Reinforcement learning for feedback-enabled cyber resilience

Y Huang, L Huang, Q Zhu - Annual reviews in control, 2022 - Elsevier
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …

Machine learning for intelligent authentication in 5G and beyond wireless networks

H Fang, X Wang, S Tomasin - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
The 5G and beyond wireless networks are critical to support diverse vertical applications by
connecting heterogeneous devices and machines, which directly increase vulnerability for …

Deep learning-aided 6G wireless networks: A comprehensive survey of revolutionary PHY architectures

B Ozpoyraz, AT Dogukan, Y Gevez… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
Deep learning (DL) has proven its unprecedented success in diverse fields such as
computer vision, natural language processing, and speech recognition by its strong …

Learning-aided physical layer authentication as an intelligent process

H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Performance of the existing physical layer authentication schemes could be severely
affected by the imperfect estimates and variations of the communication link attributes used …

Machine learning and the Internet of Things security: Solutions and open challenges

U Farooq, N Tariq, M Asim, T Baker… - Journal of Parallel and …, 2022 - Elsevier
Abstract Internet of Things (IoT) is a pervasively-used technology for the last few years. IoT
technologies are also responsible for intensifying various everyday smart applications …

Enabling AI in future wireless networks: A data life cycle perspective

DC Nguyen, P Cheng, M Ding… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Recent years have seen rapid deployment of mobile computing and Internet of Things (IoT)
networks, which can be mostly attributed to the increasing communication and sensing …

State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Machine learning for security in vehicular networks: A comprehensive survey

A Talpur, M Gurusamy - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Machine Learning (ML) has emerged as an attractive and viable technique to provide
effective solutions for a wide range of application domains. An important application domain …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …