4.7 Article

A Lightweight, Secure Authentication Model for the Smart Agricultural Internet of Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Privacy protection against attack scenario of federated learning using internet of things

Kusum Yadav et al.

Summary: This article focuses on the technical advantages, attack methods and classifications, as well as the distinctions between different encryption algorithms of federated learning. It also reviews the research on privacy protection and security mechanisms in federated learning, and identifies difficulties and opportunities.

ENTERPRISE INFORMATION SYSTEMS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

A ConvNet for the 2020s

Zhuang Liu et al.

Summary: The development of visual recognition has gone through stages from ConvNets to ViTs and then to hybrid approaches. In this work, the design of a pure ConvNet is reexamined and several key components are discovered, resulting in the construction of the ConvNeXt model series. These models compete with Transformers in terms of accuracy and performance while maintaining the simplicity and efficiency of ConvNets.

2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

A Deep Learning Sequential-based Model for Predicting Victories in Video Games

Francoise Blanc et al.

Summary: This paper proposes an approach that uses sequential dataset from game logs to predict victories using deep neural networks. Among six different implemented networks, a Simplified Fully Convolutional Network model achieved the best performance with an AUC score of 0.8447. Although it did not surpass the performance of the best challenge models, this approach has two significant advantages: limited need for feature engineering and greater adaptability and generalization to other video games. Furthermore, when considering only one feature (HP), our approach outperforms the best challenge model with an AUC score of 0.802.

2022 IEEE 23RD INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2022) (2022)

Article Computer Science, Information Systems

IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning

Dania Marabissi et al.

Summary: This paper discusses the use of physical layer security in future wireless systems as a means of communication security, with a focus on node authentication and spoofing detection in wireless sensor networks. Through machine learning and wireless fingerprinting, nodes can be effectively classified and verified for identity, improving the security performance of the system.

FUTURE INTERNET (2022)

Article Engineering, Electrical & Electronic

Construction of a Wireless Sensing Network System for Leisure Agriculture for Cloud-Based Agricultural Internet of Things

Yao Shen

Summary: This paper provides an in-depth study and analysis of constructing a cloud-based agricultural Internet of Things system and introducing IoT technology into traditional leisure agriculture, aiming to enhance the attractiveness of leisure agriculture and urban residents' interest in it. By utilizing mature agricultural sensor technology and software architecture, high-speed cloud storage and transmission of massive data are achieved, enabling the system to meet the needs of various mobile terminals.

JOURNAL OF SENSORS (2021)

Proceedings Paper Automation & Control Systems

Study on Wireless Signal Propagation in Residential Outdoor Activity Area Based on Deep Learning

Sunying Hu et al.

Summary: This paper proposes a wireless signal propagation model based on deep learning neural network for evaluating signal propagation characteristics in complex outdoor activity areas. The model efficiently predicts signal characteristics, providing valuable insights for future wireless network deployment and optimization.

2021 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND ROBOTICS (ICCCR 2021) (2021)

Article Computer Science, Interdisciplinary Applications

Exploring the intellectual cores of the blockchain-Internet of Things (BIoT)

Y. P. Tsang et al.

Summary: This study examines the intellectual core of BIoT using a co-citation proximity analysis-based systematic review, identifying nine categories within the core and providing a structural framework for further research in this underexplored area.

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2021)

Article Computer Science, Information Systems

Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

Run-Fa Liao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Geochemistry & Geophysics

Deep Convolutional Neural Network for Microseismic Signal Detection and Classification

Hang Zhang et al.

PURE AND APPLIED GEOPHYSICS (2020)

Article Engineering, Electrical & Electronic

PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

Kun-Lin Tsai et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs

Subir Biswas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)