×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海大学 [53]
内容类型
期刊论文 [30]
会议论文 [23]
发表日期
2019 [4]
2018 [7]
2017 [10]
2016 [7]
2015 [3]
2014 [8]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共53条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Two-stage joint equilibrium model of electricity market with tradable green certificates
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 卷号: 41, 页码: 1615-1626
作者:
An, Xuena[1]
;
Zhang, Shaohua[2]
;
Li, Xue[3]
;
Du, Dajun[4]
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2019/04/22
Equilibrium analysis
renewable portfolio standard
tradable green certificate
Cournot competition
supply function competition
Impact of PHEV in active distribution network under gas station network attack
期刊论文
ISA transactions, 2019
作者:
Li Xue[1]
;
Dong Jing[2]
;
Du Dajun[3]
;
Wu Lei[4]
;
Fei Minrui[5]
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2019/04/22
Attack
Correlation
Elementary transformation (ET)
Gas station network
Nataf/normalization transformation
Plug-in hybrid electric vehicle (PHEV)
Point estimate method (PEM)
Malicious data deception attacks against power systems: A new case and its detection method
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 卷号: 41, 页码: 1590-1599
作者:
Du, Dajun[1]
;
Chen, Rui[2]
;
Li, Xue[3]
;
Wu, Lei[4]
;
Zhou, Peng[5]
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/04/22
Smart grid
bad data detection (BDD)
malicious data deception attack
optimal power flow
line overload risk
detection strategy
Adaptive state estimation for cyber physical systems under sparse attacks
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 卷号: 41, 页码: 1571-1579
作者:
Zhang, Hao[1]
;
Peng, Chen[2]
;
Sun, Hongtao[3]
;
Du, Dajun[4]
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/04/22
Cyber physical system (CPS)
sparse attacks
state estimation
optimization algorithm
variable step-size
Compact Neural Modeling of Single Flow Zinc-Nickel Batteries Based on Jaya Optimization
会议论文
2018 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2018-01-01
作者:
Zhang, Li[1]
;
Li, Kang[2]
;
Yang, Zhile[3]
;
Li, Xiang[4]
;
Guo, Yuanjun[5]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/22
A hybrid structure of an extreme learning machine combined with feature selection, signal decomposition and parameter optimization for short-term wind speed forecasting
期刊论文
Transactions of the Institute of Measurement and Control, 2018
作者:
Sun, Sizhou[1]
;
Fu, Jingqi[2]
;
Zhu, Feng[3]
;
Du, Dajun[4]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
Dynamic Hand Gesture Recognition Based on the Three-Dimensional Spatial Trajectory Feature and Hidden Markov Model
会议论文
1st International Conference on Intelligent Manufacturing and Internet of Things, IMIOT 2018 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, 2018-09-21
作者:
Liu, Kangli[1]
;
Zhou, Feixiang[2]
;
Wang, Haikuan[3]
;
Fei, Minrui[4]
;
Du, Dajun[5]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/04/22
Communication Network Planning with Dual Network Coupling Characteristics Under Active Distribution Network
会议论文
ADVANCES IN GREEN ENERGY SYSTEMS AND SMART GRID, PART III, 2018-01-01
作者:
Fu, Zhiqiang[1]
;
Li, Xue[2]
;
Du, Dajun[3]
;
Xu, Sheng[4]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
Communication networks
Power grid
Active distribution network
Topology stability
PSO algorithm
Stability analysis of token-based wireless networked control systems under deception attacks
期刊论文
INFORMATION SCIENCES, 2018, 卷号: 459, 页码: 168-182
作者:
Du, Dajun[1]
;
Zhang, Changda[2]
;
Wang, Haikuan[3]
;
Li, Xue[4]
;
Hu, Huosheng[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/04/22
Deception attacks
Token-based protocol
Kalman filter
Wireless networked control systems
Switched systems
Anomaly behavior detection and reliability assessment of control systems based on association rules
期刊论文
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 卷号: 22, 页码: 90-99
作者:
Jie, Xinchun[1]
;
Wang, Haikuan[2]
;
Fei, Minrui[3]
;
Du, Dajun[4]
;
Sun, Qing[5]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/22
Anomaly detection
Network intrusion
Association rules
Apriori algorithm
©版权所有 ©2017 CSpace - Powered by
CSpace