AI-assisted authentication: state of the art, taxonomy and future roadmap
G Zhu, Y Al-Qaraghuli - arXiv preprint arXiv:2204.12492, 2022 - arxiv.org
Artificial Intelligence (AI) has found its applications in a variety of environments ranging from
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …
Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT
T Jing, H Huang, Q Gao, Y Wu, Y Huo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the context of the industrial Internet of Things (IIoT), communication devices are typically
mobile, increasing the complexity and diversity of channels due to metal device occlusion. A …
mobile, increasing the complexity and diversity of channels due to metal device occlusion. A …
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT
Compared with upper layer authentication, physical layer authentication (PLA) is essential in
unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and …
unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and …
[Retracted] The Design of a Dual Servo Drive and Control Integrated Platform Based on VNet Neural Network
Z Huiling - Security and Communication Networks, 2022 - Wiley Online Library
A dual‐servo drive and control integrated platform based on VNet neural network
development is aimed to address the concerns of poor realization function, operational …
development is aimed to address the concerns of poor realization function, operational …
Security authentication based on multimodal feature fusion and BO-BiLSTM
Y Wang, Y Wu - Proceedings of the 2024 3rd International Conference …, 2024 - dl.acm.org
Traditional physical layer security authentication methods often face unstable performance
and malicious attacks when dealing with complex dynamic environments, resulting in high …
and malicious attacks when dealing with complex dynamic environments, resulting in high …