Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
Wireless Communications and Mobile Computing(2)
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings(1)
IEEE International Conference on Communications(1)
IEEE Transactions on Network Science and Engineering(1)
Sensors (Switzerland)(1)
Área temáticas
Ciencias de la computación(4)
Funcionamiento de bibliotecas y archivos(2)
Comercio, comunicaciones, transporte(1)
Psicología diferencial y del desarrollo(1)
Área de conocimiento
Ciencias de la computación(5)
Algoritmo(1)
Comunicación(1)
Simulación por computadora(1)
Origen
scopus(6)
Constraint free preference preserving hashing for fast recommendation
Conference ObjectAbstract: Recommender systems have been widely used to deal with information overload, by suggesting relevantPalabras claves:Norm quantization, Optimal bit, Preference ranking, Recommender systemAutores:Jinsong Wu, Lian D., Wen H., Yang G., Zhang Y.Fuentes:scopusConvolution Based Feature Extraction for Edge Computing Access Authentication
ArticleAbstract: In this article, a convolutional neural network (CNN) enhanced radio frequency fingerprinting (RFF)Palabras claves:Access authentication, Convolution, Edge computing, Feature Extraction, radio frequency fingerprinting (RFF)Autores:Chen S., Hou W., Jiang Y., Jinsong Wu, Wen H., Xie F.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusDot-product based preference preserved hashing for fast collaborative filtering
Conference ObjectAbstract: Recommendation is widely used to deal with information overloading by suggesting items based on histPalabras claves:hash codes, Norm quantization, Preference ranking, Recommender systemAutores:Hu L., Jinsong Wu, Wen H., Yang G., Zhang Y.Fuentes:scopusPhysical-Layer Channel Authentication for 5G via Machine Learning Algorithm
ArticleAbstract: By utilizing the radio channel information to detect spoofing attacks, channel based physical layerPalabras claves:Autores:Chen J., Chen S., Chen Y., Hu L., Jinsong Wu, Liu W., Wen H.Fuentes:scopusThe Rayleigh Fading Channel Pbkp_rediction via Deep Learning
ArticleAbstract: This paper presents a multi-time channel pbkp_rediction system based on backpropagation (BP) neuralPalabras claves:Autores:Dong L., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H.Fuentes:scopus