A method for identifying malicious nodes in edge computing
A malicious node and identification method technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems that affect identification accuracy, low identification accuracy, and time-consuming
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the technical solution of the present invention will be further described in detail below in conjunction with the channel frequency response based on deep neural network to identify malicious nodes, but the scope of protection of the present invention is not limited to the following .
[0024] Such as figure 1 As shown, deep neural networks have excellent fitting and classification capabilities, so using deep neural networks for malicious node identification has good performance. However, when the data set is relatively small, the deep neural network has its limitations, and the time correlation requirements for wireless channel information, or some other restrictive requirements, cannot obtain a relatively large channel sample set. Well, in cases where it is important to obtain a sufficient dataset from collecting channel responses within the relevant tim...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


