The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Theft with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-1995 (17) 1997-2000 (16) 2001-2003 (29) 2004 (21) 2005 (42) 2006 (63) 2007 (56) 2008 (64) 2009 (63) 2010 (25) 2011 (20) 2012 (28) 2013 (20) 2014 (19) 2015 (20) 2016 (37) 2017 (28) 2018 (44) 2019 (51) 2020 (53) 2021 (72) 2022 (73) 2023 (63) 2024 (21)
Publication types (Num. hits)
article(368) book(2) incollection(11) inproceedings(556) phdthesis(8)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 415 occurrences of 286 keywords

Results
Found 945 publication records. Showing 945 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
89Giovanni Di Crescenzo On the Statistical Dependency of Identity Theft on Demographics. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF US Demographics, Statistics, Regression Analysis, Identity Theft
78Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 Behavior based software theft detection. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software plagiarism, software theft, dynamic analysis, software birthmark
78Marion Schulze, Mahmood Hussain Shah The Step Method - Battling Identity Theft Using E-Retailers' Websites. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Identity Fraud, Customers’ Behavior, E-retailer, Security, Privacy, Websites, Identity Theft
78Kim Luong The other side of identity theft: not just a financial concern. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security, identity theft
75Jakob Illeborg Pagter, Michael Østergaard Pedersen The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68Somnath Mitra, Zizhan Zheng, Santanu Guha, Animikh Ghosh, Prabal Dutta, Bhagavathy Krishna, Kurt Plarre, Santosh Kumar 0001, Prasun Sinha An affordable, long-lasting, and autonomous theft detection and tracking system. Search on Bibsonomy SenSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF burglar tracking, theft detection
68Paul Madsen, Yuzo Koga, Kenji Takahashi Federated identity management for protecting users from ID theft. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF phishing, identity theft, federated identity
68Yang Yu, Tzi-cker Chiueh Display-only file server: a solution against information theft due to insider attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information theft, access, digital rights management, insider attack
59Fatih Özgül, Hakan Aksoy, Chris Bowerman Theft Gang Discovery Using Co-offending Knowledge and SNA. Search on Bibsonomy IV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Sabine Delaître Risk Management approach on identity theft in biometric systems context. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Paul C. van Oorschot, Stuart G. Stubblebine Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda All your contacts are belong to us: automated identity theft attacks on social networks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social network security, identity theft
57Tjaart Steyn, Hennie A. Kruger, Lynette Drevin Identity Theft - Empirical evidence from a Phishing Exercise. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF phising, education, Identity theft, security awareness
57Wenjie Wang, Yufei Yuan, Norman P. Archer A Contextual Framework for Combating Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity authentication, risk analysis, security and privacy, Identity theft, multi-party interaction
52M. Eric Johnson Data Hemorrhages in the Health-Care Sector. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Health-care information, data leaks, security, identity theft
52Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 Identification in electronic networks: characteristics of e-identifiers. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic identification, electronic identifier, electronic networks, e-commerce, identity theft
48Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle Preventing identity theft with electronic identity cards and the trusted platform module. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication with TPM, electronic ID, identity system
48Hui Song, Sencun Zhu, Guohong Cao SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Ginger Myles, Christian S. Collberg Detecting Software Theft via Whole Program Path Birthmarks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF copyright protection, software piracy, software birthmark
46Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information theft detection, Intrusion detection, information theory, malware analysis
46Philip Prentis, Mats Sjöberg, Markus Koskela, Jorma Laaksonen Image Theft Detection with Self-Organising Maps. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Image theft detection, TS-SOM, PicSOM, image retrieval, self-organising maps
46Latanya Sweeney Protecting Job Seekers from Identity Theft. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing, google, identity theft
46Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
46Stuart E. Schechter, Michael D. Smith 0001 How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Theft, Exploits, Threat Models, Security Economics
44Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 InfoShield: a security architecture for protecting information usage in memory. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou Dynamic K-Gram Based Software Birthmark. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark
41Anne M. Payton Data security breach: seeking a prescription for adequate remedy. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach
38HongQian Karen Lu, Asad M. Ali Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Alexandra Boldyreva, Markus Jakobsson Theft-Protected Proprietary Certificates. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Robert C. Newman Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet fraud, identity theft, cybercrime
35Greg Goth Identity Theft Solutions Disagree on Problem. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2005 DBLP  DOI  BibTeX  RDF online security, identity theft
33Melanie R. Rieback Keep on Blockin' in the Free World. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Md. Asif Nawaz, Abdullah Esha, Ahad Ahamed, Raihan Uddin Ahmed Assisting the Power Generation Sector Toward Sustainability - an IoT Based System for Power Theft Detection with Theft Location Identification. Search on Bibsonomy ICCA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Pamir, Ashraf Ullah, Shoaib Munawar, Muhammad Asif 0018, Benish Kabir, Nadeem Javaid Synthetic Theft Attacks Implementation for Data Balancing and a Gated Recurrent Unit Based Electricity Theft Detection in Smart Grids. Search on Bibsonomy CISIS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Rajiv Punmiya, Sangho Choe Energy Theft Detection Using Gradient Boosting Theft Detector With Feature Engineering-Based Preprocessing. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Adam Shostack, Paul Syverson What Price Privacy? - and why identity theft is about neither identity nor theft. Search on Bibsonomy Economics of Information Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
30Markus Jakobsson Captcha-free throttling. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle
30Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework
30Daisuke Mashima, Mustaque Ahamad Using identity credential usage logs to detect anomalous service accesses. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity theft and misuse detection, online access log monitoring, risk scoring
30Akiko Orita, Hisakazu Hada Is that really you?: an approach to assure identity without revealing real-name online. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, identity, twitter, identity theft, linkability, impersonation
30Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh Applications of a feather-weight virtual machine. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary server, browser exploit, information theft, virtual machine, web crawler
30Craig W. Thompson, Dale R. Thompson Identity Management. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Identity Solutions Symposium, RFID, smart cards, Identity management, identity theft, ID
30Ian M. Molloy, Jiangtao Li 0001, Ninghui Li Dynamic Virtual Credit Card Numbers. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credit card theft, e-commerce
30Hennie A. Kruger, Lynette Drevin, Tjaart Steyn Email Security Awareness - a Practical Assessment of Employee Behaviour. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Email security, employee behaviour, identity theft, security awareness
30Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino Privacy preserving multi-factor authentication with biometrics. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity theft prevention, privacy, authentication, biometrics
30Ginger Myles, Christian S. Collberg K-gram based software birthmarks. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software theft detection, legal aspects, software birthmarking
30Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino Establishing and protecting digital identity in federation systems. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity management, federation, single sign-on, identity theft, zero knowledge proof
30Terry Costlow Camera Phone Bans Expected. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cell phone privacy, camera phones, identity theft
30Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner It's eleven o'clock: do you know where your identity is? Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF identity abuse, identity theft
30Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite Unobtrusive user identification with light biometrics. Search on Bibsonomy NordiCHI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height
30Simson L. Garfinkel Email-Based Identification and Authentication: An Alternative to PKI? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft
27André N. Klingsheim, Kjell Jørgen Hole Identity Theft: Much Too Easy? A Study of Online Systems in Norway. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han Detecting Java Theft Based on Static API Trace Birthmark. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Rebecca T. Mercuri Scoping identity theft. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Adam L. Young, Moti Yung On Fundamental Limitations of Proving Data Theft. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jianlong Yang, Jianmin Wang 0001, Deyi Li Detecting the Theft of Natural Language Text Using Birthmark. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Taekyoung Kwon 0002, Hyeonjoon Moon Multi-modal Techniques for Identity Theft Prevention. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Patrick S. Chen Discovering Investigation Clues through Mining Criminal Databases. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Criminal Data, Stolen Automobiles, Data Mining, Databases, Data Warehousing
22Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade B-APT: Bayesian Anti-Phishing Toolbar. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend Dynamic graph-based software fingerprinting. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF watermarking, software protection, Software piracy
22Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF online gaming crime, virtual property, MMORPG, cybercrime
22Nicholas Huber, Katina Michael Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer. Search on Bibsonomy ICMB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Walid Shawbaki Multimedia Security in Passive Optical Networks via Wavelength Hopping and codes cycling technique. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Ahsan Habib 0001, Sonia Fahmy, Bharat K. Bhargava Monitoring and controlling QoS network domains. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Christer Magnusson, Louise Yngström Method for Insuring IT Risks. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies
22Radu Sion, Mikhail J. Atallah, Sunil Prabhakar On-the-fly Intrusion Detection for Web Portals. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue A Practical Method for Watermarking Java Programs. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF randomized-audit, Cryptography, risk-management, e-cash, economy
22T. F. Higginbotham Software protection of micro computer software (abstract only). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
19Mariam Al-Hamar, Ray Dawson, Lin Guan A Culture of Trust Threatens Security and Privacy in Qatar. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Spear phishing, Phishing, E-mail, Identity theft, Penetration test
19Ahren Studer, Adrian Perrig Mobile user location-specific encryption (MULE): using your office as your password. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key derivation, laptop theft, location based access, security
19Rüdiger Heimgärtner Identification of the User by Analyzing Human Computer Interaction. Search on Bibsonomy HCI (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HCI analysis, interaction indicator, theft protection, computer protection, user interface, personalization, user interface design, tool, culture, recognition, identification, interaction analysis, user identification
19Aniello Castiglione, Roberto De Prisco, Alfredo De Santis Do You Trust Your Phone? Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security
19Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang 0003 A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software theft detection, software protection, software birthmark
19Basie von Solms, Bobby L. Tait Biovault: Solving the Problem of Replay in Biometrics. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometric Tokens, Authentication, Electronic Commerce, Biometrics, Identification, Replay, Identity theft
19Husrev T. Sencar, Nasir D. Memon Watermarking and ownership problem: a revisit. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF additive watermarking, counterfeit ownership, ownership deadlock, theft of ownership, watermarking, ownership
19Sultan Almuhammadi, Clifford Neuman Security and Privacy Using One-Round Zero-Knowledge Proofs. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, e-commerce, computer security, public-key cryptography, trusted computing, identity theft, Zero-knowledge proofs
16Jack Garbus, Jordan Pollack Emergent Resource Exchange and Tolerated Theft Behavior Using Multiagent Reinforcement Learning. Search on Bibsonomy Artif. Life The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Sidra Abbas, Imen Bouazzi, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Zuzana Stolicna Improving Smart Grids Security: An Active Learning Approach for Smart Grid-Based Energy Theft Detection. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wei Zhuang, Wen Jiang, Min Xia 0002, Jun Liu Dynamic Generative Residual Graph Convolutional Neural Networks for Electricity Theft Detection. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Sanyuan Zhu, Ziwei Xue, Youfeng Li Electricity Theft Detection in Smart Grids Based on Omni-Scale CNN and AutoXGB. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wenlong Liao, Birgitte Bak-Jensen, Jayakrishnan Radhakrishna Pillai, Xiaofang Xia, Guangchun Ruan, Zhe Yang 0007 Reducing Annotation Efforts in Electricity Theft Detection Through Optimal Sample Selection. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Abhilash Sen, Nien-Che Yang Power Theft Detection Using Advanced Neural Network in Three-phase Distribution Systems. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wenlong Liao, Ruijin Zhu, Zhe Yang 0007, Kuangpu Liu, Bin Zhang, Shuyang Zhu, Bin Feng Electricity Theft Detection Using Dynamic Graph Construction and Graph Attention Network. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Ahlam Althobaiti, Charalampos Rotsos, Angelos K. Marnerides Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Lipeng Zhu, Weijia Wen, Jiayong Li, Cong Zhang 0004, Bin Zhou 0005, Zhikang Shuai Deep Active Learning-Enabled Cost-Effective Electricity Theft Detection in Smart Grids. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wenqing Zhou, Bin Li 0041, Hao Xiao, Hui Xiao, Wen Wang 0005, Yingjun Zheng, Sheng Su Electricity Theft Detection of Residential Users With Correlation of Water and Electricity Usage. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Xiaoyang Wang, Haipeng Xie, Lingfeng Tang, Chen Chen 0007, Zhaohong Bie Decentralized Privacy-Preserving Electricity Theft Detection for Distribution System Operators. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Aqsa Khalid, Ghulam Mustafa, Muhammad Rizwan Rashid Rana, Saeed M. Alshahrani, Mofadal Alymani RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Trystan S. Goetze AI Art is Theft: Labour, Extraction, and Exploitation, Or, On the Dangers of Stochastic Pollocks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Qiushi Liang, Shengjie Zhao, Jiangfan Zhang, Hao Deng 0002 Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated. Search on Bibsonomy ACM Trans. Cyber Phys. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Jalalud Din, Hongsheng Su, Sajad Ali, Muhammad Salman Research on Blockchain-Enabled Smart Grid for Anti-Theft Electricity Securing Peer-to-Peer Transactions in Modern Grids. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Muhammed Zekeriya Gunduz, Resul Das Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Antônio Mário Kaminski, Filipe Gabriel Carloto, Carlos Henrique Barriquello, Vinícius Jacques Garcia, Matheus Mello Jacques, Otacílio Carneiro Filho Assignment of AI Detected Buildings from Satellite Images to Registered Meters for Energy Theft Detection. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Madeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud 0001, Mostafa M. Fouda Electricity Theft Detection Approach Using One-Class Classification for AMI. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 945 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license