An overview of non-intrusive load monitoring: Approaches, business applications, and challenges

M Zhuang, M Shahidehpour, Z Li - … international conference on …, 2018 - ieeexplore.ieee.org
Load Monitoring (LM) is a fundamental step to implement effective energy management
schemes. LM includes Intrusive LM (ILM) and Non-Intrusive LM (NILM). Compared with …

Web phishing detection using a deep learning framework

P Yi, Y Guan, F Zou, Y Yao, W Wang… - … and Mobile Computing, 2018 - Wiley Online Library
Web service is one of the key communications software services for the Internet. Web
phishing is one of many security threats to web services on the Internet. Web phishing aims …

Appliance level energy characterization of residential electricity demand: prospects, challenges and recommendations

R Liaqat, IA Sajjad, M Waseem, HH Alhelou - Ieee Access, 2021 - ieeexplore.ieee.org
The advent of information and communication technologies has paved the way for smart
cities. Residential customers are the major consumers of electrical energy in such cities …

Privacy-preserving energy storage sharing with blockchain

N Wang, SCK Chau, Y Zhou - Proceedings of the Twelfth ACM …, 2021 - dl.acm.org
Energy storage provides an effective way of shifting temporal energy demands and supplies,
enabling significant cost reduction under dynamic energy pricing. Despite its promising …

A complementary unsupervised load disaggregation method for residential loads at very low sampling rate data

MM Eskander, CA Silva - Sustainable Energy Technologies and …, 2021 - Elsevier
In this paper, low-resolution smart metering data analysis is applied to breakdown the load
consumption for household appliances to facilitate the deployment of residential energy …

Countering cross-technology jamming attack

Z Chi, Y Li, X Liu, W Wang, Y Yao, T Zhu… - Proceedings of the 13th …, 2020 - dl.acm.org
Internet-of-things (IoT) devices are sharing the radio frequency band (eg, 2.4 GHz ISM
band). The exponentially increasing number of IoT devices introduces potential security …

Aegis: An interference-negligible RF sensing shield

Y Yao, Y Li, X Liu, Z Chi, W Wang… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Researchers have demonstrated the feasibility of detecting human motion behind the wall
with radio frequency (RF) sensing techniques. With these techniques, an eavesdropper can …

MORED: A moroccan buildings' electricity consumption dataset

MA Ahajjam, D Bonilla Licea, C Essayeh, M Ghogho… - Energies, 2020 - mdpi.com
This paper consists of two parts: an overview of existing open datasets of electricity
consumption and a description of the Moroccan Buildings' Electricity Consumption Dataset …

AutoShare: Virtual community solar and storage for energy sharing

S Lee, P Shenoy, K Ramamritham, D Irwin - Energy Informatics, 2021 - Springer
Residential solar installations are becoming increasingly popular among homeowners.
However, renters and homeowners living in shared buildings cannot go solar as they do not …

A Secured Protocol for IoT Devices in Tactical Networks

W Wang, Z Chi, X Liu, AV Bhaskar… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Nowadays, Internet-of-Things (IoT) have shown great potential to improve the performance
of different applications. However, the advances of IoT also make the security issue become …