Login / Signup
Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.
Zhi-hua Wang
Ming-hui Jin
Lin Jiang
Chen-jia Feng
Jing-yi Cao
Zhang Yun
Published in:
ICSI (2) (2023)
Keyphrases
</>
experimental evaluation
high accuracy
high precision
computational cost
preprocessing
segmentation method
synthetic data
neural network
face recognition
computational complexity
management system
clustering method
highly efficient