False data injection attack detection before decoding in DF cooperative relay network

X Ding, Y Wang - 2020 Asia Conference on Computers and …, 2020 - ieeexplore.ieee.org
False data injection (FDI) attacks could happen in decode-and-forward (DF) wireless
cooperative relay networks. Although physical integrity check (PIC) can combat that by …

Tracing malicious relays in cooperative wireless communications

Y Mao, M Wu - IEEE Transactions on Information Forensics …, 2007 - ieeexplore.ieee.org
A cooperative communication system explores a new dimension of diversity in wireless
communications to combat the unfriendly wireless environment. While this emerging …

Detection of adversary nodes in machine-to-machine communication using machine learning based trust model

E Eziama, S Ahmed, S Ahmed, F Awin… - … Symposium on Signal …, 2019 - ieeexplore.ieee.org
Security challenges present in Machine-to-Machine Communication (M2M-C) and big data
paradigm are fundamentally different from conventional network security challenges. In M2M …

Buffer-aided relay selection for wireless cooperative relay networks with untrusted relays

C Zhang, X Liao, Z Wu, G Qiu - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Wireless cooperative relay networks are widely used in various fields. Wireless channels are
vulnerable to eavesdroppers because of the broadcast characteristics of wireless channels …

Preventing false tripping cyberattacks against distance relays: A deep learning approach

YM Khaw, AA Jahromi, AM FM… - … for smart grids …, 2019 - ieeexplore.ieee.org
The false tripping of circuit breakers initiated by cyberattacks on protective relays is a
growing concern in power systems. This is of high importance because multiple false …

Noncoherent detection of misbehaving relays in decode-and-forward cooperative networks

LC Lo, WJ Huang, RY Chang… - IEEE Communications …, 2015 - ieeexplore.ieee.org
This letter considers a three-node cooperative network with an untrusted relay. We propose
a noncoherent relay misbehavior detection scheme for decode-and-forward (DF) systems …

Dynamic graph neural network-based fraud detectors against collaborative fraudsters

L Ren, R Hu, D Li, Y Liu, J Wu, Y Zang, W Hu - Knowledge-Based Systems, 2023 - Elsevier
Telecom fraud detection is a challenging task since the fact that fraudulent behaviors are
hidden in the vast amount of telecom records. More concerning, the ongoing coronavirus …

Security analysis of NFC relay attacks using probabilistic model checking

N Alexiou, S Basagiannis… - … and Mobile Computing …, 2014 - ieeexplore.ieee.org
Near Field Communication (NFC) is a short-ranged wireless communication technology
envisioned to support a large gamut of smart-device applications, such as payment and …

MedGraph: malicious edge detection in temporal reciprocal graph via multi-head attention-based GNN

K Chen, Z Wang, K Liu, X Zhang, L Luo - Neural Computing and …, 2023 - Springer
With the popularity of various online dating applications, it has become a crucial task to
detect anomalous or malicious users from a large number of reciprocal users. Essentially …

[HTML][HTML] Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks

C Zhang, X Liao, Z Wu, G Qiu, Z Chen, Z Yu - Sensors, 2023 - mdpi.com
This paper investigates the problem of buffer-aided relay selection to achieve reliable and
secure communications in a two-hop amplify-and-forward (AF) network with an …