Mostrando 10 resultados de: 22
Filtros aplicados
Publisher
IEEE Access(3)
Sensors (Switzerland)(3)
Wireless Communications and Mobile Computing(2)
2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015 - Proceedings(1)
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings(1)
Área temáticas
Ciencias de la computación(18)
Física aplicada(4)
Funcionamiento de bibliotecas y archivos(2)
Métodos informáticos especiales(2)
Comercio, comunicaciones, transporte(1)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusA cross-layer secure communication model based on discrete fractional fourier fransform (DFRFT)
ArticleAbstract: Discrete fractional Fourier transform (DFRFT) is a generalization of discrete Fourier transform. ThePalabras claves:crosslayer, DFRFT, physical layer security, security codeAutores:Ho P.H., Jinsong Wu, Lv S.C., Song H., Sun L.M., Tang J., Wen H., Wu B., Wu T.Fuentes:scopusConstraint free preference preserving hashing for fast recommendation
Conference ObjectAbstract: Recommender systems have been widely used to deal with information overload, by suggesting relevantPalabras claves:Norm quantization, Optimal bit, Preference ranking, Recommender systemAutores:Jinsong Wu, Lian D., Wen H., Yang G., Zhang Y.Fuentes:scopusConvolution Based Feature Extraction for Edge Computing Access Authentication
ArticleAbstract: In this article, a convolutional neural network (CNN) enhanced radio frequency fingerprinting (RFF)Palabras claves:Access authentication, Convolution, Edge computing, Feature Extraction, radio frequency fingerprinting (RFF)Autores:Chen S., Hou W., Jiang Y., Jinsong Wu, Wen H., Xie F.Fuentes:scopusCross-Networks Energy Efficiency Tradeoff: From Wired Networks to Wireless Networks
ArticleAbstract: The tremendously large number of increasing Internet protocol (IP) packets call for quality of serviPalabras claves:5G, Cross-networks energy efficiency, Traffic matrix decomposition, wavelength division multiplexing (WDM)Autores:Fu S., Jinsong Wu, Wen H., Wu B.Fuentes:scopusData Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration
ArticleAbstract: Radio frequency fingerprinting (RFF) is a lightweight access authentication method for the mobile tePalabras claves:data augmentation, radio frequency fingerprinting, random integration, signal classification, SVMAutores:Hou W., Jiang Y., Jinsong Wu, Liao R.F., Song H., Wen H., Xie F., Zhang T.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusArtificial Intelligence Based Traffic Control for Edge Computing Assisted Vehicle Networks
ArticleAbstract: Edge computing supported vehicle networks have attracted considerable attention in recent years bothPalabras claves:artificial intelligence (AI), Edge computing, Real-time responses, traffic control, Vehicle networksAutores:Chen S., Jinsong Wu, Wen H.Fuentes:scopusEnergy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism
ArticleAbstract: The coordinated multiple-point (CoMP) transmission technique recently has been considered as an effiPalabras claves:Coordinated multiple point (CoMP), frequency diversity, interference coordination, pricing power game (PG)Autores:Fu S., Jinsong Wu, Wen H., Wu B.Fuentes:scopusDot-product based preference preserved hashing for fast collaborative filtering
Conference ObjectAbstract: Recommendation is widely used to deal with information overloading by suggesting items based on histPalabras claves:hash codes, Norm quantization, Preference ranking, Recommender systemAutores:Hu L., Jinsong Wu, Wen H., Yang G., Zhang Y.Fuentes:scopus