4.6 Article

Physical layer authentication in UAV-enabled relay networks based on manifold learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Information Systems

Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts

Xiaohu You et al.

Summary: 6G wireless communication networks are expected to provide global coverage, enhanced spectral/energy/cost efficiency, better intelligence level and security, relying on new enabling technologies such as air interface, transmission technologies, and novel network architecture.

SCIENCE CHINA-INFORMATION SCIENCES (2021)

Review Computer Science, Information Systems

A survey of prototype and experiment for UAV communications

Qingheng Song et al.

Summary: The paper provides a comprehensive survey on prototype and experimental measurements for UAV communications, focusing on cellular-connected UAVs, aerial relays, and data collection/dissemination scenarios. It also discusses future directions for UAV communications research and development.

SCIENCE CHINA-INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Initial Satellite Access Authentication Based on Doppler Frequency Shift

Qing-Yi Fu et al.

Summary: The future mobile system requires satellite access for ubiquitous wireless connection. However, satellite communication is vulnerable to spoofing attacks, especially for the downlink SIS, which can cause interference and denial of services.

IEEE WIRELESS COMMUNICATIONS LETTERS (2021)

Article Engineering, Electrical & Electronic

Safeguarding Cluster Heads in UAV Swarm Using Edge Intelligence: Linear Discriminant Analysis-Based Cross-Layer Authentication

Huanchi Wang et al.

Summary: This paper proposes a novel CH safeguarding mechanism enabled by edge intelligence utilizing a situational-aware authentication scheme, improving system security and performing better under a dynamic environment.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2021)

Article Engineering, Electrical & Electronic

Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks

Shida Xia et al.

Summary: This paper proposes a multi-attribute-based PHY-layer authentication scheme considering correlation, and studies reconstruction and heuristic algorithms to find a suboptimal solution with low complexity. It also introduces an unsupervised machine learning based clustering algorithm to enhance reliability. The proposed scheme does not require prior information or a training set, demonstrating a more universal approach to PHY-layer authentication.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks

Hui-Ming Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

Multi-view diffusion maps

Ofir Lindenbaum et al.

INFORMATION FUSION (2020)

Article Computer Science, Information Systems

Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering

Tiep M. Hoang et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Information Systems

Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

Run-Fa Liao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Gaussian bandwidth selection for manifold learning and classification

Ofir Lindenbaum et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2020)

Article Engineering, Electrical & Electronic

UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Perspective

Hui-Ming Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Automation & Control Systems

Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction

Changjun Jiang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

An area based physical layer authentication framework to detect spoofing attacks

Na Li et al.

SCIENCE CHINA-INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives

Lili Jiang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective

Haijun Wang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Engineering, Electrical & Electronic

Learning-Aided Physical Layer Authentication as an Intelligent Process

He Fang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Joint Beamforming and Power Allocation for UAV-Enabled Full-Duplex Relay

Qingheng Song et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Enhanced Authentication Based on Angle of Signal Arrivals

Amr Abdelaziz et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

UAV Communications for 5G and Beyond: Recent Advances and Future Trends

Bin Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated Navigation

Yan Guo et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Multi-Drone 3-D Trajectory Planning and Scheduling in Drone-Assisted Radio Access Networks

Weisen Shi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Hardware & Architecture

Physical Layer Security in UAV Systems: Challenges and Opportunities

Xiaofang Sun et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions

Hui-Ming Wang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

Secure UAV Communication Networks over 5G

Bin Li et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Multidisciplinary Sciences

Intrinsic dimension estimation for locally undersampled data

Vittorio Erba et al.

SCIENTIFIC REPORTS (2019)

Article Automation & Control Systems

Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS

Fei Pan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Artificial Intelligence

Manifold learning techniques for unsupervised anomaly detection

C. C. Olson et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Telecommunications

Joint Trajectory and Power Optimization for UAV Relay Networks

Shuhang Zhang et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Engineering, Electrical & Electronic

Combating the Control Signal Spoofing Attack in UAV Systems

Ke-Wen Huang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Review Computer Science, Information Systems

Overview of 5G security technology

Xinsheng Ji et al.

SCIENCE CHINA-INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Physical Layer Authentication Enhancement Using a Gaussian Mixture Model

Xiaoying Qiu et al.

IEEE ACCESS (2018)

Article Telecommunications

Physical-Layer Authentication Based on Extreme Learning Machine

Ning Wang et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Engineering, Electrical & Electronic

Throughput Maximization for UAV-Enabled Mobile Relaying Systems

Yong Zeng et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Intrinsic dimension estimation: Advances and open problems

Francesco Camastra et al.

INFORMATION SCIENCES (2016)

Article Engineering, Electrical & Electronic

Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets

Weikun Hou et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2014)

Article Engineering, Electrical & Electronic

Multiscale Anomaly Detection Using Diffusion Maps

Gal Mishne et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2013)

Article Engineering, Electrical & Electronic

HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing

Xiaofan He et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Computer Science, Information Systems

LTE/SAE Security Issues on 4G Wireless Networks

Anastasios N. Bikos et al.

IEEE SECURITY & PRIVACY (2013)

Article Computer Science, Artificial Intelligence

Fractal-Based Intrinsic Dimension Estimation and Its Application in Dimensionality Reduction

Dengyao Mo et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)

Article Multidisciplinary Sciences

Detecting intrinsic slow variables in stochastic dynamical systems by anisotropic diffusion maps

Amit Singer et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2009)

Article Engineering, Electrical & Electronic

Security analysis and enhancements of 3GPP authentication and key agreement protocol

MX Zhang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2005)