GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network

M Chen, W Liu, N Zhang, J Li, Y Ren, M Yi… - Expert Systems with …, 2022 - Elsevier
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable
to interference attacks by malicious jammers, which endangers the communication quality of …

Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength

D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …

Cooperative task offloading and resource allocation for UAV-enabled mobile edge computing systems

D Xu, D Xu - Computer Networks, 2023 - Elsevier
Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) systems can
provide flexible computation services to user equipments (UEs). On the one hand, the UAV …

STAR-RIS-assisted information surveillance over suspicious multihop communications

G Hu, Q Wu, J Si, K Xu, Z Li, Y Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Wireless information surveillance has received widespread attention due to the urgency of
monitoring growing suspicious communications. This paper considers a challenging …

Proactive eavesdropping of physical layer security aided suspicious communications in fading channels

D Xu, H Zhu - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
Proactive eavesdropping is an effective approach to legitimately surveil the suspicious
communications. Current studies all considered that physical layer security (PLS) …

Active reconfigurable intelligent surface aided surveillance scheme

X Hu, Y Yi, K Li, H Zhang, C Kai - IEEE Wireless …, 2022 - ieeexplore.ieee.org
This letter attempts to design a surveillance scheme by adopting an active reconfigurable
intelligent surface (RIS). Different from the conventional passive RIS, the active RIS could …

Proactive eavesdropping over multiple suspicious communication links with heterogeneous services

D Xu, H Zhu - IEEE Transactions on Wireless Communications, 2022 - ieeexplore.ieee.org
To legitimately eavesdrop communications of suspicious users such as criminals, proactive
eavesdropping has been proposed as an effective approach. Current works considered that …

Proactive Eavesdropping of Jamming-Assisted Suspicious Communications in Fading Channels: A Stackelberg Game Approach

D Xu - IEEE Transactions on Communications, 2024 - ieeexplore.ieee.org
Proactive eavesdropping improves the wireless information surveillance performance by
cognitively sending jamming signals to degrade the suspicious link condition. Current …

Unsuspicious user enabled proactive eavesdropping in interference networks using improper Gaussian signaling

D Xu, H Zhu - IEEE Transactions on Communications, 2023 - ieeexplore.ieee.org
Proactive eavesdropping is an effective approach to improve the performance of wireless
information surveillance, where suspicious users are legitimately eavesdropped by …

Secure computation offloading assisted by intelligent reflection surface for mobile edge computing network

X Chen, H Xu, G Zhang, Y Chen, R Li - Physical Communication, 2023 - Elsevier
As an novel paradigm, computation offloading in the mobile edge computing (MEC) system
can effectively support the resource-intensive applications for the mobile devices (MD) …