{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:46Z","timestamp":1750220446773,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444588","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:32:34Z","timestamp":1609828354000},"page":"295-302","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Power Metering Data Abnormal Monitoring Model Electric Energy Data Abnormal Monitoring Model"],"prefix":"10.1145","author":[{"given":"Senlin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China, Beijing University of Posts and Telecommunications Beijing"}]},{"given":"Zhentai","family":"Longyuan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China, Beijing University of Posts and Telecommunications Beijing"}]},{"given":"Yueming","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China BUPT Beijing"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"issue":"10","key":"e_1_3_2_1_1_1","first-page":"1621","article-title":"Principle and core technology of blockchain[J]","volume":"14","author":"WANG Q, LI F J, WANG Z L","year":"2020","unstructured":"WANG Q, LI F J, WANG Z L , et al. Principle and core technology of blockchain[J] . Journal of Frontiers of Computer Science and Technology , 2020 , 14 ( 10 ): 1621 -- 1643 . WANG Q, LI F J, WANG Z L, et al. Principle and core technology of blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1621--1643.","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"e_1_3_2_1_2_1","volume-title":"Security Service Model for RFID Enabled Supply Chain","author":"O.","year":"2004","unstructured":"Wang, O. ( 2004 ). Security Service Model for RFID Enabled Supply Chain . In National Natural Science Foundation of China, Science Fund for Creative Research Groups (II) . Wang, O. (2004). Security Service Model for RFID Enabled Supply Chain. In National Natural Science Foundation of China, Science Fund for Creative Research Groups (II)."},{"issue":"9","key":"e_1_3_2_1_3_1","first-page":"55","volume":"29","author":"Di Ma","year":"2013","unstructured":"Ma Di , Shen Shuo . Study on RPKI Safeguard Based on Local Trust Anchor Management[J] . Telecommunications Science , 2013 , 29 ( 9 ): 55 -- 59 . Ma Di, Shen Shuo.Study on RPKI Safeguard Based on Local Trust Anchor Management[J]. Telecommunications Science, 2013, 29(9): 55--59.","journal-title":"Telecommunications Science"},{"issue":"07","key":"e_1_3_2_1_4_1","first-page":"540","article-title":"Research on the self-verification scheme of X.509 digital certificate validity [J]","volume":"32","author":"Baolong Liu","year":"2012","unstructured":"Liu Baolong , Chen Hua . Research on the self-verification scheme of X.509 digital certificate validity [J] . Journal of Xi'an Technological University , 2012 , 32 ( 07 ): 540 -- 544 . Liu Baolong, Chen Hua. Research on the self-verification scheme of X.509 digital certificate validity [J]. Journal of Xi'an Technological University, 2012, 32(07): 540--544.","journal-title":"Journal of Xi'an Technological University"},{"key":"e_1_3_2_1_5_1","unstructured":"Lu Jizhe Alyosha Ye Liu Xuan Dou Jian Zhang Hailong. Research on distributed electric energy metering data collection and safety mechanism based on blockchain technology. Electrical measurement and instrumentation: 1--8[ 2020-09-30].  Lu Jizhe Alyosha Ye Liu Xuan Dou Jian Zhang Hailong. Research on distributed electric energy metering data collection and safety mechanism based on blockchain technology. Electrical measurement and instrumentation: 1--8[ 2020-09-30]."},{"key":"e_1_3_2_1_6_1","volume-title":"Trusted data collection mechanism for blockchain traceability applications. Cyberspace Security, 11(9), 1","author":"Tingting Cao","year":"2020","unstructured":"Cao Tingting , Ding Yi , Zhang Jinglun , Li Jie , Wang Chenshuo . ( 2020 ). Trusted data collection mechanism for blockchain traceability applications. Cyberspace Security, 11(9), 1 . Cao Tingting, Ding Yi, Zhang Jinglun, Li Jie, Wang Chenshuo. (2020). Trusted data collection mechanism for blockchain traceability applications. Cyberspace Security, 11(9), 1."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Liang S. Li M. & Li W. (2019 November). Research on Traceability Algorithm of Logistics Service Transaction Based on Blockchain. In 2019 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (pp. 186--189). IEEE..  Liang S. Li M. & Li W. (2019 November). Research on Traceability Algorithm of Logistics Service Transaction Based on Blockchain. In 2019 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (pp. 186--189). IEEE..","DOI":"10.1109\/DCABES48411.2019.00053"},{"key":"e_1_3_2_1_8_1","volume-title":"Research on Traceability Application of Electronic Product Information Based on Blockchain. In 2018 International Conference on Economy, Management and Entrepreneurship (ICOEME","author":"Y.","year":"2018","unstructured":"Tianyu, M., & Xu, Y. ( 2018 , November) . Research on Traceability Application of Electronic Product Information Based on Blockchain. In 2018 International Conference on Economy, Management and Entrepreneurship (ICOEME 2018). Atlantis Press. Tianyu, M., & Xu, Y. (2018, November). Research on Traceability Application of Electronic Product Information Based on Blockchain. In 2018 International Conference on Economy, Management and Entrepreneurship (ICOEME 2018). Atlantis Press."},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"315","article-title":"Blockchain-based environmental monitoring data secure transmission scheme","volume":"47","author":"Zhou Wankai","unstructured":"Wankai Zhou , Min Long . Blockchain-based environmental monitoring data secure transmission scheme . Computer Science , 47 ( 1 ), 315 -- 320 . Wankai Zhou, Min Long. Blockchain-based environmental monitoring data secure transmission scheme. Computer Science, 47(1), 315--320.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_10_1","volume-title":"Application design of blockchain in patient remote intelligent monitoring system. Chinese Journal of Health Information Management, (6), 21","author":"Li Ming","year":"2019","unstructured":"Ming Li , Shiqi Tang . ( 2019 ). Application design of blockchain in patient remote intelligent monitoring system. Chinese Journal of Health Information Management, (6), 21 . Ming Li, Shiqi Tang. (2019). Application design of blockchain in patient remote intelligent monitoring system. Chinese Journal of Health Information Management, (6), 21."}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":10,"alternative-id":["10.1145\/3444370.3444588","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444588","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}