2018
DOI: 10.1007/978-3-319-89378-5_20
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud-Hosted Synchrophasor Data Sharing Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Additionally, high-quality PMU data should be sought for rarer event types, such as generator events. To supplement the limited number of these rarer, labeled events, a shared PMU data and event log database could be created by a federation of like-minded data providers to pool this valuable data, such as in [18]. Since a fully-deanonymized, shared database can represent a security concern, new techniques for 'semi-anonymization' could be explored that provide sufficient spatial information to permit unrestrained application of supervised and semi-supervised machine learning (circumventing challenge #3 in Table IV, and thereby also mitigating the impact of challenges #4 and #5) while continuing to preserve the anonymity of the data providers and concealing sensitive information such as network topology.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, high-quality PMU data should be sought for rarer event types, such as generator events. To supplement the limited number of these rarer, labeled events, a shared PMU data and event log database could be created by a federation of like-minded data providers to pool this valuable data, such as in [18]. Since a fully-deanonymized, shared database can represent a security concern, new techniques for 'semi-anonymization' could be explored that provide sufficient spatial information to permit unrestrained application of supervised and semi-supervised machine learning (circumventing challenge #3 in Table IV, and thereby also mitigating the impact of challenges #4 and #5) while continuing to preserve the anonymity of the data providers and concealing sensitive information such as network topology.…”
Section: Discussionmentioning
confidence: 99%