烧烤 发表于 2025-3-23 10:04:24

http://reply.papertrans.cn/16/1598/159758/159758_11.png

泥沼 发表于 2025-3-23 15:26:42

Semi-supervised False Data Injection Attacks Detection in Smart Grid subjectivity, relying on expert knowledge and time-consuming nature of power system sample annotation, this task is intrinsically a small sample learning problem. In this paper, we propose a novel semi-supervised detection algorithm for FDIAs detection. The semi-supervised label propagation algorit

Juvenile 发表于 2025-3-23 21:26:22

http://reply.papertrans.cn/16/1598/159758/159758_13.png

玉米 发表于 2025-3-24 00:09:54

http://reply.papertrans.cn/16/1598/159758/159758_14.png

landfill 发表于 2025-3-24 05:46:02

http://reply.papertrans.cn/16/1598/159758/159758_15.png

僵硬 发表于 2025-3-24 10:30:13

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/a/image/159758.jpg

磨坊 发表于 2025-3-24 14:40:28

http://reply.papertrans.cn/16/1598/159758/159758_17.png

开头 发表于 2025-3-24 15:43:43

https://doi.org/10.1007/978-3-319-30157-0m unusable in the near future. In view of this, the National Institute of Standards and Technology (NIST) is currently undertaking the standardization of post-quantum Key Encapsulation Mechanisms (KEM) such that they can withstand quantum-capable attackers. One potential standardization candidate (i

institute 发表于 2025-3-24 22:31:03

http://reply.papertrans.cn/16/1598/159758/159758_19.png

蛰伏 发表于 2025-3-25 01:28:38

http://reply.papertrans.cn/16/1598/159758/159758_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Applied Cryptography in Computer and Communications; Second EAI Internati Jingqiang Lin,Qiang Tang Conference proceedings 2022 ICST Institu