Mostrando 6 resultados de: 6
Subtipo de publicación
Article(6)
Publisher
Sensors (Switzerland)(2)
IEEE Access(1)
IEEE Transactions on Emerging Topics in Computational Intelligence(1)
IEEE Transactions on Emerging Topics in Computing(1)
Wireless Communications and Mobile Computing(1)
Área temáticas
Ciencias de la computación(6)
Criminología(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(3)
Red informática(3)
Comunicación(2)
Algoritmo(1)
Aprendizaje automático(1)
Origen
scopus(6)
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
ArticleAbstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcomePalabras claves:channel state information, Clustering, Edge computing, Lightweight authentication, Lightweight cipher, Physical-layer authenticationAutores:Chen Y., Jiang Y., Jinsong Wu, Song H., Wang Z., Wen H., Xu A., Zhang T.Fuentes:scopusA cross-layer secure communication model based on discrete fractional fourier fransform (DFRFT)
ArticleAbstract: Discrete fractional Fourier transform (DFRFT) is a generalization of discrete Fourier transform. ThePalabras claves:crosslayer, DFRFT, physical layer security, security codeAutores:Ho P.H., Jinsong Wu, Lv S.C., Song H., Sun L.M., Tang J., Wen H., Wu B., Wu T.Fuentes:scopusData Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration
ArticleAbstract: Radio frequency fingerprinting (RFF) is a lightweight access authentication method for the mobile tePalabras claves:data augmentation, radio frequency fingerprinting, random integration, signal classification, SVMAutores:Hou W., Jiang Y., Jinsong Wu, Liao R.F., Song H., Wen H., Xie F., Zhang T.Fuentes:scopusSecurity enhancement for mobile edge computing through physical layer authentication
ArticleAbstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of thiPalabras claves:Deep neural network (DNN), Mobile edge computing (MEC), multi-user, PHY-layer authentication, The Internet of things (IoT)Autores:Cao M., Jiang Y., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H., Xie F., Xu A.Fuentes:scopusRadio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
ArticleAbstract: In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combPalabras claves:authentication, IOT, Mobile edge computing, RF FingerprintingAutores:Chen S., Chen Y., Jiang Y., Jinsong Wu, Song H., Wen H., Xu A.Fuentes:scopusThe Rayleigh Fading Channel Pbkp_rediction via Deep Learning
ArticleAbstract: This paper presents a multi-time channel pbkp_rediction system based on backpropagation (BP) neuralPalabras claves:Autores:Dong L., Jinsong Wu, Liao R.F., Pan F., Song H., Wen H.Fuentes:scopus