A review of deep learning in 5G research: Channel coding, massive MIMO, multiple access, resource allocation, and network security

A Ly, YD Yao - IEEE Open Journal of the Communications …, 2021 - ieeexplore.ieee.org
The current development of 5G technology is flourishing with widespread deployment
across the world at a rapid pace. However, there is still a demand concerning 5G research …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach

H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …

[HTML][HTML] Intrusion detection for network based cloud computing by custom RC-NN and optimization

T Thilagam, R Aruna - ICT Express, 2021 - Elsevier
Intrusion detection acts as a vital function in providing information security, and additionally
the key technology is to precisely classify diverse attacks. Intrusion detection system (IDS) is …

Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey

A Haddaji, S Ayed, LC Fourati - Computers and Electrical Engineering, 2022 - Elsevier
Rapid advancements in communication technology have made vehicular networks a reality
with numerous applications. However, vehicular network security is still an open research …

Jamming detection and classification in OFDM-based UAVs via feature-and spectrogram-tailored machine learning

Y Li, J Pawlak, J Price, K Al Shamaileh, Q Niyaz… - IEEE …, 2022 - ieeexplore.ieee.org
In this paper, a machine learning (ML) approach is proposed to detect and classify jamming
attacks against orthogonal frequency division multiplexing (OFDM) receivers with …

A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

T Senevirathna, VH La, S Marchal… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the advent of 5G commercialization, the need for more reliable, faster, and intelligent
telecommunication systems is envisaged for the next generation beyond 5G (B5G) radio …

IoT eco-system, layered architectures, security and advancing technologies: A comprehensive survey

A Raj, SD Shetty - Wireless Personal Communications, 2022 - Springer
Today almost every person's life revolves around internet and Internet of Things (IoT). IoT is
a paradigm which interconnects devices, people, or networks with the ability to process and …

Drone forensics and machine learning: Sustaining the investigation process

Z Baig, MA Khan, N Mohammad, GB Brahim - Sustainability, 2022 - mdpi.com
Drones have been increasingly adopted to address several critical challenges faced by
humanity to provide support and convenience. The technological advances in the broader …

A comprehensive collection and analysis model for the drone forensics field

FM Alotaibi, A Al-Dhaqm, YD Al-Otaibi, AA Alsewari - Sensors, 2022 - mdpi.com
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be
applied to several purposes, especially in smart cities. These involve traffic observation …