INTELLIGENT METER DATA PROTECTION VIA DIFFERENTIAL PRIVACY AND TOP-K QUERY ALGORITHM

Peiyu Chen, Zhaohui Hu, Qianjun Tu

View Full Paper

References

  1. [1] M. Irfan, A. Niaz, M. Q. Habib, M. U. Shoukat, S. H. Atta, andA. Ali, “Digital Twin Concept, Method and Technical Frame-work for Smart Meters,” European Journal of Theoretical andApplied Sciences, vol. 1, no. 3, pp. 105–117, 2023.
  2. [2] S. Zidi, A. Mihoub, S. M. Qaisar, M. Krichen, and Q. A. Al-Haija, “Theft detection dataset for benchmarking and machinelearning based classification in a smart grid environment,” Jour-nal of King Saud University-Computer and Information Sci-ences, vol. 35, no. 1, pp. 13–25, 2023.
  3. [3] C. Chen, “Regional differences and spatial correlation networkcharacteristics of power consumption in China under dual-carbon targets,” Pollution and Environment, vol. 7, no. 1,pp. 10–14, 2023.
  4. [4] X. Li, M. Zhuang, W. Yang, X. Zhu, and Q. Wang, “Neural Net-work Based Data Quality Monitoring and Real-Time AnalysisMethod for Energy Storage Power Plants,” International Jour-nal of Power and Energy Systems, vol. 44, no. 10, pp. 1–15,2024.
  5. [5] B. Ning, X. Zhang, S. Gao, and G. Li, “Dp-agm: a differen-tial privacy preserving method for binary relationship in mobilenetworks,” Mobile Networks and Applications, vol. 28, no. 5,pp. 1597–1616, 2023.
  6. [6] C. Xu, P. Zhang, L. Mei, Y. Zhao, and L. Xu, “Ranked search-able encryption based on differential privacy and blockchain,”Wireless Networks, vol. 30, no. 6, pp. 4735–4748, 2024.
  7. [7] X. Sun, Q. Ye, H. Hu, et al., “Synthesizing realistic trajectorydata with differential privacy,” IEEE Transactions on Intel-ligent Transportation Systems, vol. 24, no. 5, pp. 5502–5515,2023.
  8. [8] R. Hu, Y. Guo, and Y. Gong, “Federated learning with sparsi-fied model perturbation: Improving accuracy under client-leveldifferential privacy,” IEEE Transactions on Mobile Computing,vol. 23, no. 8, pp. 8242–8255, 2023.
  9. [9] M. Zhang, E. Wei, R. Berry, and J. Huang, “Age-dependent dif-ferential privacy,” IEEE Transactions on Information Theory,vol. 70, no. 2, pp. 1300–1319, 2023.
  10. [10] L. Huang, J. Wu, D. Shi, S. Dey, and L. Shi, “Differential pri-vacy in distributed optimization with gradient tracking,” IEEETransactions on Automatic Control, vol. 69, no. 9, pp. 5727–5742, 2024.
  11. [11] Y. Zhu, Q. Song, and Y. Luo, “Differentially Private Top-kFlows Estimation Mechanism in Network Traffic,” IEEE Trans-actions on Network Science and Engineering, vol. 11, no. 3,pp. 2462–2472, 2023.9
  12. [12] D. Xu, C. Peng, W. Wang, H. Liu, S. A. Shaikh, andY. Tian, “Privacy-preserving dynamic multi-keyword rankedsearch scheme in multi-user settings,” IEEE Transactions onConsumer Electronics, vol. 69, no. 4, pp. 890–901, 2023.
  13. [13] B. C. Kara and C. Ey¨upo˘glu, “A New Privacy-Preserving DataPublishing Algorithm Utilizing Connectivity-Based Outlier Fac-tor and Mondrian Techniques,” Computers, Materials & Con-tinua, vol. 76, no. 2, pp. 1515–1535, 2023.
  14. [14] X. Li, H. Zhao, J. Xu, G. Zhu, and W. Deng, “APDPFL:Anti-poisoning attack decentralized privacy enhanced federatedlearning scheme for flight operation data sharing,” IEEE Trans-actions on Wireless Communications, vol. 23, no. 12, pp. 19098–19109, 2024.
  15. [15] D. Guo, S. Zhang, J. Zhang, B. Yang, and Y. Lin, “Ex-ploring Contextual Knowledge-Enhanced Speech Recognition inAir Traffic Control Communication: A Comparative Study,”IEEE Transactions on Neural Networks and Learning Systems,vol. 35, no. 9, pp. 16085–16099, 2025.
  16. [16] R. Yan, Y. Zheng, N. Yu, and C. Liang, “Multi-smart meter dataencryption scheme based on distributed differential privacy,”Big Data Mining and Analytics, vol. 7, no. 1, pp. 131–141, 2023.
  17. [17] D. Singhal, L. Ahuja, and A. Seth, “POSMETER: proof-of-stake blockchain for enhanced smart meter data security,” In-ternational Journal of Information Technology, vol. 16, no. 2,pp. 1171–1184, 2024.
  18. [18] X. Wang, H. Xie, L. Tang, C. Chen, and Z. Bie, “Decentral-ized privacy-preserving electricity theft detection for distribu-tion system operators,” IEEE Transactions on Smart Grid,vol. 15, no. 2, pp. 2179–2190, 2023.
  19. [19] A. K. Singh and J. Kumar, “A secure and privacy-preservingdata aggregation and classification model for smart grid,” Mul-timedia Tools and Applications, vol. 82, no. 15, pp. 22997–23015,2023.
  20. [20] B. Ouvrard, R. Pr´eget, A. Reynaud, and L. Tuffery, “Nudgingand subsidising farmers to foster smart water meter adoption,”European Review of Agricultural Economics, vol. 50, no. 3,pp. 1178–1226, 2023.
  21. [21] Z. Ju and Y. Li, “V2V-ESP: Vehicle-to-Vehicle Energy SharingPrivacy Protection Scheme Based on SDP Algorithm,” IEEETransactions on Network Science and Engineering, vol. 11,no. 1, pp. 1093–1105, 2023.
  22. [22] P. Zhao, Z. Yang, and G. Zhang, “Personalized and DifferentialPrivacy-Aware Video Stream Offloading in Mobile Edge Com-puting,” IEEE Transactions on Cloud Computing, vol. 12, no. 1,pp. 347–358, 2024.
  23. [23] Y. Buchana, “Identifying Clusters of Innovation Barriersin Farming Enterprises: A K-modes Clustering Approach,”Agrekon, vol. 64, no. 1, pp. 32–49, 2025.
  24. [24] S. Souror, M. Badawy, and N. El-Fishawy, “Secure Query Pro-cessing for Smart Grid Data Using Searchable Symmetric En-cryption,” The Journal of Supercomputing, vol. 80, no. 16,pp. 24173–24211, 2024.
  25. [25] G. Zhao, J. Tan, and N. Sun, “Research on key technology ofcondition monitoring system of substation equipment,” Inter-national Journal of Power and Energy Systems, vol. 45, no. 10,2025.
  26. [26] M. Rezaali, R. Fouladi-Fard, and A. Karimi, “Performance ofTANN, NARX, and GMDHT Models for Urban Water DemandForecasting: A Case Study in a Residential Complex in Qom,Iran,” Avicenna Journal of Environmental Health Engineering,vol. 10, no. 2, pp. 85–97, 2023.
  27. [27] J. Li, Y. Peng, Z. Yang, et al., “Virtual power plant economicdispatch model based on parallel molecular differential evolu-tion algorithm,” International Journal of Power and EnergySystems, vol. 45, no. 2, pp. 64–77, 2025.
  28. [28] B. C. Kara, C. Eyupoglu, and O. Karakus, “(r, k, ε)-Anonymization: Privacy-Preserving Data Publishing AlgorithmBased on Multi-Dimensional Outlier Detection, k-Anonymityand ε-Differential Privacy,” IEEE Access, vol. 15, no. 13,pp. 70422–70435, 2025.

Important Links:

Go Back