Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
Sensors (Switzerland)(3)
IEEE Access(2)
2019 IEEE Globecom Workshops, GC Wkshps 2019 - Proceedings(1)
Área temáticas
Ciencias de la computación(6)
Criminología(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(4)
Red informática(3)
Computación en la nube(2)
Energía(2)
Aprendizaje automático(1)
Origen
scopus(6)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusEfficiency and security for edge computing assisted smart grids
Conference ObjectAbstract: Due to the prospects for development the ubiquitous power Internet of things (IoT), the edge computiPalabras claves:Edge computing, EFFICIENCY, security, smart GridAutores:Hou W., Jiang Y., Jinsong Wu, Wen H., Xu A., Zhang Y., Zheng Y.Fuentes:scopusInternet of Things Based Smart Grids Supported by Intelligent Edge Computing
ArticleAbstract: In this paper, an edge computing system for IoT-based (Internet of Things) smart grids is proposed tPalabras claves:Artificial Intelligence, CLOUD COMPUTING, data pbkp_rediction, data privacy protection, Edge computing, IoT-based smart gridsAutores:Chen S., Hou W., Jiang Y., Jinsong Wu, Lei W., Liu W., Wen H., Xu A.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopus