烧烤 发表于 2025-3-23 10:04:24
http://reply.papertrans.cn/16/1598/159758/159758_11.png泥沼 发表于 2025-3-23 15:26:42
Semi-supervised False Data Injection Attacks Detection in Smart Grid subjectivity, relying on expert knowledge and time-consuming nature of power system sample annotation, this task is intrinsically a small sample learning problem. In this paper, we propose a novel semi-supervised detection algorithm for FDIAs detection. The semi-supervised label propagation algoritJuvenile 发表于 2025-3-23 21:26:22
http://reply.papertrans.cn/16/1598/159758/159758_13.png玉米 发表于 2025-3-24 00:09:54
http://reply.papertrans.cn/16/1598/159758/159758_14.pnglandfill 发表于 2025-3-24 05:46:02
http://reply.papertrans.cn/16/1598/159758/159758_15.png僵硬 发表于 2025-3-24 10:30:13
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/a/image/159758.jpg磨坊 发表于 2025-3-24 14:40:28
http://reply.papertrans.cn/16/1598/159758/159758_17.png开头 发表于 2025-3-24 15:43:43
https://doi.org/10.1007/978-3-319-30157-0m unusable in the near future. In view of this, the National Institute of Standards and Technology (NIST) is currently undertaking the standardization of post-quantum Key Encapsulation Mechanisms (KEM) such that they can withstand quantum-capable attackers. One potential standardization candidate (iinstitute 发表于 2025-3-24 22:31:03
http://reply.papertrans.cn/16/1598/159758/159758_19.png蛰伏 发表于 2025-3-25 01:28:38
http://reply.papertrans.cn/16/1598/159758/159758_20.png