of smart grid. Although the monitoring and control …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

Privacy-preserving distributed economic dispatch of microgrids: A dynamic quantization-based consensus scheme with homomorphic encryption

W Chen, L Liu, GP Liu - IEEE transactions on smart grid, 2022 - ieeexplore.ieee.org
This paper is concerned with the privacy-preserving distributed economic dispatch problem
(ED) of microgrids. A homomorphically encrypted consensus algorithm is developed in the …

Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

Privacy-preserving average consensus via state decomposition

Y Wang - IEEE Transactions on Automatic Control, 2019 - ieeexplore.ieee.org
Average consensus underpins key functionalities of distributed systems ranging from
distributed information fusion, decision-making, distributed optimization, to load balancing …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Secure and privacy-preserving consensus

M Ruan, H Gao, Y Wang - IEEE Transactions on Automatic …, 2019 - ieeexplore.ieee.org
Consensus is fundamental for distributed systems since it underpins key functionalities of
such systems ranging from distributed information fusion, decision making, to decentralized …

Content based image retrieval using deep learning process

RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …

[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …