GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network

M Chen, W Liu, N Zhang, J Li, Y Ren, M Yi… - Expert Systems with …, 2022 - Elsevier
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable
to interference attacks by malicious jammers, which endangers the communication quality of …

Physical layer security in millimeter wave cellular networks

C Wang, HM Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
Recent studies show that millimeter wave (mmWave) communications can offer orders of
magnitude, which increases in the cellular capacity. However, the secrecy performance of …

Covert wireless communication with artificial noise generation

R Soltani, D Goeckel, D Towsley… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communication conceals the transmission of the message from an attentive
adversary. Recent work on the limits of covert communication in additive white Gaussian …

Secure and energy efficient transmission for IRS-assisted cognitive radio networks

X Wu, J Ma, Z Xing, C Gu, X Xue… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The spectrum efficiency (SE) and security of the secondary users (SUs) in the cognitive radio
networks (CRNs) have become two main issues due to the limitation interference to the …

Linear precoding of data and artificial noise in secure massive MIMO systems

J Zhu, R Schober, VK Bhargava - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we consider secure downlink transmission in a multicell massive multiple-input
multiple-output (MIMO) system where the numbers of base station (BS) antennas, mobile …

Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations

Q Xu, P Ren, H Song, Q Du - IEEE Access, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …

Secure semantic communications: Fundamentals and challenges

Z Yang, M Chen, G Li, Y Yang, Z Zhang - IEEE Network, 2024 - ieeexplore.ieee.org
Semantic communication allows the receiver to know the intention instead of the bit
information itself, which is an emerging technique to support real-time human-machine and …

Secure 3D mobile UAV relaying for hybrid satellite-terrestrial networks

PK Sharma, DI Kim - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
In this paper, we propose a novel decode-and-forward (DF)-based secure 3D mobile
unmanned aerial vehicle (UAV) relaying for hybrid satellite-terrestrial networks (HSTNs) in …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Transmit solutions for MIMO wiretap channels using alternating optimization

Q Li, M Hong, HT Wai, YF Liu, WK Ma… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
This paper considers transmit optimization in multi-input multi-output (MIMO) wiretap
channels, wherein we aim at maximizing the secrecy capacity or rate of an MIMO channel …