Anomaly detection and defense techniques in federated learning: a comprehensive review

C Zhang, S Yang, L Mao, H Ning - Artificial Intelligence Review, 2024 - Springer
In recent years, deep learning methods based on a large amount of data have achieved
substantial success in numerous fields. However, with increases in regulations for protecting …

Interplay between physical layer security and blockchain technology for 5G and beyond: A comprehensive survey

EM Ghourab, W Jaafar, L Bariah, S Muhaidat… - Authorea …, 2023 - techrxiv.org
Fifth-generation and beyond (5G and xG) wireless networks are envisioned to meet the
requirements of vertical applications like high traffic throughput, ultra-massive connectivity …

Moving target defense approach for secure relay selection in vehicular networks

EM Ghourab, S Naser, S Muhaidat, L Bariah… - Vehicular …, 2024 - Elsevier
Ensuring the security and reliability of cooperative vehicle-to-vehicle (V2V) communications
is an extremely challenging task due to the dynamic nature of vehicular networks as well as …

Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures

S Bi, X Yuan, S Hu, K Li, W Ni, E Hossain… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of communication technologies marks a transformative phase in critical
infrastructure construction, where the meticulous analysis of failures becomes paramount in …

BC-MTD: Blockchain-driven Moving Target Defense for Secure Vehicle Access

MF Sidiq, AI Basuki, TI Ramdhani… - … on Radar, Antenna …, 2023 - ieeexplore.ieee.org
Network-based vehicle access has become the norm for next-generation mobility. It enables
remote monitoring and control over the vehicles, which eases user operations. Nonetheless …