Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Lightweight Convolutional Neural Network with Squeeze and Excitation Module for Security Authentication Using Wireless Channel

    Xiaoying Qiu1,*, Xiaoyu Ma1, Guangxu Zhao1, Jinwei Yu2, Wenbao Jiang1, Zhaozhong Guo1, Maozhi Xu3

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2025-2040, 2025, DOI:10.32604/cmc.2025.061869 - 16 April 2025

    Abstract Physical layer authentication (PLA) in the context of the Internet of Things (IoT) has gained significant attention. Compared with traditional encryption and blockchain technologies, PLA provides a more computationally efficient alternative to exploiting the properties of the wireless medium itself. Some existing PLA solutions rely on static mechanisms, which are insufficient to address the authentication challenges in fifth generation (5G) and beyond wireless networks. Additionally, with the massive increase in mobile device access, the communication security of the IoT is vulnerable to spoofing attacks. To overcome the above challenges, this paper proposes a lightweight deep More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643 - 01 March 2021

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need… More >

  • Open Access

    ARTICLE

    An Incremental Kriging Method for Sequential Optimal Experimental Design

    Yaohui Li1,2, Yizhong Wu1,3, Zhengdong Huang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.97, No.4, pp. 323-357, 2014, DOI:10.3970/cmes.2014.097.323

    Abstract Kriging model, which provides an exact interpolation and minimizes the error estimates, is a highly-precise global approximation model in contrast with other traditional response surfaces. Therefore, sequential exploratory experimental design (SEED) with Kriging model is crucial for globally approximating a complex black-box function. However, the more sampling points are, the longer time it would take to update the Kriging model during sequential exploratory design. This paper, therefore, proposes a new construction method called incremental Kriging method (IKM) to improve the constructing efficiency with just a little and controllable loss of accuracy for Kriging model. The… More >

Displaying 1-10 on page 1 of 3. Per Page