COLLUSION

作品数:27被引量:27H指数:2
导出分析报告
相关作者:胡佳李天刚更多>>
相关机构:电子科技大学四川外国语大学成都学院南京航空航天大学更多>>
相关期刊:《Computers, Materials & Continua》《Journal of Computer Science & Technology》《Applied Mathematics》《Journal of Electronics(China)》更多>>
相关基金:国家自然科学基金美国国家科学基金国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Collusion Potential Assessment in Electricity Markets Considering Generation Flexibility被引量:1
《CSEE Journal of Power and Energy Systems》2023年第4期1551-1566,共16页Teng Tu Yi Ding Peng Ji Minglei Bao Nan Shang Yonghua Song Dan Zeng 
supported in part by the Science and Technology Project of SGCC Technical report on multi-objective global optimal allocation model and strategy research of power trading in the new era under Grant No.SGZJ0000KXJS1900181.
The collusion among various generating units has been a problematic issue affecting the fairness and transparency of electricity markets.Therefore,it is of great significance to assess the potential of such collusion ...
关键词:Collusionpotentiale conomiccdispatch generation flexibility ramp rates strategic withholding. 
Consensus with preserved privacy against neighbor collusion
《Control Theory and Technology》2020年第4期409-418,共10页Silun Zhang Thomas Ohlson Timoudas Munther ADahleh 
This paper proposes a privacy-preserving algorithm to solve the average-consensus problem based on Shamir's secret shar-ing scheme,in which a network of agents reach an agreement on their states without exposing their...
关键词:Privacy preserving consensus Cyber security Network control Secret sharing scheme 
Coordinating EV Charging via Blockchain被引量:10
《Journal of Modern Power Systems and Clean Energy》2020年第3期573-581,共9页Jian Ping Zheng Yan Sijie Chen Liangzhong Yao Minhui Qian 
jointly supported by National Key Research and Development Program of China (No.2016YFB0900100);National Natural Science Foundation of China (No.U1866206);Young Elite Scientists Sponsorship Program。
The increasing electric vehicle(EV) penetration in a distribution network triggers the need for EV charging coordination. This paper firstly proposes a hierarchical EV charging coordination model and an algorithm base...
关键词:Electric vehicle(EV)charging coordination COLLUSION blockchain smart contract 
Key-Private Identity-Based Proxy Re-Encryption被引量:1
《Computers, Materials & Continua》2020年第5期633-647,共15页Chunpeng Ge Jinyue Xia Liming Fang 
This work is supported by the National Natural Science Foundation of China(Nos.61702236,61672270,61602216,61872181);Changzhou Sci&Tech Program(Grant No.CJ20179027).
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t...
关键词:Proxy re-encryption identity-based proxy re-encryption key-private collusion resistant 
New Identity Based Proxy Re-Encryption Scheme from Lattices被引量:2
《China Communications》2019年第10期174-190,共17页Liqiang Wu Xiaoyuan Yang Minqing Zhang Longfei Liu 
supported by the National Natural Science Foundation of China under grant No.(U1636114, 61572521,61772550);Natural Science of Shaanxi Province of China under grant No.2018JM6078;Innovative Research Team in Engineering University of PAP (KYTD201805)
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c...
关键词:IB-PRE LATTICES BONSAI trees COLLUSION RESISTANCE 
Collusion-Proof Result Inference in Crowdsourcing被引量:3
《Journal of Computer Science & Technology》2018年第2期351-365,共15页Peng-Peng Chen Hai-Long Sun Yi-Li Fang Jin-Peng Huai 
This work was supported partly by the National Basic Research 973 Program of China under Grant Nos. 2015CB358700 and 2014CB340304, the National Natural Science Foundation of China under Grant No. 61421003, and the Open Fund of the State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2017ZX-14.
In traditional crowdsourcing, workers are expected to provide independent answers to tasks so as to ensure the diversity of answers. However, recent studies show that the crowd is not a collection of independent worke...
关键词:crowdsourcing quality control COLLUSION collaborative crowdsourcing result inference 
Collusion detector based on G-N algorithm for trust model
《Journal of Systems Engineering and Electronics》2016年第4期926-935,共10页Lin Zhang Na Yin Jingwen Liu Ruchuan Wang 
supported by the National Natural Science Foundation of China(61402241;61572260;61373017;61572261;61472192);the Scientific&Technological Support Project of Jiangsu Province(BE2015702)
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co...
关键词:trust model collusion detector G-N algorithm 
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks被引量:2
《Journal of Sensor Technology》2014年第2期48-58,共11页Vennam Ratna Kumari Aitha Nagaraju Gaurav Pareek 
Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localizat...
关键词:LOCALIZATION SENSOR NETWORKS COLLUSION ATTACK 
Collusion and Economic Growth: A New Perspective on the China Model被引量:2
《Economic and Political Studies》2013年第2期18-39,共22页HUIHUA NIE JINBO LI 
the financial support from the Special Fund for Authors of National Excellent Doctoral Dissertation;China Ministry of Education Fund for Young Scholars in Humanities and Social Science
In this paper,we propose a political-economy model of China that explains both the rapid economic growth and frequent rate of accidents that have occurred in China.The central government delegates authority to the loc...
关键词:economic growth China model local government COLLUSION 
Collusion-Free Rational Secure Sum Protocol被引量:2
《Chinese Journal of Electronics》2013年第3期563-566,共4页ZHANG En CAI Yongquan 
This work is supported by the National Natural Science Foundation of China (No.61170221), the National Key Basic Research Program of China (973 Program) (No.2007CB311106), and Beijing Municipal Natural Science Foundation (No.1102003).
The secure sum protocol is a useful basic protocol of Secure multiparty computation (SMC). And it has numerous applications. However traditional secure sum protocol can not guarantee the fairness. In addition, most ...
关键词:Secure multiparty computation Secure sum Game theory Collusion-free. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部