Picture for Yinzhi Lu

Yinzhi Lu

Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks

Add code
Oct 14, 2022
Figure 1 for Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
Figure 2 for Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
Figure 3 for Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
Figure 4 for Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
Viaarxiv icon

Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks

Add code
Aug 02, 2022
Figure 1 for Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks
Figure 2 for Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks
Figure 3 for Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks
Figure 4 for Generative Adversarial Learning for Intelligent Trust Management in 6G Wireless Networks
Viaarxiv icon

An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks

Add code
Jul 21, 2022
Figure 1 for An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
Figure 2 for An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
Figure 3 for An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
Figure 4 for An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
Viaarxiv icon

A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks

Add code
Jul 20, 2022
Figure 1 for A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
Figure 2 for A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
Figure 3 for A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
Figure 4 for A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
Viaarxiv icon

An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things

Add code
Jul 19, 2022
Figure 1 for An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things
Figure 2 for An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things
Figure 3 for An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things
Figure 4 for An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things
Viaarxiv icon

An Intelligent Deterministic Scheduling Method for Ultra-Low Latency Communication in Edge Enabled Industrial Internet of Things

Add code
Jul 17, 2022
Figure 1 for An Intelligent Deterministic Scheduling Method for Ultra-Low Latency Communication in Edge Enabled Industrial Internet of Things
Figure 2 for An Intelligent Deterministic Scheduling Method for Ultra-Low Latency Communication in Edge Enabled Industrial Internet of Things
Figure 3 for An Intelligent Deterministic Scheduling Method for Ultra-Low Latency Communication in Edge Enabled Industrial Internet of Things
Figure 4 for An Intelligent Deterministic Scheduling Method for Ultra-Low Latency Communication in Edge Enabled Industrial Internet of Things
Viaarxiv icon