Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Edge intelligence in intelligent transportation systems: A survey

T Gong, L Zhu, FR Yu, T Tang - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Edge intelligence (EI) is becoming one of the research hotspots among researchers, which
is believed to help empower intelligent transportation systems (ITS). ITS generates a large …

Joint security and train control design in blockchain-empowered CBTC system

L Zhu, H Liang, H Wang, B Ning… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The communication-based train control (CBTC) system ensures the high efficiency and
orderliness of trains and is widely used in urban rail transit networks. The adoption of …

Latency minimization of reverse offloading in vehicular edge computing

W Feng, N Zhang, S Li, S Lin, R Ning… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Cooperative Vehicle-Infrastructure System (CVIS) can provide innovative services for traffic
management and enable trips to be safer, more coordinated, and smarter. In the CVIS, the …

Collaborative edge intelligence service provision in blockchain empowered urban rail transit systems

H Liang, L Zhu, FR Yu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the advancement of urban rail transits (URTs), the demand for artificial intelligence (AI)-
based URTs services grows exponentially. Edge intelligence (EI) leverages computing …

A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks

H Liang, L Zhu, FR Yu, X Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the high integration of wireless communication and networking technologies, the
communication-based train control (CBTC) systems are exposed to additional cyber-attack …

Blockchain-Empowered Edge Intelligence for TACS Obstacle Detection: System Design and Performance Optimization

H Liang, L Zhu, FR Yu, Z Ma - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
With the significant advantages of system complexity and operating costs, train autonomous
circumambulate system (TACS) is gradually replacing the traditional communication-based …

Automatic obstacle detection method for the train based on deep learning

Q Zhang, F Yan, W Song, R Wang, G Li - Sustainability, 2023 - mdpi.com
Automatic obstacle detection is of great significance for improving the safety of train
operation. However, the existing autonomous operation of trains mainly depends on the …

An intrusion detection method based on self-generated coding technology for stealthy false data injection attacks in train-ground communication systems

XY Kong, GH Yang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article investigates the problem of intrusion detection of stealthy false data injection
(FDI) attacks in train–ground communication systems. An intrusion detection method is …

Intrusion detection and network information security based on deep learning algorithm in urban rail transit management system

Z Wang, X Xie, L Chen, S Song… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The exploration of the intrusion detection effect of urban rail transit management system
aims to further improve the safety performance of the traffic field in urban construction. Thus …