A novel LMS-BLM algorithm for AF relays based cooperative wireless networks

O Gatera, H Ilhan, AH Kayran - AEU-International Journal of Electronics …, 2016 - Elsevier
Wireless communication networks are usually affected by channel impairments such as
multi-path fading effects, shadowing, noise, etc. Therefore, techniques to mitigate wireless …

Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs

S Srinu, MKK Reddy… - 2019 11th International …, 2019 - ieeexplore.ieee.org
Wireless communication network (WCN) performance is primarily depends on physical layer
security which is critical among all other layers of OSI network model. It is typically prone to …

Performance Analysis of Several Relay Node Selection Schemes for Cooperative Communications

Z Mei, Y Lu - 2019 IEEE 11th International Conference on …, 2019 - ieeexplore.ieee.org
This paper considers a cooperative wireless network where a set of nodes cooperate to
relay in parallel the information from the source node to the destination node employing a …

Detection of Hidden Dangers in 6G Power Grid Relay Protection Based on Support Vector Machine

B Li, P Mo, H You, J Lu, M Zhao, L Zhang - Wireless Personal …, 2024 - Springer
The integration of Industry 5.0 and the advent of sixth-generation (6G) mobile
communication systems have significantly enhanced the operational capabilities of power …

Physical layer security-based relay selection for wireless cooperative networks: A reinforcement learning approach

AK Kamboj, P Jindal, P Verma - Intelligent Computing and Communication …, 2021 - Springer
This paper introduces a reinforcement learning-based physical layer secured relay selection
(RS) scheme for the dual-hop non-regenerative relaying system. The physical layer security …

Beyond the individual: An improved telecom fraud detection approach based on latent synergy graph learning

J Wu, R Hu, D Li, L Ren, Z Huang, Y Zang - Neural Networks, 2024 - Elsevier
The development of telecom technology not only facilitates social interactions but also
inevitably provides the breeding ground for telecom fraud crimes. However, telecom fraud …

Securing smart vehicles from relay attacks using machine learning

U Ahmad, H Song, A Bilal, M Alazab… - The Journal of …, 2020 - Springer
Due to the rapid developments in intelligent transportation systems, modern vehicles have
turned into intelligent transportation means which are able to exchange data through various …

Game-based attack defense model to provide security for relay selection in 5g mobile networks

W Boubakri, W Abdallah… - 2019 IEEE Intl Conf on …, 2019 - ieeexplore.ieee.org
5G mobile networks promise universal communication environment and aims at providing
higher bandwidth, increased communication and networking capabilities, and extensive …

Collaborative learning model for cyberattack detection systems in iot industry 4.0

TV Khoa, YM Saputra, DT Hoang… - 2020 IEEE wireless …, 2020 - ieeexplore.ieee.org
Although the development of IoT Industry 4.0 has brought breakthrough achievements in
many sectors, eg, manufacturing, healthcare, and agriculture, it also raises many security …

Graph convolutional network-based suspicious communication pair estimation for industrial control systems

T Oba, T Taniguchi - arXiv preprint arXiv:2007.10204, 2020 - arxiv.org
Whitelisting is considered an effective security monitoring method for networks used in
industrial control systems, where the whitelists consist of observed tuples of the IP address …