X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)- layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
While the emerging 6G networks are anticipated to meet the high-end service quality demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
The widespread adoption of continuously connected smartphones and tablets developed the usage of mobile applications, among which many use location to provide geolocated …
Technologies and techniques of location and navigation are advancing, allowing greater precision in locating people in complex and challenging conditions. These advances have …
Wireless networks with their ubiquitous applications have become an indispensable part of our daily lives. Wireless networks demand more and more spectral resources to support the …
G Ding, Y Jiao, J Wang, Y Zou, Q Wu… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Spectrum inference, also known as spectrum prediction in the literature, is a promising technique of inferring the occupied/free state of radio spectrum from already …
This paper surveys the current research status of location privacy issues in mobile applications. The survey spans five aspects of study: the definition of location privacy …
Vehicular ad hoc networks (VANETs) connect two or more vehicles wirelessly to enable data exchange in an Internet of Things (IoT) environment. In VANETs, location privacy is the most …
Location of sensor nodes is one of the most important and fundamental information for Wireless Sensor Networks (WSNs), because it provides basic support for many location …