Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Intelligent reflecting surface assisted anti-jamming communications: A fast reinforcement learning approach

H Yang, Z Xiong, J Zhao, D Niyato, Q Wu… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Malicious jamming launched by smart jammers can attack legitimate transmissions, which
has been regarded as one of the critical security challenges in wireless communications …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Cyber security in control of grid-tied power electronic converters—Challenges and vulnerabilities

S Sahoo, T Dragičević… - IEEE Journal of Emerging …, 2019 - ieeexplore.ieee.org
Grid-tied power electronic converters are key enabling technologies for interfacing
renewable energy sources, energy storage, electrical vehicles, microgrids, and high-voltage …

Physical layer security for visible light communication systems: A survey

MA Arfaoui, MD Soltani, I Tavakkolnia… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Due to the dramatic increase in high data rate services and in order to meet the demands of
the fifth-generation (5G) networks, researchers from both academia and industry are …

Secure transmission design for aerial IRS assisted wireless networks

W Wei, X Pang, J Tang, N Zhao, X Wang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Combining intelligent reflecting surface (IRS) and unmanned aerial vehicle (UAV) offers a
new degree of freedom to improve the coverage performance. However, it is more …

On the physical layer security of federated learning based IoMT networks

J Ahmed, TN Nguyen, B Ali, MA Javed… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) connects different medical devices, health sensors and
hospital records to data platforms using wireless communications. Federated Learning (FL) …

Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead

P Yue, J An, J Zhang, J Ye, G Pan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …