A Survey on Trustworthy Edge Intelligence: From Security and Reliability To Transparency and Sustainability

X Wang, B Wang, Y Wu, Z Ning… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Edge Intelligence (EI) integrates Edge Computing (EC) and Artificial Intelligence (AI) to push
the capabilities of AI to the network edge for real-time, efficient and secure intelligent …

A survey on metaverse-empowered 6G wireless systems: a security perspective

LU Khan, M Guizani, I Yaqoob, D Niyato, A Al-Fuqaha… - Internet of Things, 2024 - Elsevier
Recent trends in emerging applications have motivated researchers to design advanced
wireless systems to meet their evolving requirements. These emerging applications include …

Adversarial Defense Embedded Waveform Design for Reliable Communication in the Physical Layer

P Qi, Y Meng, S Zheng, X Zhou… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Due to the openness of wireless channels, wireless communication is vulnerable to be
eavesdropped, which results in confidential information leakage. Physical-layer security …

Trustworthy Edge Machine Learning: A Survey

X Wang, B Wang, Y Wu, Z Ning, S Guo… - arXiv preprint arXiv …, 2023 - arxiv.org
The convergence of Edge Computing (EC) and Machine Learning (ML), known as Edge
Machine Learning (EML), has become a highly regarded research area by utilizing …

Energy‐Efficient and Resilient Secure Routing in Energy Harvesting Wireless Sensor Networks with Transceiver Noises: EcoSecNet Design and Analysis

M Muhammad Umer, J Hong, O Muhammad… - Journal of …, 2024 - Wiley Online Library
Cooperative energy harvesting wireless sensor networks (EH‐WSNs) using energy‐
harvesting‐based physical layer security (PLS) appears to be a promising way to meet …

Physical Layer Deception with Non-Orthogonal Multiplexing

W Chen, B Han, Y Zhu, A Schmeink, G Caire… - arXiv preprint arXiv …, 2024 - arxiv.org
Physical layer security (PLS) is a promising technology to secure wireless communications
by exploiting the physical properties of the wireless channel. However, the passive nature of …

Deception in Wireless Communications: Benefits and Perils

Q He - 2024 - shareok.org
Wireless signals, ubiquitous and capable of penetrating obstacles, are increasingly
exploited to infer personal information such as vital signs, human activities, and crowd …

Understanding and Securing Typing Privacy in Wireless Environments

E Yang - 2024 - shareok.org
Sensitive numbers play an unparalleled role in identification and authentication. Recent
research has revealed plenty of side-channel attacks to infer keystrokes. The common idea …

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies

T Hou - 2022 - search.proquest.com
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered
Strategies by Tao Hou A dissertation Page 1 Securing Critical Cyber Infrastructures and …

Securing Smart Home Iot Applications Via Wireless Traffic Analysis

Y He - 2022 - shareok.org
Householders have widely used IoT security systems with the development of smart home
applications. Wireless security cameras are integral components of IoT security systems …