|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 415 occurrences of 286 keywords
|
|
|
Results
Found 945 publication records. Showing 945 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Giovanni Di Crescenzo |
On the Statistical Dependency of Identity Theft on Demographics. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
US Demographics, Statistics, Regression Analysis, Identity Theft |
78 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Behavior based software theft detection. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
software plagiarism, software theft, dynamic analysis, software birthmark |
78 | Marion Schulze, Mahmood Hussain Shah |
The Step Method - Battling Identity Theft Using E-Retailers' Websites. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Identity Fraud, Customers’ Behavior, E-retailer, Security, Privacy, Websites, Identity Theft |
78 | Kim Luong |
The other side of identity theft: not just a financial concern. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security, identity theft |
75 | Jakob Illeborg Pagter, Michael Østergaard Pedersen |
The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Somnath Mitra, Zizhan Zheng, Santanu Guha, Animikh Ghosh, Prabal Dutta, Bhagavathy Krishna, Kurt Plarre, Santosh Kumar 0001, Prasun Sinha |
An affordable, long-lasting, and autonomous theft detection and tracking system. |
SenSys |
2009 |
DBLP DOI BibTeX RDF |
burglar tracking, theft detection |
68 | Paul Madsen, Yuzo Koga, Kenji Takahashi |
Federated identity management for protecting users from ID theft. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
phishing, identity theft, federated identity |
68 | Yang Yu, Tzi-cker Chiueh |
Display-only file server: a solution against information theft due to insider attack. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
information theft, access, digital rights management, insider attack |
59 | Fatih Özgül, Hakan Aksoy, Chris Bowerman |
Theft Gang Discovery Using Co-offending Knowledge and SNA. |
IV |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Sabine Delaître |
Risk Management approach on identity theft in biometric systems context. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Paul C. van Oorschot, Stuart G. Stubblebine |
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda |
All your contacts are belong to us: automated identity theft attacks on social networks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
social network security, identity theft |
57 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
57 | Wenjie Wang, Yufei Yuan, Norman P. Archer |
A Contextual Framework for Combating Identity Theft. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
identity authentication, risk analysis, security and privacy, Identity theft, multi-party interaction |
52 | M. Eric Johnson |
Data Hemorrhages in the Health-Care Sector. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Health-care information, data leaks, security, identity theft |
52 | Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 |
Identification in electronic networks: characteristics of e-identifiers. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
electronic identification, electronic identifier, electronic networks, e-commerce, identity theft |
48 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
48 | Hui Song, Sencun Zhu, Guohong Cao |
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Ginger Myles, Christian S. Collberg |
Detecting Software Theft via Whole Program Path Birthmarks. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
copyright protection, software piracy, software birthmark |
46 | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
information theft detection, Intrusion detection, information theory, malware analysis |
46 | Philip Prentis, Mats Sjöberg, Markus Koskela, Jorma Laaksonen |
Image Theft Detection with Self-Organising Maps. |
ICANN (1) |
2009 |
DBLP DOI BibTeX RDF |
Image theft detection, TS-SOM, PicSOM, image retrieval, self-organising maps |
46 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
46 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
46 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
44 | Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 |
InfoShield: a security architecture for protecting information usage in memory. |
HPCA |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou |
Dynamic K-Gram Based Software Birthmark. |
Australian Software Engineering Conference |
2008 |
DBLP DOI BibTeX RDF |
Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark |
41 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
38 | HongQian Karen Lu, Asad M. Ali |
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Alexandra Boldyreva, Markus Jakobsson |
Theft-Protected Proprietary Certificates. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
35 | Greg Goth |
Identity Theft Solutions Disagree on Problem. |
IEEE Distributed Syst. Online |
2005 |
DBLP DOI BibTeX RDF |
online security, identity theft |
33 | Melanie R. Rieback |
Keep on Blockin' in the Free World. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Md. Asif Nawaz, Abdullah Esha, Ahad Ahamed, Raihan Uddin Ahmed |
Assisting the Power Generation Sector Toward Sustainability - an IoT Based System for Power Theft Detection with Theft Location Identification. |
ICCA |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Pamir, Ashraf Ullah, Shoaib Munawar, Muhammad Asif 0018, Benish Kabir, Nadeem Javaid |
Synthetic Theft Attacks Implementation for Data Balancing and a Gated Recurrent Unit Based Electricity Theft Detection in Smart Grids. |
CISIS |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Rajiv Punmiya, Sangho Choe |
Energy Theft Detection Using Gradient Boosting Theft Detector With Feature Engineering-Based Preprocessing. |
IEEE Trans. Smart Grid |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy |
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Adam Shostack, Paul Syverson |
What Price Privacy? - and why identity theft is about neither identity nor theft. |
Economics of Information Security |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
30 | Markus Jakobsson |
Captcha-free throttling. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
30 | Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework |
30 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
30 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
30 | Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
Applications of a feather-weight virtual machine. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
binary server, browser exploit, information theft, virtual machine, web crawler |
30 | Craig W. Thompson, Dale R. Thompson |
Identity Management. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
Identity Solutions Symposium, RFID, smart cards, Identity management, identity theft, ID |
30 | Ian M. Molloy, Jiangtao Li 0001, Ninghui Li |
Dynamic Virtual Credit Card Numbers. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
credit card theft, e-commerce |
30 | Hennie A. Kruger, Lynette Drevin, Tjaart Steyn |
Email Security Awareness - a Practical Assessment of Employee Behaviour. |
World Conference on Information Security Education |
2007 |
DBLP DOI BibTeX RDF |
Email security, employee behaviour, identity theft, security awareness |
30 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
30 | Ginger Myles, Christian S. Collberg |
K-gram based software birthmarks. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
software theft detection, legal aspects, software birthmarking |
30 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Establishing and protecting digital identity in federation systems. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
identity management, federation, single sign-on, identity theft, zero knowledge proof |
30 | Terry Costlow |
Camera Phone Bans Expected. |
IEEE Distributed Syst. Online |
2004 |
DBLP DOI BibTeX RDF |
cell phone privacy, camera phones, identity theft |
30 | Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner |
It's eleven o'clock: do you know where your identity is? |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
identity abuse, identity theft |
30 | Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite |
Unobtrusive user identification with light biometrics. |
NordiCHI |
2004 |
DBLP DOI BibTeX RDF |
body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height |
30 | Simson L. Garfinkel |
Email-Based Identification and Authentication: An Alternative to PKI? |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft |
27 | André N. Klingsheim, Kjell Jørgen Hole |
Identity Theft: Much Too Easy? A Study of Online Systems in Norway. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han |
Detecting Java Theft Based on Static API Trace Birthmark. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca T. Mercuri |
Scoping identity theft. |
Commun. ACM |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Adam L. Young, Moti Yung |
On Fundamental Limitations of Proving Data Theft. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jianlong Yang, Jianmin Wang 0001, Deyi Li |
Detecting the Theft of Natural Language Text Using Birthmark. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Multi-modal Techniques for Identity Theft Prevention. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Patrick S. Chen |
Discovering Investigation Clues through Mining Criminal Databases. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
Criminal Data, Stolen Automobiles, Data Mining, Databases, Data Warehousing |
22 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend |
Dynamic graph-based software fingerprinting. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
watermarking, software protection, Software piracy |
22 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
22 | Nicholas Huber, Katina Michael |
Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer. |
ICMB |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou |
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Walid Shawbaki |
Multimedia Security in Passive Optical Networks via Wavelength Hopping and codes cycling technique. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Ahsan Habib 0001, Sonia Fahmy, Bharat K. Bhargava |
Monitoring and controlling QoS network domains. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
22 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
On-the-fly Intrusion Detection for Web Portals. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue |
A Practical Method for Watermarking Java Programs. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Yacov Yacobi |
Risk Management for E-Cash Systems with Partial Real-Time Audit. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
randomized-audit, Cryptography, risk-management, e-cash, economy |
22 | T. F. Higginbotham |
Software protection of micro computer software (abstract only). |
ACM Conference on Computer Science |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
19 | Ahren Studer, Adrian Perrig |
Mobile user location-specific encryption (MULE): using your office as your password. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
key derivation, laptop theft, location based access, security |
19 | Rüdiger Heimgärtner |
Identification of the User by Analyzing Human Computer Interaction. |
HCI (3) |
2009 |
DBLP DOI BibTeX RDF |
HCI analysis, interaction indicator, theft protection, computer protection, user interface, personalization, user interface design, tool, culture, recognition, identification, interaction analysis, user identification |
19 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
19 | Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang 0003 |
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
software theft detection, software protection, software birthmark |
19 | Basie von Solms, Bobby L. Tait |
Biovault: Solving the Problem of Replay in Biometrics. |
I3E |
2005 |
DBLP DOI BibTeX RDF |
Biometric Tokens, Authentication, Electronic Commerce, Biometrics, Identification, Replay, Identity theft |
19 | Husrev T. Sencar, Nasir D. Memon |
Watermarking and ownership problem: a revisit. |
Digital Rights Management Workshop |
2005 |
DBLP DOI BibTeX RDF |
additive watermarking, counterfeit ownership, ownership deadlock, theft of ownership, watermarking, ownership |
19 | Sultan Almuhammadi, Clifford Neuman |
Security and Privacy Using One-Round Zero-Knowledge Proofs. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
privacy, e-commerce, computer security, public-key cryptography, trusted computing, identity theft, Zero-knowledge proofs |
16 | Jack Garbus, Jordan Pollack |
Emergent Resource Exchange and Tolerated Theft Behavior Using Multiagent Reinforcement Learning. |
Artif. Life |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sidra Abbas, Imen Bouazzi, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Zuzana Stolicna |
Improving Smart Grids Security: An Active Learning Approach for Smart Grid-Based Energy Theft Detection. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wei Zhuang, Wen Jiang, Min Xia 0002, Jun Liu |
Dynamic Generative Residual Graph Convolutional Neural Networks for Electricity Theft Detection. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sanyuan Zhu, Ziwei Xue, Youfeng Li |
Electricity Theft Detection in Smart Grids Based on Omni-Scale CNN and AutoXGB. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi |
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenlong Liao, Birgitte Bak-Jensen, Jayakrishnan Radhakrishna Pillai, Xiaofang Xia, Guangchun Ruan, Zhe Yang 0007 |
Reducing Annotation Efforts in Electricity Theft Detection Through Optimal Sample Selection. |
IEEE Trans. Instrum. Meas. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Abhilash Sen, Nien-Che Yang |
Power Theft Detection Using Advanced Neural Network in Three-phase Distribution Systems. |
IEEE Trans. Instrum. Meas. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenlong Liao, Ruijin Zhu, Zhe Yang 0007, Kuangpu Liu, Bin Zhang, Shuyang Zhu, Bin Feng |
Electricity Theft Detection Using Dynamic Graph Construction and Graph Attention Network. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ahlam Althobaiti, Charalampos Rotsos, Angelos K. Marnerides |
Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Lipeng Zhu, Weijia Wen, Jiayong Li, Cong Zhang 0004, Bin Zhou 0005, Zhikang Shuai |
Deep Active Learning-Enabled Cost-Effective Electricity Theft Detection in Smart Grids. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenqing Zhou, Bin Li 0041, Hao Xiao, Hui Xiao, Wen Wang 0005, Yingjun Zheng, Sheng Su |
Electricity Theft Detection of Residential Users With Correlation of Water and Electricity Usage. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyang Wang, Haipeng Xie, Lingfeng Tang, Chen Chen 0007, Zhaohong Bie |
Decentralized Privacy-Preserving Electricity Theft Detection for Distribution System Operators. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aqsa Khalid, Ghulam Mustafa, Muhammad Rizwan Rashid Rana, Saeed M. Alshahrani, Mofadal Alymani |
RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids. |
PeerJ Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Trystan S. Goetze |
AI Art is Theft: Labour, Extraction, and Exploitation, Or, On the Dangers of Stochastic Pollocks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li |
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Qiushi Liang, Shengjie Zhao, Jiangfan Zhang, Hao Deng 0002 |
Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated. |
ACM Trans. Cyber Phys. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Jalalud Din, Hongsheng Su, Sajad Ali, Muhammad Salman |
Research on Blockchain-Enabled Smart Grid for Anti-Theft Electricity Securing Peer-to-Peer Transactions in Modern Grids. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Muhammed Zekeriya Gunduz, Resul Das |
Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Antônio Mário Kaminski, Filipe Gabriel Carloto, Carlos Henrique Barriquello, Vinícius Jacques Garcia, Matheus Mello Jacques, Otacílio Carneiro Filho |
Assignment of AI Detected Buildings from Satellite Images to Registered Meters for Energy Theft Detection. |
ISGT |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Madeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud 0001, Mostafa M. Fouda |
Electricity Theft Detection Approach Using One-Class Classification for AMI. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 945 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|