{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:30Z","timestamp":1750220070574,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100018572","name":"State Grid Shanghai Municipal Electric Power Company","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018572","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,3]]},"DOI":"10.1145\/3571662.3571686","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T15:47:52Z","timestamp":1672760872000},"page":"163-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of an intelligent substation auxiliary control edge gateway system supporting 5G"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0246-8972","authenticated-orcid":false,"given":"Chun","family":"Zhu","sequence":"first","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3409-5629","authenticated-orcid":false,"given":"Bingjie","family":"Liu","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Municipal Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1805-2039","authenticated-orcid":false,"given":"Xiaoyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology,Fudan University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,1,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"52","volume":"2016","author":"Zhang X.","unstructured":"X. Zhang , X. Liu , X. Meng , Design and Implementation of Open Auxiliary Monitoring System Platform for Substation[J]. Process Automation Instrumentation , 2016 ,37(09): 52 - 55 . X.Zhang,X. Liu,X. Meng,et al.Design and Implementation of Open Auxiliary Monitoring System Platform for Substation[J].Process Automation Instrumentation,2016,37(09):52-55.","journal-title":"Process Automation Instrumentation"},{"key":"e_1_3_2_1_2_1","first-page":"161","volume":"2021","author":"Jiang G.","unstructured":"G. Jiang . Intelligent Monitoring System of Power Grid Maintenance Safety[J]. Microcomputer Applications , 2021 ,37(8): 161 - 163 . G.Jiang.Intelligent Monitoring System of Power Grid Maintenance Safety[J].Microcomputer Applications,2021,37(8):161-163.","journal-title":"Microcomputer Applications"},{"key":"e_1_3_2_1_3_1","first-page":"98","volume":"2022","author":"Jiangyao QIN","unstructured":"QIN Jiangyao , HAN Ziyuan . Study on Deployment of MEC Equipment Based on 5 G Network in Power System.Applications of IC ,, 2022 ,39(02): 98 - 101 .DOI:10.19339\/j.issn.1674-2583.2022.02.033. 10.19339\/j.issn.1674-2583.2022.02.033 QIN Jiangyao,HAN Ziyuan.Study on Deployment of MEC Equipment Based on 5G Network in Power System.Applications of IC,,2022,39(02):98-101.DOI:10.19339\/j.issn.1674-2583.2022.02.033.","journal-title":"G Network in Power System.Applications of IC"},{"key":"e_1_3_2_1_4_1","first-page":"1162","volume":"2019","author":"Luo H.","unstructured":"H. Luo , K. Tong , F. Kong . The Progress of Human Action Recognition in Videos Based on Deep Learning: A Review[J]. Acta Electronica Sinica , 2019 ,47(5): 1162 - 1173 . H.Luo,K.Tong,F.Kong.The Progress of Human Action Recognition in Videos Based on Deep Learning:A Review[J].Acta Electronica Sinica,2019,47(5):1162-1173.","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_2_1_5_1","first-page":"132","volume":"2022","author":"Xiaojian ZHANG","unstructured":"ZHANG Xiaojian , FEI Jianxuan , JIANG Haitao . Security risk analysis of power 5G hybrid networking[J]. Telecommunication Science , 2022 ,38(1): 132 - 139 . ZHANG Xiaojian,FEI Jianxuan,JIANG Haitao.Security risk analysis of power 5G hybrid networking[J].Telecommunication Science,2022,38(1):132-139.","journal-title":"Telecommunication Science"},{"key":"e_1_3_2_1_6_1","first-page":"84","volume":"2020","author":"Jianbin Liang","unstructured":"Liang Jianbin . Design of IoT Monitoring System for MW Station Based on LoRa Technology[J].\u00a0 Radio & TV Broadcast Engineering , 2020 ,47(3): 84 - 88 . Liang Jianbin.Design of IoT Monitoring System for MW Station Based on LoRa Technology[J].\u00a0Radio & TV Broadcast Engineering,2020,47(3):84-88.","journal-title":"Radio & TV Broadcast Engineering"},{"key":"e_1_3_2_1_7_1","first-page":"1800","volume":"2020","author":"Huang Q.","unstructured":"Q. Huang , Z. Li , W. Xie .et. Edge Computing in Smart Homes[J]. Journal of Computer Research and Development , 2020 ,57(9): 1800 - 1809 . Q.Huang,Z.Li,W.Xie.et.Edge Computing in Smart Homes[J].Journal of Computer Research and Development,2020,57(9):1800-1809.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_2_1_8_1","first-page":"641","volume":"2022","author":"Yang W.","unstructured":"W. Yang , W. Liu , H. Cui .et.SG-Edge: Key Technology of Power Internet of Things Trusted Edge Computing Framework[J]. Journal of Software , 2022 ,33(2): 641 - 663 . W.Yang,W.Liu,H.Cui.et.SG-Edge: Key Technology of Power Internet of Things Trusted Edge Computing Framework[J].Journal of Software,2022,33(2):641-663.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_9_1","unstructured":"XIONG Xiaomin.5G Services Based on Multi-edge Computing[J].OIGITAL Communication world 2022(3):9-13 25.  XIONG Xiaomin.5G Services Based on Multi-edge Computing[J].OIGITAL Communication world 2022(3):9-13 25."},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"32","volume":"2022","author":"Kehe WU","unstructured":"WU Kehe , CHENG Rui , JIANG Xiaochen , ZHANG Jiyu . Security Protection Scheme of Power IoT Based on SDP[J]. Netinfo Security , 2022 ( 2 ): 32 - 38 . WU Kehe,CHENG Rui,JIANG Xiaochen,ZHANG Jiyu.Security Protection Scheme of Power IoT Based on SDP[J].Netinfo Security,2022(2):32-38.","journal-title":"Netinfo Security"},{"key":"e_1_3_2_1_11_1","first-page":"281","volume":"2022","author":"Yue LIU","unstructured":"LIU Yue , ZHANG Lei , XIN Shan , ZHANG Yu .V Ideo action classification based on deep learning network with spatio-temporal attention mechanism[J]. China Sciencepaper , 2022 ,17(3): 281 - 287 . LIU Yue,ZHANG Lei,XIN Shan,ZHANG Yu.VIdeo action classification based on deep learning network with spatio-temporal attention mechanism[J].China Sciencepaper,2022,17(3):281-287.","journal-title":"China Sciencepaper"}],"event":{"name":"ICCIP 2022: 2022 the 8th International Conference on Communication and Information Processing","acronym":"ICCIP 2022","location":"Beijing China"},"container-title":["Proceedings of the 8th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571662.3571686","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571662.3571686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:10Z","timestamp":1750183750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571662.3571686"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,3]]},"references-count":11,"alternative-id":["10.1145\/3571662.3571686","10.1145\/3571662"],"URL":"https:\/\/doi.org\/10.1145\/3571662.3571686","relation":{},"subject":[],"published":{"date-parts":[[2022,11,3]]},"assertion":[{"value":"2023-01-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}