{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:06:34Z","timestamp":1742940394905,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811908514"},{"type":"electronic","value":"9789811908521"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0852-1_7","type":"book-chapter","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:02:53Z","timestamp":1646816573000},"page":"90-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Data Privacy Protection in Power Industry Control System"],"prefix":"10.1007","author":[{"given":"Xia","family":"Shangguan","sequence":"first","affiliation":[]},{"given":"Rongyan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"2701","DOI":"10.1109\/TSG.2014.2336265","volume":"5","author":"F Borges","year":"2014","unstructured":"Borges, F., Muhlhauser, M.: EPPP4SMS: efficient privacy-preserving protocol for smart metering systems and its simulation using real-world data. Smart Grid IEEE Trans. 5(6), 2701\u20132708 (2014)","journal-title":"Smart Grid IEEE Trans."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.tcs.2015.10.039","volume":"620","author":"A Choromanska","year":"2016","unstructured":"Choromanska, A., Choromanski, K., Jagannathan, G., et al.: Differentially-private learning of low dimensional manifolds. Theoret. Comput. Sci. 620, 91\u2013104 (2016)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"7_CR3","first-page":"400","volume":"1","author":"D Feng","year":"2014","unstructured":"Feng, D., Fangguo, Z.: Complete privacy protection system of smart meter. J. Cipher 1(4), 400\u2013409 (2014)","journal-title":"J. Cipher"},{"issue":"10","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TMC.2006.144","volume":"5","author":"D Westhoff","year":"2016","unstructured":"Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 5(10), 1417\u20131431 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"8","key":"7_CR5","first-page":"265","volume":"3876","author":"C Dwork","year":"2012","unstructured":"Dwork, C.: Calibrating noise to sensitivity in private data analysis. Lect. Notes Comput. Sci. 3876(8), 265\u2013284 (2012)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.2228343","volume":"30","author":"Z Erkin","year":"2013","unstructured":"Erkin, Z., Troncoso-Pastoriza, J.R., Lagendijk, R.L., et al.: Privacy-preserving data aggregation in smart metering systems: an overview. Signal Process. Magaz. IEEE 30(2), 75\u201386 (2013)","journal-title":"Signal Process. Magaz. IEEE"},{"issue":"2","key":"7_CR7","first-page":"341","volume":"28","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Zeng, G., Ma, H.: Privacy preserving greedy clustering anonymous method for table data publishing. Acta Sinica 28(2), 341\u2013351 (2017)","journal-title":"Acta Sinica"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S.Z., et al.: Privacy for smart meters: towards undetectable appliance load signatures. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232\u2013237. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"issue":"39","key":"7_CR9","first-page":"140","volume":"10","author":"W Li","year":"2011","unstructured":"Li, W., You, W., Wang, X.: Review of power system information security research. Power Syst. Control Protect. 10(39), 140\u2013147 (2011)","journal-title":"Power Syst. Control Protect."},{"issue":"5","key":"7_CR10","first-page":"125","volume":"37","author":"L Xiaoqian","year":"2016","unstructured":"Xiaoqian, L., Qianmu, L.: Differential privacy preserving data publishing method on account of clustering anonymization. Acta Commun. Sinica 37(5), 125\u2013129 (2016)","journal-title":"Acta Commun. Sinica"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Mustafa, M., Zhang, N., Kalogridis, G., et al.: DESA: a decentralized, efficient and selective aggregation scheme in AMI. In: Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/ISGT.2014.6816376"},{"issue":"5","key":"7_CR12","first-page":"634","volume":"41","author":"N Zhen","year":"2017","unstructured":"Zhen, N., Qianmu, L., Yajuan, G.: Integrated prediction algorithm of anomaly monitoring for power big data log analysis platform. J. Nanjing Univ. Technol. 41(5), 634\u2013645 (2017)","journal-title":"J. Nanjing Univ. Technol."},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TSG.2012.2224389","volume":"4","author":"S Ruj","year":"2013","unstructured":"Ruj, S., Nayak, A.: A decentralized security framework for data aggregation and access control in smart grids. Smart Grid IEEE Trans. 4(1), 196\u2013205 (2013)","journal-title":"Smart Grid IEEE Trans."},{"issue":"5","key":"7_CR14","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00778-014-0351-4","volume":"23","author":"J Soria Comas","year":"2014","unstructured":"Soria Comas, J., Domingo Ferrer, J., Snchez, D., et al.: Enhancing data utility in differential privacy via microaggregation-based k-anonymity. Int. J. Very Large Data Bases 23(5), 771\u2013794 (2014)","journal-title":"Int. J. Very Large Data Bases"},{"issue":"1","key":"7_CR15","first-page":"101","volume":"37","author":"X Ping","year":"2014","unstructured":"Ping, X., Tianqing, Z., Xiaofeng, W.: Differential privacy protection and its utilization. Acta Comput. Sinica 37(1), 101\u2013122 (2014)","journal-title":"Acta Comput. Sinica"},{"issue":"11","key":"7_CR16","first-page":"51","volume":"39","author":"X Dong","year":"2018","unstructured":"Dong, X., Xian, L., Ziying, Z., et al.: Personalized privacy preserving algorithm for clustering mining. J. Harbin Eng. Univ. 39(11), 51\u201357 (2018)","journal-title":"J. Harbin Eng. Univ."},{"issue":"7","key":"7_CR17","first-page":"1327","volume":"42","author":"Y Jing","year":"2014","unstructured":"Jing, Y., Chao, W., Jianpei, Z.: Micro aggregation algorithm on account of sensitive attribute entropy. Acta Electron. Sin. 42(7), 1327\u20131337 (2014)","journal-title":"Acta Electron. Sin."},{"issue":"4","key":"7_CR18","first-page":"927","volume":"37","author":"Z Xiaojian","year":"2014","unstructured":"Xiaojian, Z., Xiaofeng, M.: Differential privacy protection for data publishing and analysis. Acta Comput. Sinica 37(4), 927\u2013949 (2014)","journal-title":"Acta Comput. Sinica"},{"issue":"S1","key":"7_CR19","first-page":"137","volume":"33","author":"Z Zhichu","year":"2013","unstructured":"Zhichu, Z., Jianghong, G., Haifeng, Z.: Efficient and secure data aggregation scheme for wireless sensor networks. Comput. Utiliz. 33(S1), 137\u2013140 (2013)","journal-title":"Comput. Utiliz."},{"key":"7_CR20","first-page":"24","volume":"9","author":"Z Ran","year":"2016","unstructured":"Ran, Z., Ji, S.: Review of foreign smart grid tech development practice. Electron. Qual. 9, 24\u201329 (2016)","journal-title":"Electron. Qual."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0852-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:04:52Z","timestamp":1646816692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0852-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811908514","9789811908521"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0852-1_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"221","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}