, BEIS, 2018.
Report on Deployment of Linky Smart Power Meters in the Area, pp.1-32, 2018. ,
, Guidelines for Smart Grid Cyber Security, vol.1, 2010.
Robust De-Anonymization of Large Sparse Datasets, Proc. -IEEE Symp. Secur. Priv, pp.111-125, 2008. ,
The Zettabyte Era: Trends and Analysis, Cisco Vis. Netw. Index, pp.1-29, 2015. ,
A Transprecision Floating-Point Architecture for Energy-Efficient Embedded Computing, Proc. -IEEE Int. Symp. Circuits Syst, 2018. ,
k-Anonymity: A Model for Preserving Privacy, Fuzziness Knowl-Based Syst, vol.10, issue.05, pp.557-570, 2002. ,
The Algorithmic Foundations of Differential Privacy, Found. Trends Theor. Comput. Sci, vol.9, issue.3-4, pp.211-487, 2013. ,
A Survey of Techniques for Approximate Computing, ACM Comput. Surv, vol.48, issue.4, pp.1-33, 2016. ,
The Transprecision Computing Paradigm: Concept, Design, and Applications, Des. Autom. Test Eur. Conf. Exhib, pp.1105-1110, 2018. ,
A Transprecision Floating-Point Platform for Ultra-Low Power Computing, Proc. 2018 Des. Autom. Test Eur. Conf. Exhib. DATE, pp.151-1056, 2018. ,
Efficient k-Anonymization Using Clustering Techniques, pp.188-200, 2007. ,
One-Dimensional Error-Diffusion Technique Adapted for Binarization of Rotationally Symmetric Pupil Filters, Opt. Commun, vol.114, issue.3-4, pp.211-218, 1995. ,
A Simple and Efficient Error-Diffusion Algorithm ,
Electricity System and Market in Japan, IT World, 2011. ,
Big Data Anonymization Method for Demand Response, Int. Conf. Internet Comput. Big Data, pp.76-82, 2014. ,