Mostrando 7 resultados de: 7
Publisher
Sensors (Switzerland)(3)
IEEE Access(2)
2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015 - Proceedings(1)
2019 IEEE Globecom Workshops, GC Wkshps 2019 - Proceedings(1)
Área temáticas
Ciencias de la computación(7)
Criminología(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(5)
Computación en la nube(3)
Red informática(3)
Energía(2)
Aprendizaje automático(1)
Origen
scopus(7)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusEfficiency and security for edge computing assisted smart grids
Conference ObjectAbstract: Due to the prospects for development the ubiquitous power Internet of things (IoT), the edge computiPalabras claves:Edge computing, EFFICIENCY, security, smart GridAutores:Hou W., Jiang Y., Jinsong Wu, Wen H., Xu A., Zhang Y., Zheng Y.Fuentes:scopusInternet of Things Based Smart Grids Supported by Intelligent Edge Computing
ArticleAbstract: In this paper, an edge computing system for IoT-based (Internet of Things) smart grids is proposed tPalabras claves:Artificial Intelligence, CLOUD COMPUTING, data pbkp_rediction, data privacy protection, Edge computing, IoT-based smart gridsAutores:Chen S., Hou W., Jiang Y., Jinsong Wu, Lei W., Liu W., Wen H., Xu A.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopusThree-layers secure access control for cloud-based smart grids
Conference ObjectAbstract: Cloud computing is an Internet-based computing paradigm which may share resources to provide on-demaPalabras claves:Access Control, CLOUD COMPUTING, MHABE, smart GridAutores:Guan Z., Guo X., Jiang Y., Jinsong Wu, Meng J., Wen H., Xie Y., Xu A.Fuentes:scopus