Machine learning-based physical layer security: techniques, open challenges, and applications

[1]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[2]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[3]  Yan Xu,et al.  Q-Learning Based Physical-Layer Secure Game Against Multiagent Attacks , 2019, IEEE Access.

[4]  Pankaj Verma,et al.  Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers , 2021, Wirel. Pers. Commun..

[5]  Lajos Hanzo,et al.  Learning-Aided Physical Layer Authentication as an Intelligent Process , 2018, IEEE Transactions on Communications.

[6]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Ning Wang,et al.  Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.

[8]  Qian Xu,et al.  Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission , 2018, IEEE Transactions on Vehicular Technology.

[9]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[10]  Cheng Li,et al.  Physical Layer Security Enhancement for Satellite Communication Among Similar Channels: Relay Selection and Power Allocation , 2018, IEEE Systems Journal.

[11]  Peichang Zhang,et al.  A Novel Machine Learning Aided Antenna Selection Scheme for MIMO Internet of Things , 2020, Sensors.

[12]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[13]  Arthur L. Samuel,et al.  Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..

[14]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[15]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[16]  Wansu Lim,et al.  Machine Learning for 5G/B5G Mobile and Wireless Communications: Potential, Limitations, and Future Directions , 2019, IEEE Access.

[17]  Masahito Hayashi,et al.  Physical Layer Security for RF Satellite Channels in the Finite-Length Regime , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Yuanwei Liu,et al.  Interplay Between NOMA and Other Emerging Technologies: A Survey , 2019, IEEE Transactions on Cognitive Communications and Networking.

[19]  Qian Wang,et al.  Deep Neural Networks for CSI-Based Authentication , 2019, IEEE Access.

[20]  Abdulhadi Shoufan,et al.  Drone Pilot Identification by Classifying Radio-Control Signals , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Zhiguo Ding,et al.  Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.

[22]  Pingzhi Fan,et al.  Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.

[23]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[24]  Holger H. Hoos,et al.  A survey on semi-supervised learning , 2019, Machine Learning.

[25]  Derrick Wing Kwan Ng,et al.  Two-Way Hybrid Terrestrial-Satellite Relaying Systems: Performance Analysis and Relay Selection , 2019, IEEE Transactions on Vehicular Technology.

[26]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[27]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[28]  Brahmjit Singh,et al.  Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..

[29]  Shengli Fu,et al.  Intelligent Massive MIMO Antenna Selection Using Monte Carlo Tree Search , 2019, IEEE Transactions on Signal Processing.

[30]  Jingon Joung,et al.  Machine Learning-Based Antenna Selection in Wireless Communications , 2016, IEEE Communications Letters.

[31]  Yang Yang,et al.  Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Access.

[32]  Mohamed-Slim Alouini,et al.  Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.

[33]  Tom M. Mitchell,et al.  Does Machine Learning Really Work? , 1997, AI Mag..

[34]  Xiaowei Wang,et al.  Data-Driven Relay Selection for Physical-Layer Security: A Decision Tree Approach , 2020, IEEE Access.

[35]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[36]  Fumiyuki Adachi,et al.  Deep Reinforcement Learning for UAV Navigation Through Massive MIMO Technique , 2019, IEEE Transactions on Vehicular Technology.

[37]  Zhaoyue Zhang,et al.  Trust Management Method of D2D Communication Based on RF Fingerprint Identification , 2018, IEEE Access.

[38]  John S. Thompson,et al.  Comment on "Relay Selection for Secure Cooperative Networks with Jamming" , 2012, IEEE Transactions on Wireless Communications.

[39]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[40]  Yao Xu,et al.  Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise , 2018, IEEE Access.

[41]  Emad S. Hassan Physical Layer Security in Wireless Networks , 2018 .

[42]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[43]  Junaid Qadir,et al.  Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges , 2017, IEEE Access.

[44]  Kang An,et al.  Physical Layer Security for Hybrid Satellite Terrestrial Relay Networks With Joint Relay Selection and User Scheduling , 2018, IEEE Access.

[45]  Jong Wook Kim,et al.  Q-Learning Algorithms: A Comprehensive Classification and Applications , 2019, IEEE Access.

[46]  Zhenling Wang,et al.  Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.

[47]  Mohamed-Slim Alouini,et al.  Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[48]  Miaowen Wen,et al.  Secure Outage Analysis for Cooperative NOMA Systems With Antenna Selection , 2020, IEEE Transactions on Vehicular Technology.

[49]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[50]  Trung Quang Duong,et al.  Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks , 2016, IEEE Transactions on Communications.

[51]  Sang Hyun Park,et al.  Deep Learning-Based mmWave Beam Selection for 5G NR/6G With Sub-6 GHz Channel Information: Algorithms and Prototype Validation , 2020, IEEE Access.

[52]  Hyung Yun Kong,et al.  CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.

[53]  M. Cenk Gursoy,et al.  Statistical Learning Based Joint Antenna Selection and User Scheduling for Single-Cell Massive MIMO Systems , 2020, IEEE Transactions on Green Communications and Networking.

[54]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[55]  Peng Zhu,et al.  Jammer-Aided Secure Communications for Cooperative NOMA Systems , 2019, IEEE Communications Letters.

[56]  Mihaela van der Schaar,et al.  Machine Learning in the Air , 2019, IEEE Journal on Selected Areas in Communications.

[57]  Xiaoying Qiu,et al.  A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network , 2020, IEEE Access.

[58]  Yang Peng,et al.  Deep Learning Aided Method for Automatic Modulation Recognition , 2019, IEEE Access.

[59]  A. Ismail,et al.  5G Technology: Towards Dynamic Spectrum Sharing Using Cognitive Radio Networks , 2020, IEEE Access.

[60]  Biing-Hwang Juang,et al.  Deep Learning in Physical Layer Communications , 2018, IEEE Wireless Communications.

[61]  Gunes Karabulut Kurt,et al.  Transmit Antenna Selection for Large-Scale MIMO GSM With Machine Learning , 2020, IEEE Wireless Communications Letters.

[62]  Tony Q. S. Quek,et al.  Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach , 2018, IEEE Wireless Communications Letters.

[63]  Rong Zheng,et al.  Toward Robust Relay Placement in 60 GHz mmWave Wireless Personal Area Networks with Directional Antenna , 2016, IEEE Transactions on Mobile Computing.

[64]  Zhou Yu,et al.  Deep learning based RF fingerprinting for device identification and wireless security , 2018, Electronics Letters.

[65]  Dong Wang,et al.  A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[66]  Hong Wen,et al.  Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks , 2019, Sensors.

[67]  Weihua Zhuang,et al.  UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.

[68]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[69]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[70]  David Malone,et al.  A Novel Physical Layer Authentication With PAPR Reduction Based on Channel and Hardware Frequency Responses , 2020, IEEE Transactions on Circuits and Systems I: Regular Papers.

[71]  Muhammad R. A. Khandaker,et al.  Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue , 2017, IEEE Transactions on Wireless Communications.

[72]  Hui-Ming Wang,et al.  Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.

[73]  Hamed Haddadi,et al.  Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[74]  Yong-Hwa Kim,et al.  Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks , 2019, Electronics.

[75]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[76]  Mohsen Guizani,et al.  Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.

[77]  Xiaojiang Du,et al.  Cooperative Communications With Relay Selection Based on Deep Reinforcement Learning in Wireless Sensor Networks , 2019, IEEE Sensors Journal.

[78]  Bishal Thapa,et al.  Machine Learning Approach to RF Transmitter Identification , 2017, IEEE Journal of Radio Frequency Identification.

[79]  Mario Marchese,et al.  Satellite Networking Integration in the 5G Ecosystem: Research Trends and Open Challenges , 2018, IEEE Network.

[80]  Justin P. Coon,et al.  Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering , 2017, IEEE Wireless Communications Letters.

[81]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[82]  Stratis Ioannidis,et al.  No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments , 2020, IEEE Transactions on Cognitive Communications and Networking.

[83]  Trung Q. Duong,et al.  Inconspicuous Manipulation for Social-Aware Relay Selection in Flying Internet of Things , 2019, IEEE Wireless Communications Letters.

[84]  Guang Gong,et al.  Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..

[85]  Trung Q. Duong,et al.  Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering , 2020, IEEE Wireless Communications Letters.

[86]  Songlin Chen,et al.  Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation , 2020, IEEE Internet of Things Journal.

[87]  Jia Zhu,et al.  Relay Selection for Improving Physical-Layer Security in Hybrid Satellite-Terrestrial Relay Networks , 2018, IEEE Access.

[88]  Tushar Gupta,et al.  Physical layer security of MIMO STBC over Rayleigh fading channels in the presence of channel estimation error , 2016 .

[89]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[90]  Yueming Cai,et al.  Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.

[91]  Shweta Pal,et al.  Secrecy Performance Analysis of Hybrid AF-DF Relaying Under Multi Hop Environment , 2020, Wirel. Pers. Commun..

[92]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[93]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[94]  Hong Wen,et al.  Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection , 2020 .

[95]  Hien Quoc Ngo,et al.  Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.

[96]  Hongzhi Qian,et al.  Relay selection algorithm based on social network combined with Q-learning for vehicle D2D communication , 2019, IET Commun..

[97]  Xianbin Wang,et al.  A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.

[98]  Yu Bai,et al.  Specific Emitter Identification Techniques for the Internet of Things , 2020, IEEE Access.

[99]  Osvaldo Simeone,et al.  A Very Brief Introduction to Machine Learning With Applications to Communication Systems , 2018, IEEE Transactions on Cognitive Communications and Networking.

[100]  Mahbub Hassan,et al.  Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.

[101]  Victor C. M. Leung,et al.  Self-Organized Relay Selection for Cooperative Transmission in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[102]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[103]  Pingzhi Fan,et al.  Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.

[104]  Wei-Ping Zhu,et al.  Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks , 2018, IEEE Journal on Selected Areas in Communications.

[105]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[106]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..

[107]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[108]  Ming Liu,et al.  Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure , 2020, IEEE Transactions on Vehicular Technology.

[109]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[110]  Eduard A. Jorswieck,et al.  Wiretap Code Design by Neural Network Autoencoders , 2020, IEEE Transactions on Information Forensics and Security.

[111]  Hang Bai,et al.  Performance evaluation of underlay cognitive hybrid satellite-terrestrial relay networks with relay selection scheme , 2019, IET Commun..

[112]  Xiaowei Wang Decision-Tree-Based Relay Selection in Dualhop Wireless Communications , 2019, IEEE Transactions on Vehicular Technology.

[113]  Tarik Taleb,et al.  Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments , 2020, IEEE Transactions on Wireless Communications.

[114]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[115]  Walid Saad,et al.  Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs , 2018, IEEE Wireless Communications.

[116]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[117]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[118]  Jingjing Wang,et al.  A Novel Cooperative Physical Layer Security Scheme for Satellite Downlinks , 2018, Chinese Journal of Electronics.

[119]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[120]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[121]  Wei-Ping Zhu,et al.  Secure Transmission in Cognitive Satellite Terrestrial Networks , 2016, IEEE Journal on Selected Areas in Communications.

[122]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[123]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[124]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[125]  Prabhat K. Upadhyay,et al.  Physical Layer Security of Multiuser Multirelay Hybrid Satellite-Terrestrial Relay Networks , 2019, IEEE Transactions on Vehicular Technology.

[126]  Hoang Duong Tuan,et al.  Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines , 2020, IEEE Access.

[127]  Jingjing Huang,et al.  Mobile physical layer spoofing detection based on sparse representation , 2018, IET Commun..

[128]  David I. Laurenson,et al.  On the Use of LEO Satellite Constellation for Active Network Management in Power Distribution Networks , 2012, IEEE Transactions on Smart Grid.

[129]  Poonam Jindal,et al.  Cooperative Communication in Physical Layer Security: Technologies and Challenges , 2019, Wirel. Pers. Commun..

[130]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[131]  Miaowen Wen,et al.  Secrecy-Enhancing Scheme for Spatial Modulation , 2018, IEEE Communications Letters.

[132]  Robert Schober,et al.  MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining , 2013, IEEE Communications Letters.

[133]  Bo He,et al.  Human-Centered Reinforcement Learning: A Survey , 2019, IEEE Transactions on Human-Machine Systems.

[134]  Hamid Behroozi,et al.  Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things , 2020, IEEE Transactions on Information Forensics and Security.

[135]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[136]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[137]  Hong Wen,et al.  Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication , 2019, IEEE Access.

[138]  Harald Haas,et al.  Index Modulation Techniques for Next-Generation Wireless Networks , 2017, IEEE Access.

[139]  Junjie Yan,et al.  Malicious-Behavior-Aware D2D Link Selection Mechanism , 2017, IEEE Access.

[140]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[141]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[142]  Ranjan Bose,et al.  Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.

[143]  Yonina C. Eldar,et al.  Cognitive radar antenna selection via deep learning , 2018, IET Radar, Sonar & Navigation.

[144]  Jakob Hoydis,et al.  An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.

[145]  Pankaj Verma Adaptive Threshold Based Energy Detection over Rayleigh Fading Channel , 2020, Wirel. Pers. Commun..

[146]  Yu Zhang,et al.  Secure mmWave Communication Using UAV-Enabled Relay and Cooperative Jammer , 2019, IEEE Access.

[147]  Brahmjit Singh,et al.  Throughput maximization by alternative use of single and double thresholds based energy detection method , 2016 .

[148]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[149]  Feng Zhao,et al.  Multi‐class import vector machine for transmit antenna selection in MIMO systems , 2020 .

[150]  Sunghwan Kim,et al.  Relay selection Algorithm for wireless cooperative networks: a learning-based approach , 2017, IET Commun..

[151]  Wei-Ping Zhu,et al.  Secrecy performance of hybrid satellite-terrestrial relay networks in the presence of multiple eavesdroppers , 2018, IET Commun..

[152]  Fengkui Gong,et al.  Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users , 2020, IEEE Transactions on Vehicular Technology.

[153]  Sheng Wu,et al.  Physical Layer Authentication Enhancement Using a Gaussian Mixture Model , 2018, IEEE Access.

[154]  Xiaohong Jiang,et al.  On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.

[155]  Shengyao Wang,et al.  Deep Neural Network Assisted Approach for Antenna Selection in Untrusted Relay Networks , 2019, IEEE Wireless Communications Letters.