Journal on Communications ›› 2023, Vol. 44 ›› Issue (11): 151-160.doi: 10.11959/j.issn.1000-436x.2023229
• Papers • Previous Articles
Chengzhe LAI1, Xinwei ZHANG1, Guanjie LI2, Dong ZHENG1
Revised:
2023-09-13
Online:
2023-11-01
Published:
2023-11-01
Supported by:
CLC Number:
Chengzhe LAI, Xinwei ZHANG, Guanjie LI, Dong ZHENG. CNN-based continuous authentication scheme for vehicular digital twin[J]. Journal on Communications, 2023, 44(11): 151-160.
[1] | LAI C Z , MA Y X , LU R X ,et al. A novel authentication scheme supporting multiple user access for 5G and beyond[J]. IEEE Transactions on Dependable and Secure Computing, 2023,20(4): 2970-2987. |
[2] | ZHANG Y H , DENG R H , BERTINO E ,et al. Robust and universal seamless handover authentication in 5G HetNets[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 858-874. |
[3] | FAN C N , HUANG J J , ZHONG M Z ,et al. ReHand:secure region-based fast handover with user anonymity for small cell networks in mobile communications[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 927-942. |
[4] | LI G J , LAI C Z , LU R X ,et al. SecCDV:a security reference architecture for cybertwin-driven 6G V2X[J]. IEEE Transactions on Vehicular Technology, 2022,71(5): 4535-4550. |
[5] | LAI C Z , WANG M H , ZHENG D . SPDT:secure and privacy-preserving scheme for digital twin-based traffic control[C]// Proceedings of IEEE/CIC International Conference on Communications in China (ICCC). Piscataway:IEEE Press, 2022: 144-149. |
[6] | GONZALEZ-MANZANO L , FUENTES J M D , RIBAGORDA A . Leveraging user-related Internet of things for continuous authentication:a survey[J]. ACM Computing Surveys, 2020,52(3): 1-38. |
[7] | MEKRUKSAVANICH S , JITPATTANAKUL A . Deep learning approaches for continuous authentication based on activity patterns using mobile sensing[J]. Sensors, 2021,21(22): 7519. |
[8] | KUMAR A , SAHU S , ROHIT R . Deep learning-based continuous authentication for an IoT-enabled healthcare service[J]. Computers and Electrical Engineering, 2022,99:107817. |
[9] | MA N N , ZHANG X Y , ZHENG H T ,et al. ShuffleNetV2:practical guidelines for efficient CNN architecture design[M]. Cham: Springer International Publishing, 2018. |
[10] | SANCHEZ P M S , MAINO L F , CELDRAN A H ,et al. AuthCODE:a privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning[J]. Computers & Security, 2021,103:102168. |
[11] | JAMES J C , RAJASREE M S . Implicit continuous user authentication for mobile devices based on deep reinforcement learning[J]. Computer Systems Science and Engineering, 2023,44(2): 1357-1372. |
[12] | ABUHAMAD M , ABUHMED T , MOHAISEN D ,et al. AUToSen:deep-learning-based implicit continuous authentication using smartphone sensors[J]. IEEE Internet of Things Journal, 2020,7(6): 5008-5020. |
[13] | NAJI Z , BOUZIDI D . Deep learning approach for a dynamic swipe gestures based continuous authentication[C]// Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV2023). Piscataway:IEEE Press, 2023: 48-57. |
[14] | CHAUHAN J , KWON Y D , HUI P ,et al. ContAuth:continual learning framework for behavioral-based user authentication[C]// Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies. New York:ACM Press, 2020: 1-23. |
[15] | WU C , HE K , CHEN J ,et al. Liveness is not enough:enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks[C]// Proceedings of the 29th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2020: 2219-2236. |
[16] | LUAN T H , LIU R , GAO L ,et al. The paradigm of digital twin communications[J]. arXiv Preprint,arXiv:2105.07182, 2021. |
[17] | HE C , LUAN T H , LU R X ,et al. Security and privacy in vehicular digital twin networks:challenges and solutions[J]. IEEE Wireless Communications, 2023,30(4): 154-160. |
[18] | ZHANG X Y , ZHOU X Y , LIN M X ,et al. ShuffleNet:an extremely efficient convolutional neural network for mobile devices[C]// Proceedings of IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 6848-6856. |
[19] | WOLD S , ESBENSEN K , GELADI P . Principal component analysis[J]. Chemometrics and Intelligent Laboratory Systems, 1987,2(1-3): 37-52. |
[20] | SHEN C , LI Y X , CHEN Y F ,et al. Performance analysis of multi-motion sensor behavior for active smartphone authentication[J]. IEEE Transactions on Information Forensics and Security, 2018,13(1): 48-62. |
[21] | SHEN C , LI Y P , YU T W ,et al. Motion-senor behavior analysis for continuous authentication on smartphones[C]// Proceedings of 12th World Congress on Intelligent Control and Automation (WCICA). Piscataway:IEEE Press, 2016: 2023-2028. |
[22] | SENF A , CHEN X W , ZHANG A . Comparison of one-class SVM and two-class SVM for fold recognition[C]// Proceedings of International Conference on Neural Information Processing. Berilin:Springer, 2006: 140-149. |
[23] | KOUTSOS A . The 5G-AKA authentication protocol privacy[C]// Proceedings of IEEE European Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 464-479. |
[24] | SZEGEDY C , LIU W , JIA Y Q ,et al. Going deeper with convolutions[C]// Proceedings of Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2015: 1-9. |
[25] | HUANG G , LIU Z , MAATEN L V D ,et al. Densely connected convolutional networks[C]// Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2017: 2261-2269. |
[1] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[2] | Fan ZHANG, Yun HUANG, Zizhuo FANG, Wei GUO. Lost-minimum post-training parameter quantization method for convolutional neural network [J]. Journal on Communications, 2022, 43(4): 114-122. |
[3] | Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG. Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN [J]. Journal on Communications, 2022, 43(3): 172-179. |
[4] | Hongyan WANG, Libin ZHANG, Guoqiang CHEN, Zumin WANG, Zhiyuan GUAN. Approach of target tracking combining particle filter and metric learning [J]. Journal on Communications, 2021, 42(5): 98-110. |
[5] | Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU. Generalized Grad-CAM attacking method based on adversarial patch [J]. Journal on Communications, 2021, 42(3): 23-35. |
[6] | Hongmin GAO, Xueying CAO, Zhonghao CHEN, Zaijun HUA, Chenming LI, Yue CHEN. Hyperspectral image classification method based on multi-scale proximal feature concatenate network [J]. Journal on Communications, 2021, 42(2): 92-102. |
[7] | Jun YANG,Jisheng DANG. Semantic segmentation of 3D point cloud based on contextual attention CNN [J]. Journal on Communications, 2020, 41(7): 195-203. |
[8] | Hongmin GAO,Xueying CAO,Yao YANG,Zaijun HUA,Chenming LI. Application of bilateral fusion model based on CNN in hyperspectral image classification [J]. Journal on Communications, 2020, 41(11): 132-140. |
[9] | Meng ZHANG,Haoliang SUN,Peng YANG. Identification of DNS covert channel based on improved convolutional neural network [J]. Journal on Communications, 2020, 41(1): 169-179. |
[10] | Xin ZHOU,Xiaoxin HE,Changwen ZHENG. Radio signal recognition based on image deep learning [J]. Journal on Communications, 2019, 40(7): 114-125. |
[11] | Jia LI,Xiaochun YUN,Shuhao LI,Yongzheng ZHANG,Jiang XIE,Fang FANG. HTTP malicious traffic detection method based on hybrid structure deep neural network [J]. Journal on Communications, 2019, 40(1): 24-33. |
[12] | Linhui LI,Bo QIAN,Jing LIAN,Weina ZHENG,Yafu ZHOU. Study on traffic scene semantic segmentation method based on convolutional neural network [J]. Journal on Communications, 2018, 39(4): 123-130. |
[13] | Wanliang WANG,Zhuorong LI. Advances in generative adversarial network [J]. Journal on Communications, 2018, 39(2): 135-148. |
[14] | Hengjun WANG,Nianwen SI,Yulong SONG,Yidong SHAN. Neural network model for dependency parsing incorporating global vector feature [J]. Journal on Communications, 2018, 39(2): 53-64. |
[15] | Jie WANG,Lili YANG,Min YANG. Multitier ensemble classifiers for malicious network traffic detection [J]. Journal on Communications, 2018, 39(10): 155-165. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|