Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey

H Sharma, N Kumar - Physical Communication, 2023 - Elsevier
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …

The applicability of reinforcement learning methods in the development of industry 4.0 applications

T Kegyes, Z Süle, J Abonyi - Complexity, 2021 - Wiley Online Library
Reinforcement learning (RL) methods can successfully solve complex optimization
problems. Our article gives a systematic overview of major types of RL methods, their …

Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey

MS Frikha, SM Gammar, A Lahmadi… - Computer Communications, 2021 - Elsevier
Nowadays, many research studies and industrial investigations have allowed the integration
of the Internet of Things (IoT) in current and future networking applications by deploying a …

5G networks: A review from the perspectives of architecture, business models, cybersecurity, and research developments

J Aranda, EJ Sacoto Cabrera, ED Haro Mendoza… - …, 2021 - sedici.unlp.edu.ar
5G technology is transforming our critical networks, with long-term implications. Since 5G is
transitioning to a purely software-based network, potential improvements will be software …

Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks

AM Gedikli, M Koseoglu, S Sen - Computer Networks, 2022 - Elsevier
One of the most difficult challenges in radio access network slicing occurs in the connection
establishment phase where multiple devices use a common random access channel in …

Delay-aware dynamic access control for mMTC in wireless networks using deep reinforcement learning

D Pacheco-Paramo, L Tello-Oquendo - Computer Networks, 2020 - Elsevier
The success of the applications based on the Internet of Things (IoT) relies heavily on the
ability to process large amounts of data with different Quality-of-Service (QoS) requirements …

[HTML][HTML] Redes 5G: una revisión desde las perspectivas de arquitectura, modelos de negocio, ciberseguridad y desarrollos de investigación

J Aranda, EJ Sacoto-Cabrera… - Revista Digital …, 2021 - scielo.senescyt.gob.ec
La tecnología 5G está transformando nuestras redes críticas, con implicaciones a largo
plazo. Dado que 5G está en transición a una red puramente basada en software, las …

An energy-efficient DL-aided massive multiple access scheme for IoT scenarios in beyond 5G networks

L Miuccio, D Panno, S Riolo - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In view of the challenges foreseen in futuristic massive IoT (mIoT) scenarios, characterized
by a huge deployment of energy-constrained IoT devices, we propose an efficient next …

Learning based access class barring for massive machine type communication random access congestion control in LTE-A networks

W Abera, T Olwal, Y Marye… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
Massive Machine Type Communication (mMTC) is an enabling technology for cellular
network, like LTE-A, scalability and densification. However, LTE-A network is mainly …

Random Access Control in NB-IoT With Model-Based Reinforcement Learning

JJ Alcaraz, JC Sanchez-Aarnoutse… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In NB-IoT, the cell can be divided into up to three coverage enhancement (CE) levels, each
associated with a narrowband Physical Random Access Channel (NPRACH) that has a CE …