Related references
Note: Only part of the references are listed.Stacked Autoencoder-Based Intrusion Detection System to Combat Financial Fraudulent
Ghulam Muhammad et al.
IEEE INTERNET OF THINGS JOURNAL (2023)
ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform
Yulong Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
MFFFLD: A Multimodal-Feature-Fusion-Based Fingerprint Liveness Detection
Chengsheng Yuan et al.
IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS (2022)
Reward is enough
David Silver et al.
ARTIFICIAL INTELLIGENCE (2021)
The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing
Andreas Baer et al.
IEEE SIGNAL PROCESSING MAGAZINE (2021)
A Study on the Security Implications of Information Leakages in Container Clouds
Xing Gao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
Xinrui Ge et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure
Ke-Wen Huang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)
5G network slicing with QKD and quantum-safe security
Paul Wright et al.
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2021)
An integrated space-to-ground quantum communication network over 4,600 kilometres
Yu-Ao Chen et al.
NATURE (2021)
Hybrid Satellite-UAV-Terrestrial Networks for 6G Ubiquitous Coverage: A Maritime Communications Perspective
Yanmin Wang et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks
Chao Lin et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)
Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems
Yogachandran Rahulamathavan et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks
Yulei Wu et al.
COMPUTER NETWORKS (2021)
Deep Learning-Based DDoS-Attack Detection for Cyber-Physical System Over 5G Network
Bilal Hussain et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
6G: A comprehensive survey on technologies, applications, challenges, and research problems
Haitham Hassan H. Mahmoud et al.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)
A Comprehensive Survey on the E2E 5G Network Slicing Model
Mohammed Chahbar et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)
Experimental quantum homomorphic encryption
Jonas Zeuner et al.
NPJ QUANTUM INFORMATION (2021)
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
Abdulmalik Alwarafy et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Weaponized AI for cyber attacks
Muhammad Mudassar Yamin et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)
Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm
Zongze Li et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)
Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial
Qingqing Wu et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2021)
Physical Layer Secret Key Generation Using Joint Interference and Phase Shift Keying Modulation
Najme Ebrahimi et al.
IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES (2021)
A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing
Yong Li et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments
Jerry Chun-Wei Lin et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Physical Layer Security for Intelligent Reflecting Surface Assisted Two-Way Communications
Mevan Wijewardena et al.
IEEE COMMUNICATIONS LETTERS (2021)
On Deep Reinforcement Learning for Traffic Engineering in SD-WAN
Sebastian Troia et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)
Physical Layer Security for MISO NOMA VLC System Under Eavesdropper Collusion
Hao Peng et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)
Twin-field quantum key distribution over a 511km optical fibre linking two distant metropolitan areas
Jiu-Peng Chen et al.
NATURE PHOTONICS (2021)
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks
Jing Chen et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)
BED: A New Data Set for EEG-Based Biometrics
Pablo Arnau-Gonzalez et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Differential Privacy for Industrial Internet of Things: Opportunities, Applications, and Challenges
Bin Jiang et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Hybrid Satellite-Terrestrial Communication Networks for the Maritime Internet of Things: Key Technologies, Opportunities, and Challenges
Te Wei et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Privacy-Preserving Deep Learning Based on Multiparty Secure Computation: A Survey
Qiao Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Enabling Massive IoT Toward 6G: A Comprehensive Survey
Fengxian Guo et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Molecular Physical Layer for 6G in Wave-Denied Environments
Weisi Guo et al.
IEEE COMMUNICATIONS MAGAZINE (2021)
Hybrid LiFi and WiFi Networks: A Survey
Xiping Wu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
Survey on Multi-Access Edge Computing Security and Privacy
Pasika Ranaweera et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
A Survey of Physical-Layer Authentication in Wireless Communications
Ning Xie et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
A Comprehensive Survey of the Tactile Internet: State-of-the-Art and Research Directions
Nattakorn Promwongsa et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI
Jake Bailey Perazzone et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges
Paulo Silva et al.
IEEE ACCESS (2021)
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
Linda Senigagliesi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure
Weiyang Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Deep Hashing for Secure Multimodal Biometrics
Veeru Talreja et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks
Ning Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas
Jie Tang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Evaluation of the Time Stability and Uniqueness in PPG-Based Biometric System
Dae Yon Hwang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
The Road to 6G: Ten Physical Layer Challenges for Communications Engineers
Michail Matthaiou et al.
IEEE COMMUNICATIONS MAGAZINE (2021)
Physical-Layer Authentication Using Multiple Channel-Based Features
Ning Xie et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Intelligent Reflecting Surface Assisted Secret Key Generation
Xinjin Lu et al.
IEEE SIGNAL PROCESSING LETTERS (2021)
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
Arwa Aldweesh et al.
KNOWLEDGE-BASED SYSTEMS (2020)
The Al-Based Cyber Threat Landscape: A Survey
Nektaria Kaloudi et al.
ACM COMPUTING SURVEYS (2020)
Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches
Fengxiao Tang et al.
PROCEEDINGS OF THE IEEE (2020)
The Security of Autonomous Driving: Threats, Defenses, and Future Directions
Kui Ren et al.
PROCEEDINGS OF THE IEEE (2020)
Adversarial Attacks and Defenses in Deep Learning
Kui Ren et al.
ENGINEERING (2020)
Advances in Quantum Cryptography
Stefano Pirandola et al.
Advances in Optics and Photonics (2020)
Deep Neural Network-Based Active User Detection for Grant-Free NOMA Systems
Wonjun Kim et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2020)
Physical-Layer Security With Optical Generalized Space Shift Keying
Erdal Panayirci et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2020)
Spatial Anti-Jamming Scheme for Internet of Satellites Based on the Deep Reinforcement Learning and Stackelberg Game
Chen Han et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band
Zhihong Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
When Machine Learning Meets Wireless Cellular Networks: Deployment, Challenges, and Applications
Ursula Challita et al.
IEEE COMMUNICATIONS MAGAZINE (2020)
Dynamic Traffic Management for SD-WAN Inter-Cloud Communication
Zbigniew Dulinski et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)
A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems
Walid Saad et al.
IEEE NETWORK (2020)
A Two-Timescale Approach for Network Slicing in C-RAN
He Zhang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems
Ning Xie et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2020)
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things
Tiago M. Fernandez-Carames
IEEE INTERNET OF THINGS JOURNAL (2020)
Federated learning for 6G communications: Challenges, methods, and future directions
Yi Liu et al.
China Communications (2020)
A taxonomy of AI techniques for 6G communication networks
Karan Sheth et al.
COMPUTER COMMUNICATIONS (2020)
Blockchain-Empowered Framework for Decentralized Network Management in 6G
Taras Maksymyuk et al.
IEEE COMMUNICATIONS MAGAZINE (2020)
DeepPR: Progressive Recovery for Interdependent VNFs With Deep Reinforcement Learning
Genya Ishigaki et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)
Cooperative Jamming for Secure Transmission With Both Active and Passive Eavesdroppers
Jiangbo Si et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2020)
Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications
Van-Linh Nguyen et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Secure Transmission for Intelligent Reflecting Surface-Assisted mmWave and Terahertz Systems
Jingping Qiao et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2020)
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities
Shunliang Zhang et al.
COMPUTER NETWORKS (2020)
Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface
Sheng Hong et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2020)
Exploring a Brain-Based Cancelable Biometrics for Smart Headwear: Concept, Implementation, and Evaluation
Feng Lin et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)
Device Association for RAN Slicing Based on Hybrid Federated Deep Reinforcement Learning
Yi-Jing Liu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Visible Light Communication in 6G: Advances, Challenges, and Prospects
Nan Chi et al.
IEEE VEHICULAR TECHNOLOGY MAGAZINE (2020)
TOWARD SECURE AND LIGHTWEIGHT ACCESS AUTHENTICATION IN SAGINS
Su Yao et al.
IEEE WIRELESS COMMUNICATIONS (2020)
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Nesrine Kaaniche et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
IMP4GT: IMPersonation Attacks in 4G NeTworks
David Rupprecht et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Smart Jamming Attacks in 5G New Radio: A Review
Youness Arjoune et al.
2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)
Decentralized Public Key Infrastructures atop Blockchain
Yannan Li et al.
IEEE NETWORK (2020)
When Machine Learning Meets Privacy in 6G: A Survey
Yuanyuan Sun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Securing Vehicle-to-Everything (V2X) Communication Platforms
Monowar Hasan et al.
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2020)
Artificial-Intelligence-Enabled Intelligent 6G Networks
Helin Yang et al.
IEEE NETWORK (2020)
A Survey of Moving Target Defenses for Network Security
Sailik Sengupta et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Blockchain-enabled resource management and sharing for 6G communications
Hao Xu et al.
DIGITAL COMMUNICATIONS AND NETWORKS (2020)
Physical-Layer Security in Visible Light Communications
Anil Yesilkaya et al.
2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT) (2020)
Data Security and Privacy Protection for Cloud Storage: A Survey
Pan Yang et al.
IEEE ACCESS (2020)
A Survey on Security Aspects for 3GPP 5G Networks
Jin Cao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Muneeb Ul Hassan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Security and privacy in 6G networks: New areas and new challenges
Minghao Wang et al.
DIGITAL COMMUNICATIONS AND NETWORKS (2020)
A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
Koosha Sadeghi et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2020)
Federated Learning in Mobile Edge Networks: A Comprehensive Survey
Wei Yang Bryan Lim et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence
Guan Gui et al.
IEEE WIRELESS COMMUNICATIONS (2020)
Holographic MIMO Surfaces for 6G Wireless Networks: Opportunities, Challenges, and Trends
Chongwen Huang et al.
IEEE WIRELESS COMMUNICATIONS (2020)
Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges
Latif U. Khan et al.
IEEE ACCESS (2020)
Physical Layer Secret Key Generation in Static Environments
Nasser Aldaghri et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems
Ivan Farris et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
Furqan Jameel et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Learning-Aided Physical Layer Authentication as an Intelligent Process
He Fang et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Deep Learning Aided Grant-Free NOMA Toward Reliable Low-Latency Access in Tactile Internet of Things
Neng Ye et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
Mohamed Amine Ferrag et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges
Shi-Cho Cha et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond
Yueyue Dai et al.
IEEE NETWORK (2019)
6G Wireless Communications: Vision and Potential Techniques
Ping Yang et al.
IEEE NETWORK (2019)
Intelligent Resource Scheduling for 5G Radio Access Network Slicing
Mu Yan et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
6G WIRELESS NETWORKS Vision, Requirements, Architecture, and Key Technologies
Zhengquan Zhang et al.
IEEE VEHICULAR TECHNOLOGY MAGAZINE (2019)
6G TECHNOLOGIES Key Drivers, Core Requirements, System Architectures, and Enabling Technologies
Baiqing Zong et al.
IEEE VEHICULAR TECHNOLOGY MAGAZINE (2019)
Blockchain for Internet of Things: A Survey
Hong-Ning Dai et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Ten Trends in the Cellular Industry and an Outlook on 6G
Qi Bi
IEEE COMMUNICATIONS MAGAZINE (2019)
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
Jehad M. Hamamreh et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
vrAIn: A Deep Learning Approach Tailoring Computing and Radio Resources in Virtualized RANs
Jose A. Ayala-Romero et al.
MOBICOM'19: PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (2019)
Network Intrusion Detection for IoT Security Based on Learning Techniques
Nadia Chaabouni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Energy Depletion Attacks in Low Power Wireless Networks
Van-Linh Nguyen et al.
IEEE ACCESS (2019)
Security for 5G and Beyond
Ijaz Ahmad et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Deep Learning for Launching and Mitigating Wireless Jamming Attacks
Tugba Erpek et al.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2019)
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
Nataliia Neshenko et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond
Theodore S. Rappaport et al.
IEEE ACCESS (2019)
Security and Protocol Exploit Analysis of the 5G Specifications
Roger Piqueras Jover et al.
IEEE ACCESS (2019)
Space-Air-Ground Integrated Network: A Survey
Jiajia Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Comparative Analysis of Control Plane Security of SDN and Conventional Networks
AbdelRahman Abdou et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
On Security Research Towards Future Mobile Network Generations
David Rupprecht et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey
Qian Mao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions
Imtiaz Parvez et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Pilot Spoofing Attack Detection and Countermeasure
Jitendra K. Tugnait
IEEE TRANSACTIONS ON COMMUNICATIONS (2018)
Detection of Pilot Contamination Attack based on Uncoordinated Frequency Shifts
Weile Zhang et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2018)
Semantic-Aware Searching Over Encrypted Data for Cloud Computing
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A New Wireless Communication Paradigm through Software-Controlled Metasurfaces
Christos Liaskos et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Security and eavesdropping in terahertz wireless links
Jianjun Ma et al.
NATURE (2018)
A Formal Analysis of 5G Authentication
David Basin et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
NFV: Security Threats and Best Practices
Shankar Lal et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges
S. M. Riazul Islam et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
Yiliang Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
5G: Adaptable Networks Enabled by Versatile Radio Access Technologies
Conor Sexton et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks
Yuanwei Liu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)
Post-quantum cryptography
Daniel J. Bernstein et al.
NATURE (2017)
Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization
Peng Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
ECG Authentication for Mobile Devices
Juan Sebastian Arteaga-Falconi et al.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2016)
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
Salman Iqbal et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Survey on Threats and Attacks on Mobile Networks
Silvere Mavoungou et al.
IEEE ACCESS (2016)
Securing the Industrial-Tactile Internet of Things With Deterministic Silicon Photonics Switches
Ted H. Szymanski
IEEE ACCESS (2016)
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
Mohammad Haghighat et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
Pseudonym Schemes in Vehicular Networks: A Survey
Jonathan Petit et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Physical-Layer Security for MISO Visible Light Communication Channels
Ayman Mostafa et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2015)
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev et al.
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)
Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
Hongbo Liu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)
Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges
Valeria Loscri et al.
IEEE TRANSACTIONS ON NANOBIOSCIENCE (2014)
Security Challenges for the Public Cloud
Kui Ren et al.
IEEE INTERNET COMPUTING (2012)
Towards security in nano-communication: Challenges and opportunities
Falko Dressler et al.
Nano Communication Networks (2012)
Terahertz Terabit Wireless Communication
Kao-Cheng Huang et al.
IEEE MICROWAVE MAGAZINE (2011)
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks
Patrick Traynor et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2009)
Using the physical layer for wireless authentication in time-variant channels
Liang Xiao et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
NR Potlapally et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)
Enhancing security and privacy in biometrics-based authentication systems
NK Ratha et al.
IBM SYSTEMS JOURNAL (2001)