Holistic network virtualization and pervasive network intelligence for 6G

X Shen, J Gao, W Wu, M Li, C Zhou… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In this tutorial paper, we look into the evolution and prospect of network architecture and
propose a novel conceptual architecture for the 6th generation (6G) networks. The proposed …

Applications of generative adversarial networks in anomaly detection: a systematic literature review

M Sabuhi, M Zhou, CP Bezemer, P Musilek - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has become an indispensable tool for modern society, applied in a wide
range of applications, from detecting fraudulent transactions to malignant brain tumors. Over …

Generative AI for secure physical layer communications: A survey

C Zhao, H Du, D Niyato, J Kang, Z Xiong… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating
rapid advancement and unparalleled proficiency in generating diverse content. Beyond …

Generative AI for physical layer communications: A survey

N Van Huynh, J Wang, H Du, DT Hoang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The recent evolution of generative artificial intelligence (GAI) leads to the emergence of
groundbreaking applications such as ChatGPT, which not only enhances the efficiency of …

At the Dawn of Generative AI Era: A tutorial-cum-survey on new frontiers in 6G wireless intelligence

A Celik, AM Eltawil - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As we transition from the 5G epoch, a new horizon beckons with the advent of 6G, seeking a
profound fusion with novel communication paradigms and emerging technological trends …

From 5G to 6G networks, a survey on AI-Based jamming and interference detection and mitigation

P Lohan, B Kantarci, MA Ferrag… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Fifth-generation and Beyond (5GB) networks are transformational technologies to
revolutionize future wireless communications in terms of massive connectivity, higher …

Open set wireless transmitter authorization: Deep learning approaches and dataset considerations

S Hanna, S Karunaratne… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to imperfections in transmitters' hardware, wireless signals can be used to verify their
identity in an authorization system. While deep learning was proposed for transmitter …

Automatic jamming signal classification in cognitive UAV radios

A Krayani, AS Alam, L Marcenaro… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The integration of Cognitive Radio (CR) with Unmanned Aerial Vehicles (UAVs) is an
effective step towards relieving the spectrum scarcity and empowering the UAV with a high …

Machine learning in NextG networks via generative adversarial networks

E Ayanoglu, K Davaslioglu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) are Machine Learning (ML) algorithms that have
the ability to address competitive resource allocation problems together with detection and …

When machine learning meets spectrum sharing security: Methodologies and challenges

Q Wang, H Sun, RQ Hu… - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
The exponential growth of Internet connected systems has generated numerous challenges,
such as spectrum shortage issues, which require efficient spectrum sharing (SS) solutions …