Mostrando 10 resultados de: 13
Filtros aplicados
Publisher
Sensors (Switzerland)(3)
2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015 - Proceedings(1)
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings(1)
Applied Sciences (Switzerland)(1)
IEEE Access(1)
Área temáticas
Ciencias de la computación(10)
Funcionamiento de bibliotecas y archivos(2)
Física aplicada(2)
Comercio, comunicaciones, transporte(1)
Comunidades(1)
Área de conocimiento
Aprendizaje automático(5)
Red informática(5)
Algoritmo(1)
Computación en la nube(1)
Inteligencia artificial(1)
Origen
scopus(13)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusConstraint free preference preserving hashing for fast recommendation
Conference ObjectAbstract: Recommender systems have been widely used to deal with information overload, by suggesting relevantPalabras claves:Norm quantization, Optimal bit, Preference ranking, Recommender systemAutores:Jinsong Wu, Lian D., Wen H., Yang G., Zhang Y.Fuentes:scopusConvolution Based Feature Extraction for Edge Computing Access Authentication
ArticleAbstract: In this article, a convolutional neural network (CNN) enhanced radio frequency fingerprinting (RFF)Palabras claves:Access authentication, Convolution, Edge computing, Feature Extraction, radio frequency fingerprinting (RFF)Autores:Chen S., Hou W., Jiang Y., Jinsong Wu, Wen H., Xie F.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusDot-product based preference preserved hashing for fast collaborative filtering
Conference ObjectAbstract: Recommendation is widely used to deal with information overloading by suggesting items based on histPalabras claves:hash codes, Norm quantization, Preference ranking, Recommender systemAutores:Hu L., Jinsong Wu, Wen H., Yang G., Zhang Y.Fuentes:scopusIncentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things
ArticleAbstract: Residing in the proximity of end devices, edge computing (EC) holds great potential to provide low-lPalabras claves:collaborative computing, edge computing (EC), Industrial Internet of Things (IIoT), online incentiveAutores:Hou W., Jinsong Wu, Lei W., Wen H., Zhang N., Zhao R.Fuentes:scopusMADDPG-based security situational awareness for smart grid with intelligent edge
ArticleAbstract: Advanced communication and information technologies enable smart grids to be more intelligent and auPalabras claves:Deep reinforcement learning, Edge computing, Multi-agent DDPG, Situational awareness, smart GridAutores:Hou W., Jinsong Wu, Lei W., Wen H.Fuentes:scopusPhysical-Layer Channel Authentication for 5G via Machine Learning Algorithm
ArticleAbstract: By utilizing the radio channel information to detect spoofing attacks, channel based physical layerPalabras claves:Autores:Chen J., Chen S., Chen Y., Hu L., Jinsong Wu, Liu W., Wen H.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopus