{"id":"https://openalex.org/W3009459043","doi":"https://doi.org/10.1145/3374587.3374631","title":"A Secure Transmission Scheme of Sensitive Power Information in Ubiquitous Power IoT","display_name":"A Secure Transmission Scheme of Sensitive Power Information in Ubiquitous Power IoT","publication_year":2019,"publication_date":"2019-12-06","ids":{"openalex":"https://openalex.org/W3009459043","doi":"https://doi.org/10.1145/3374587.3374631","mag":"3009459043"},"language":"en","primary_location":{"id":"doi:10.1145/3374587.3374631","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374587.3374631","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015310880","display_name":"Jingtang Luo","orcid":"https://orcid.org/0000-0001-8486-222X"},"institutions":[{"id":"https://openalex.org/I4210137797","display_name":"Economic Research Institute","ror":"https://ror.org/03y2be923","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I24768866","https://openalex.org/I4210137797"]}],"countries":["BG"],"is_corresponding":true,"raw_author_name":"Jingtang Luo","raw_affiliation_strings":["State Grid Sichuan Economic Research Institute Chengdu"],"affiliations":[{"raw_affiliation_string":"State Grid Sichuan Economic Research Institute Chengdu","institution_ids":["https://openalex.org/I4210137797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088930649","display_name":"Shiying Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137797","display_name":"Economic Research Institute","ror":"https://ror.org/03y2be923","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I24768866","https://openalex.org/I4210137797"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Shiying Yao","raw_affiliation_strings":["State Grid Sichuan Economic Research Institute Chengdu"],"affiliations":[{"raw_affiliation_string":"State Grid Sichuan Economic Research Institute Chengdu","institution_ids":["https://openalex.org/I4210137797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053945282","display_name":"Jijun Gou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137797","display_name":"Economic Research Institute","ror":"https://ror.org/03y2be923","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I24768866","https://openalex.org/I4210137797"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Jijun Gou","raw_affiliation_strings":["State Grid Sichuan Economic Research Institute Chengdu"],"affiliations":[{"raw_affiliation_string":"State Grid Sichuan Economic Research Institute Chengdu","institution_ids":["https://openalex.org/I4210137797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057229610","display_name":"Lisha Shuai","orcid":"https://orcid.org/0000-0001-5677-7976"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lisha Shuai","raw_affiliation_strings":["University of Science &amp; Technology Beijing"],"affiliations":[{"raw_affiliation_string":"University of Science &amp; Technology Beijing","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090529109","display_name":"Yu Cao","orcid":"https://orcid.org/0000-0002-9592-9167"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Cao","raw_affiliation_strings":["University of Science &amp; Technology Beijing"],"affiliations":[{"raw_affiliation_string":"University of Science &amp; Technology Beijing","institution_ids":["https://openalex.org/I92403157"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015310880"],"corresponding_institution_ids":["https://openalex.org/I4210137797"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22288928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"252","last_page":"257"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922054529190063},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5401188135147095},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5103093981742859},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.509185254573822},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4628315269947052},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4516708552837372},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4473591446876526},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.44583016633987427},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.44076284766197205},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4391736686229706},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4296689033508301},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42840060591697693},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4135197103023529},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35748690366744995},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09766879677772522},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0968303382396698},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07262870669364929}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922054529190063},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5401188135147095},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5103093981742859},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.509185254573822},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4628315269947052},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4516708552837372},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4473591446876526},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.44583016633987427},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.44076284766197205},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4391736686229706},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4296689033508301},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42840060591697693},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4135197103023529},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35748690366744995},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09766879677772522},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0968303382396698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07262870669364929},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3374587.3374631","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374587.3374631","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1993287797","https://openalex.org/W2000239500","https://openalex.org/W2055817410","https://openalex.org/W2115210164","https://openalex.org/W2958007817","https://openalex.org/W2962920729","https://openalex.org/W4229879624","https://openalex.org/W4239692971","https://openalex.org/W6638407846"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"As":[0],"one":[1],"of":[2,11,26,37,54,70,118,132,154],"the":[3,7,52,55,81,84,101,106,114,119,130,143,151,155,161],"national":[4],"key":[5],"infrastructures,":[6],"ubiquitous":[8],"power":[9,20,28,71],"Internet":[10],"Things":[12],"(IoT)":[13],"provides":[14],"a":[15,49,66],"convenient":[16],"method":[17],"for":[18,34,94],"large-scale":[19],"information":[21,29],"collection.":[22],"The":[23,111,138],"widespread":[24],"transmission":[25,68],"massive":[27],"using":[30],"data":[31,38,85,107,121,123,146,157],"mining":[32],"techniques":[33],"large":[35],"amounts":[36],"can":[39,166],"yield":[40],"valuable":[41],"information.":[42],"Therefore,":[43],"hacker":[44],"attacks":[45],"are":[46],"endless,":[47],"posing":[48],"threat":[50],"to":[51,97,100,169],"security":[53,117],"state,":[56],"society,":[57],"collectives":[58],"and":[59,92,116,125,128,150],"individuals.":[60],"In":[61,80],"this":[62],"paper,":[63],"we":[64],"propose":[65],"secure":[67],"scheme":[69],"information,":[72],"named":[73],"\"SSD\"":[74],"(Split":[75],"&":[76,78],"Signature":[77],"Disturbing).":[79],"scheme,":[82],"after":[83],"is":[86,163],"split,":[87],"it":[88],"will":[89,108],"be":[90,98,109,167,170],"anonymized":[91],"selected":[93],"different":[95],"paths":[96],"transferred":[99],"destination":[102],"node.":[103],"After":[104],"recombination,":[105],"restored.":[110],"SSD":[112],"ensures":[113],"indistinguishability":[115],"sensitive":[120],"by":[122,135],"splitting":[124],"disturbing":[126],"method,":[127],"protects":[129],"anonymity":[131],"individual":[133,144],"identities":[134],"group":[136],"signature.":[137],"experimental":[139],"results":[140],"show":[141],"that":[142],"prediction/actual":[145],"similarity":[147,152],"approaches":[148],"0%,":[149],"ratio":[153],"category":[156],"(three":[158],"types":[159],"in":[160],"experiment)":[162],"37.32%,":[164],"which":[165],"judged":[168],"basically":[171],"non-correlated.":[172]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
