Covert communications: A comprehensive survey

X Chen, J An, Z Xiong, C Xing, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

Twelve scientific challenges for 6G: Rethinking the foundations of communications theory

M Chafii, L Bariah, S Muhaidat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The research in the sixth generation of wireless networks needs to tackle new challenges in
order to meet the requirements of emerging applications in terms of high data rate, low …

[HTML][HTML] Vision and research directions of 6G technologies and applications

SAA Hakeem, HH Hussein, HW Kim - Journal of King Saud University …, 2022 - Elsevier
Abstract Fifth-generation (5G) mobile communication technology is now widely available in
several countries, with millions of 5G customers. Therefore, it's time for academia and …

Innovative trends in the 6G era: A comprehensive survey of architecture, applications, technologies, and challenges

VK Quy, A Chehri, NM Quy, ND Han, NT Ban - IEEE Access, 2023 - ieeexplore.ieee.org
While the fifth-generation mobile network is being commercialized worldwide, researchers
have recently started looking towards the next generation, called the 6G network. Unlike 5G …

A survey of network automation for industrial internet-of-things toward industry 5.0

HR Chi, CK Wu, NF Huang, KF Tsang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network automation has been bred by the deployment of 5G based Industrial Internet-of-
Things (IIoT) in Industry 4.0, and further approaching pervasive AI and human-robot …

ASTREAM: Data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment

Y Yang, X Yang, M Heidari, MA Khan… - … on Network Science …, 2022 - ieeexplore.ieee.org
Intrusion detection exerts a crucial influence on securing the IIoT driven by anomaly
detection approaches. Dissimilar with the static data, the intrusion detection data is in the …

Asynchronous deep reinforcement learning for collaborative task computing and on-demand resource allocation in vehicular edge computing

L Liu, J Feng, X Mu, Q Pei, D Lan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular Edge Computing (VEC) is enjoying a surge in research interest due to the
remarkable potential to reduce response delay and alleviate bandwidth pressure. Facing the …

[HTML][HTML] Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey

S Zeb, A Mahmood, SA Hassan, MDJ Piran… - Journal of Network and …, 2022 - Elsevier
By amalgamating recent communication and control technologies, computing and data
analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber …

面向零功耗物联网的反向散射通信综述

张晓茜, 徐勇军 - 通信学报, 2022 - infocomm-journal.com
物联网能够提升人们的生活质量, 但同时带来能量消耗剧增与网络传输拥堵的问题. 为此,
面向零功耗物联网的反向散射通信技术被提出, 分析与研究该技术的发展现状及所面临的技术 …

Pain without gain: Destructive beamforming from a malicious RIS perspective in IoT networks

Z Lin, H Niu, K An, Y Hu, D Li, J Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The reconfigurable intelligent surface (RIS) has attracted significant research interests
recently due to its abilities of dynamic channel reconstruction, flexible deployment and …