[HTML][HTML] Emerging technologies for 6G communication networks: Machine learning approaches

AA Puspitasari, TT An, MH Alsharif, BM Lee - Sensors, 2023 - mdpi.com
The fifth generation achieved tremendous success, which brings high hopes for the next
generation, as evidenced by the sixth generation (6G) key performance indicators, which …

Secure precoding optimization for NOMA-aided integrated sensing and communication

Z Yang, D Li, N Zhao, Z Wu, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Integrated sensing and communication (ISAC) is an up-and-coming technique for future 6G
networks. However, the communication message carried by the detection waveform will face …

Adversarial attack and defense on deep learning for air transportation communication jamming

M Liu, Z Zhang, Y Chen, J Ge… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Air transportation communication jamming recognition model based on deep learning (DL)
can quickly and accurately identify and classify communication jamming, to improve the …

Unmanned-aerial-vehicle-assisted wireless networks: Advancements, challenges, and solutions

M Dai, N Huang, Y Wu, J Gao… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The rapid development of communication and computing techniques enables unmanned
aerial vehicles (UAVs) to provide reliable and cost-effective wireless communication and …

A covert jamming scheme against an intelligent eavesdropper in cooperative cognitive radio networks

Y Wen, L Liu, J Li, X Hou, N Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In this work, we design a covert jamming scheme against an intelligent Eve towards physical
layer security in a cooperative cognitive radio networks. To protect the primary message …

Secure video offloading in MEC-enabled IIoT networks: A multi-cell federated deep reinforcement learning approach

T Zhao, F Li, L He - IEEE Transactions on Industrial Informatics, 2023 - ieeexplore.ieee.org
Wireless video offloading in mobile-edge-computing (MEC)-enabled Industrial Internet of
Things imposes a risk of exposing users' private data to eavesdroppers. It is difficult for …

Full-duplex constant-envelope jamceiver and self-interference suppression by highpass filter: experimental validation for Wi-Fi security

J Marin, M Bernhardt, T Riihonen - IEEE Journal on Selected …, 2023 - ieeexplore.ieee.org
Unauthorized access to data has been a recognized risk of wireless systems for many
decades. While security solutions in communications engineering have typically revolved …

Deep reinforcement learning for RIS-aided secure mobile edge computing in industrial internet of things

J Xu, A Xu, L Chen, Y Chen, X Liang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been regarded as a promising paradigm to support the
compute-intensive and delay-sensitive industrial Internet of things (IIoT) applications …

FD-NOMA enabled multiuser transmission with backscatter communication

A Raviteja, K Singh, K Agrawal… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
This letter investigates a full-duplex (FD) non-orthogonal multiple access (NOMA) enabled
multiuser transmission with backscatter communication (FD-MTBC), where a multiuser …

Secure swarm UAV-assisted communications with cooperative friendly jamming

H Dang-Ngoc, DN Nguyen, K Ho-Van… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial
vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy …