The key principle of physical layer security (PLS) is to permit the secure transmission of confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …
In recent years, deep learning (DL) models have demonstrated remarkable achievements on non-trivial tasks such as speech recognition, image processing, and natural language …
DT Uysal, PD Yoo, K Taha - IEEE Open Journal of Vehicular …, 2022 - ieeexplore.ieee.org
5G is inherently prone to security vulnerabilities. We witness that many today's networks contain 5G security flaws due to their reliance on the existing 4G network core. A lack of …
X Qiu, J Yu, W Zhuang, G Li, X Sun - Sensors, 2023 - mdpi.com
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having …
HJ Hadi, Y Cao, S Li, L Xu, Y Hu, M Li - Expert Systems with Applications, 2024 - Elsevier
UAV-enabled Integrated Sensing and Communication (ISAC) in sixth-generation (6G) wireless networks has sparked significant research interest. UAVs are positioned as aerial …
J Kim, J Park, JH Lee - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Recently, the manufacturing industry is changing into a smart manufacturing era with the development of 5G, artificial intelligence, and cloud computing technologies. As a result …
Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing pervasiveness makes them a vital component of the activities involved in living in the …
KA Awan, IU Din, A Almogren… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Software Defined Networks (SDN) have revolutionized multimedia communication systems with their dynamic resource allocation and load balancing capabilities. However, ensuring …
Cloud computing has revolutionized the way IT industries work. Most modern‐day companies rely on cloud services to accomplish their day‐to‐day tasks. From hosting …