Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
Sensors (Switzerland)(3)
2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015 - Proceedings(1)
IEEE Access(1)
IEEE Transactions on Network Science and Engineering(1)
Área temáticas
Ciencias de la computación(6)
Criminología(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Red informática(3)
Aprendizaje automático(2)
Computación en la nube(1)
Simulación por computadora(1)
Origen
scopus(6)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusConvolution Based Feature Extraction for Edge Computing Access Authentication
ArticleAbstract: In this article, a convolutional neural network (CNN) enhanced radio frequency fingerprinting (RFF)Palabras claves:Access authentication, Convolution, Edge computing, Feature Extraction, radio frequency fingerprinting (RFF)Autores:Chen S., Hou W., Jiang Y., Jinsong Wu, Wen H., Xie F.Fuentes:scopusDeep-learning-based physical layer authentication for industrial wireless sensor networks
ArticleAbstract: In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposedPalabras claves:INDUSTRIAL, Light-weight authentication, neural network, PHY-layer, WSNAutores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Wen H., Xie F., Xu A.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopusThree-layers secure access control for cloud-based smart grids
Conference ObjectAbstract: Cloud computing is an Internet-based computing paradigm which may share resources to provide on-demaPalabras claves:Access Control, CLOUD COMPUTING, MHABE, smart GridAutores:Guan Z., Guo X., Jiang Y., Jinsong Wu, Meng J., Wen H., Xie Y., Xu A.Fuentes:scopus