Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities

S Zhang, D Zhu, Y Liu - Computer Networks, 2024 - Elsevier
With the commercial deployment of the 5G system, researchers from both academia and
industry are moving attention to the blueprint of the 6G system. The space-air-ground-sea …

[HTML][HTML] Excitatory/inhibitory balance emerges as a key factor for RBN performance, overriding attractor dynamics

E Calvet, J Rouat, B Reulet - Frontiers in Computational …, 2023 - frontiersin.org
Reservoir computing provides a time and cost-efficient alternative to traditional learning
methods. Critical regimes, known as the “edge of chaos,” have been found to optimize …

[HTML][HTML] Intelligent reflecting surface-assisted physical layer key generation with deep learning in MIMO systems

S Liu, G Wei, H He, H Wang, Y Chen, D Hu, Y Jiang… - Sensors, 2022 - mdpi.com
Physical layer secret key generation (PLKG) is a promising technology for establishing
effective secret keys. Current works for PLKG mostly study key generation schemes in ideal …

ML-based advantage distillation for key agreement in underwater acoustic channels

A Giuliani, F Ardizzon, S Tomasin - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Underwater networks have become an important topic of research due to their potential
impact on several military and civil applications. To secure these communications, many …

Practical security for underwater acoustic networks: published results from the SAFE-UComm project

P Casari, R Diamant, S Tomasin, J Neasham… - Proc. of the 10th …, 2023 - iris.unitn.it
The emergence of commercial underwater acoustic modems from different manufacturers
and the promulgation of interoperability standards (eg, JANUS) broadens the application …

Quantization for Secret Key Generation in Underwater Acoustic Channels

A GIULIANI - thesis.unipd.it
Securing wireless communications in harsh environments, such as underwater networks, via
traditional cryptographic approaches is unfeasible. For example, public key encryption …