Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
Sensors (Switzerland)(2)
IEEE Access(1)
IEEE Internet of Things Journal(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Área temáticas
Ciencias de la computación(4)
Comunidades(1)
Criminología(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(5)
Origen
scopus(5)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusIncentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things
ArticleAbstract: Residing in the proximity of end devices, edge computing (EC) holds great potential to provide low-lPalabras claves:collaborative computing, edge computing (EC), Industrial Internet of Things (IIoT), online incentiveAutores:Hou W., Jinsong Wu, Lei W., Wen H., Zhang N., Zhao R.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopusRumor spreading and security monitoring in complex networks
Conference ObjectAbstract: Rumor spreading is a typical phenomenon which poses security threats. Therefore, it is necessary toPalabras claves:complex networks, Monitoring, Rumor spreading, Topological PotentialAutores:Han Q., Jinsong Wu, Ren M., Wen H.Fuentes:scopus