Machine learning-based physical layer security: techniques, open challenges, and applications
暂无分享,去创建一个
[1] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[2] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[3] Yan Xu,et al. Q-Learning Based Physical-Layer Secure Game Against Multiagent Attacks , 2019, IEEE Access.
[4] Pankaj Verma,et al. Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers , 2021, Wirel. Pers. Commun..
[5] Lajos Hanzo,et al. Learning-Aided Physical Layer Authentication as an Intelligent Process , 2018, IEEE Transactions on Communications.
[6] Huiming Wang,et al. Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.
[7] Ning Wang,et al. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.
[8] Qian Xu,et al. Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission , 2018, IEEE Transactions on Vehicular Technology.
[9] Hai Jiang,et al. Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.
[10] Cheng Li,et al. Physical Layer Security Enhancement for Satellite Communication Among Similar Channels: Relay Selection and Power Allocation , 2018, IEEE Systems Journal.
[11] Peichang Zhang,et al. A Novel Machine Learning Aided Antenna Selection Scheme for MIMO Internet of Things , 2020, Sensors.
[12] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[13] Arthur L. Samuel,et al. Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..
[14] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[15] Xiang Zhang,et al. Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.
[16] Wansu Lim,et al. Machine Learning for 5G/B5G Mobile and Wireless Communications: Potential, Limitations, and Future Directions , 2019, IEEE Access.
[17] Masahito Hayashi,et al. Physical Layer Security for RF Satellite Channels in the Finite-Length Regime , 2018, IEEE Transactions on Information Forensics and Security.
[18] Yuanwei Liu,et al. Interplay Between NOMA and Other Emerging Technologies: A Survey , 2019, IEEE Transactions on Cognitive Communications and Networking.
[19] Qian Wang,et al. Deep Neural Networks for CSI-Based Authentication , 2019, IEEE Access.
[20] Abdulhadi Shoufan,et al. Drone Pilot Identification by Classifying Radio-Control Signals , 2018, IEEE Transactions on Information Forensics and Security.
[21] Zhiguo Ding,et al. Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.
[22] Pingzhi Fan,et al. Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.
[23] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] Holger H. Hoos,et al. A survey on semi-supervised learning , 2019, Machine Learning.
[25] Derrick Wing Kwan Ng,et al. Two-Way Hybrid Terrestrial-Satellite Relaying Systems: Performance Analysis and Relay Selection , 2019, IEEE Transactions on Vehicular Technology.
[26] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[27] Mohamed-Slim Alouini,et al. On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.
[28] Brahmjit Singh,et al. Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..
[29] Shengli Fu,et al. Intelligent Massive MIMO Antenna Selection Using Monte Carlo Tree Search , 2019, IEEE Transactions on Signal Processing.
[30] Jingon Joung,et al. Machine Learning-Based Antenna Selection in Wireless Communications , 2016, IEEE Communications Letters.
[31] Yang Yang,et al. Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Access.
[32] Mohamed-Slim Alouini,et al. Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.
[33] Tom M. Mitchell,et al. Does Machine Learning Really Work? , 1997, AI Mag..
[34] Xiaowei Wang,et al. Data-Driven Relay Selection for Physical-Layer Security: A Decision Tree Approach , 2020, IEEE Access.
[35] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[36] Fumiyuki Adachi,et al. Deep Reinforcement Learning for UAV Navigation Through Massive MIMO Technique , 2019, IEEE Transactions on Vehicular Technology.
[37] Zhaoyue Zhang,et al. Trust Management Method of D2D Communication Based on RF Fingerprint Identification , 2018, IEEE Access.
[38] John S. Thompson,et al. Comment on "Relay Selection for Secure Cooperative Networks with Jamming" , 2012, IEEE Transactions on Wireless Communications.
[39] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[40] Yao Xu,et al. Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise , 2018, IEEE Access.
[41] Emad S. Hassan. Physical Layer Security in Wireless Networks , 2018 .
[42] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[43] Junaid Qadir,et al. Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges , 2017, IEEE Access.
[44] Kang An,et al. Physical Layer Security for Hybrid Satellite Terrestrial Relay Networks With Joint Relay Selection and User Scheduling , 2018, IEEE Access.
[45] Jong Wook Kim,et al. Q-Learning Algorithms: A Comprehensive Classification and Applications , 2019, IEEE Access.
[46] Zhenling Wang,et al. Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.
[47] Mohamed-Slim Alouini,et al. Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[48] Miaowen Wen,et al. Secure Outage Analysis for Cooperative NOMA Systems With Antenna Selection , 2020, IEEE Transactions on Vehicular Technology.
[49] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[50] Trung Quang Duong,et al. Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks , 2016, IEEE Transactions on Communications.
[51] Sang Hyun Park,et al. Deep Learning-Based mmWave Beam Selection for 5G NR/6G With Sub-6 GHz Channel Information: Algorithms and Prototype Validation , 2020, IEEE Access.
[52] Hyung Yun Kong,et al. CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.
[53] M. Cenk Gursoy,et al. Statistical Learning Based Joint Antenna Selection and User Scheduling for Single-Cell Massive MIMO Systems , 2020, IEEE Transactions on Green Communications and Networking.
[54] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[55] Peng Zhu,et al. Jammer-Aided Secure Communications for Cooperative NOMA Systems , 2019, IEEE Communications Letters.
[56] Mihaela van der Schaar,et al. Machine Learning in the Air , 2019, IEEE Journal on Selected Areas in Communications.
[57] Xiaoying Qiu,et al. A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network , 2020, IEEE Access.
[58] Yang Peng,et al. Deep Learning Aided Method for Automatic Modulation Recognition , 2019, IEEE Access.
[59] A. Ismail,et al. 5G Technology: Towards Dynamic Spectrum Sharing Using Cognitive Radio Networks , 2020, IEEE Access.
[60] Biing-Hwang Juang,et al. Deep Learning in Physical Layer Communications , 2018, IEEE Wireless Communications.
[61] Gunes Karabulut Kurt,et al. Transmit Antenna Selection for Large-Scale MIMO GSM With Machine Learning , 2020, IEEE Wireless Communications Letters.
[62] Tony Q. S. Quek,et al. Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach , 2018, IEEE Wireless Communications Letters.
[63] Rong Zheng,et al. Toward Robust Relay Placement in 60 GHz mmWave Wireless Personal Area Networks with Directional Antenna , 2016, IEEE Transactions on Mobile Computing.
[64] Zhou Yu,et al. Deep learning based RF fingerprinting for device identification and wireless security , 2018, Electronics Letters.
[65] Dong Wang,et al. A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[66] Hong Wen,et al. Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks , 2019, Sensors.
[67] Weihua Zhuang,et al. UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.
[68] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[69] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[70] David Malone,et al. A Novel Physical Layer Authentication With PAPR Reduction Based on Channel and Hardware Frequency Responses , 2020, IEEE Transactions on Circuits and Systems I: Regular Papers.
[71] Muhammad R. A. Khandaker,et al. Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue , 2017, IEEE Transactions on Wireless Communications.
[72] Hui-Ming Wang,et al. Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.
[73] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[74] Yong-Hwa Kim,et al. Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks , 2019, Electronics.
[75] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[76] Mohsen Guizani,et al. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.
[77] Xiaojiang Du,et al. Cooperative Communications With Relay Selection Based on Deep Reinforcement Learning in Wireless Sensor Networks , 2019, IEEE Sensors Journal.
[78] Bishal Thapa,et al. Machine Learning Approach to RF Transmitter Identification , 2017, IEEE Journal of Radio Frequency Identification.
[79] Mario Marchese,et al. Satellite Networking Integration in the 5G Ecosystem: Research Trends and Open Challenges , 2018, IEEE Network.
[80] Justin P. Coon,et al. Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering , 2017, IEEE Wireless Communications Letters.
[81] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[82] Stratis Ioannidis,et al. No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments , 2020, IEEE Transactions on Cognitive Communications and Networking.
[83] Trung Q. Duong,et al. Inconspicuous Manipulation for Social-Aware Relay Selection in Flying Internet of Things , 2019, IEEE Wireless Communications Letters.
[84] Guang Gong,et al. Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..
[85] Trung Q. Duong,et al. Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering , 2020, IEEE Wireless Communications Letters.
[86] Songlin Chen,et al. Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation , 2020, IEEE Internet of Things Journal.
[87] Jia Zhu,et al. Relay Selection for Improving Physical-Layer Security in Hybrid Satellite-Terrestrial Relay Networks , 2018, IEEE Access.
[88] Tushar Gupta,et al. Physical layer security of MIMO STBC over Rayleigh fading channels in the presence of channel estimation error , 2016 .
[89] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[90] Yueming Cai,et al. Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.
[91] Shweta Pal,et al. Secrecy Performance Analysis of Hybrid AF-DF Relaying Under Multi Hop Environment , 2020, Wirel. Pers. Commun..
[92] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[93] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[94] Hong Wen,et al. Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection , 2020 .
[95] Hien Quoc Ngo,et al. Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.
[96] Hongzhi Qian,et al. Relay selection algorithm based on social network combined with Q-learning for vehicle D2D communication , 2019, IET Commun..
[97] Xianbin Wang,et al. A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.
[98] Yu Bai,et al. Specific Emitter Identification Techniques for the Internet of Things , 2020, IEEE Access.
[99] Osvaldo Simeone,et al. A Very Brief Introduction to Machine Learning With Applications to Communication Systems , 2018, IEEE Transactions on Cognitive Communications and Networking.
[100] Mahbub Hassan,et al. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.
[101] Victor C. M. Leung,et al. Self-Organized Relay Selection for Cooperative Transmission in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.
[102] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[103] Pingzhi Fan,et al. Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.
[104] Wei-Ping Zhu,et al. Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks , 2018, IEEE Journal on Selected Areas in Communications.
[105] Furqan Jameel,et al. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[106] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..
[107] Lav Gupta,et al. Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.
[108] Ming Liu,et al. Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure , 2020, IEEE Transactions on Vehicular Technology.
[109] Caijun Zhong,et al. Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.
[110] Eduard A. Jorswieck,et al. Wiretap Code Design by Neural Network Autoencoders , 2020, IEEE Transactions on Information Forensics and Security.
[111] Hang Bai,et al. Performance evaluation of underlay cognitive hybrid satellite-terrestrial relay networks with relay selection scheme , 2019, IET Commun..
[112] Xiaowei Wang. Decision-Tree-Based Relay Selection in Dualhop Wireless Communications , 2019, IEEE Transactions on Vehicular Technology.
[113] Tarik Taleb,et al. Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments , 2020, IEEE Transactions on Wireless Communications.
[114] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[115] Walid Saad,et al. Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs , 2018, IEEE Wireless Communications.
[116] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[117] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).
[118] Jingjing Wang,et al. A Novel Cooperative Physical Layer Security Scheme for Satellite Downlinks , 2018, Chinese Journal of Electronics.
[119] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[120] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[121] Wei-Ping Zhu,et al. Secure Transmission in Cognitive Satellite Terrestrial Networks , 2016, IEEE Journal on Selected Areas in Communications.
[122] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[123] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[124] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[125] Prabhat K. Upadhyay,et al. Physical Layer Security of Multiuser Multirelay Hybrid Satellite-Terrestrial Relay Networks , 2019, IEEE Transactions on Vehicular Technology.
[126] Hoang Duong Tuan,et al. Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines , 2020, IEEE Access.
[127] Jingjing Huang,et al. Mobile physical layer spoofing detection based on sparse representation , 2018, IET Commun..
[128] David I. Laurenson,et al. On the Use of LEO Satellite Constellation for Active Network Management in Power Distribution Networks , 2012, IEEE Transactions on Smart Grid.
[129] Poonam Jindal,et al. Cooperative Communication in Physical Layer Security: Technologies and Challenges , 2019, Wirel. Pers. Commun..
[130] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[131] Miaowen Wen,et al. Secrecy-Enhancing Scheme for Spatial Modulation , 2018, IEEE Communications Letters.
[132] Robert Schober,et al. MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining , 2013, IEEE Communications Letters.
[133] Bo He,et al. Human-Centered Reinforcement Learning: A Survey , 2019, IEEE Transactions on Human-Machine Systems.
[134] Hamid Behroozi,et al. Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things , 2020, IEEE Transactions on Information Forensics and Security.
[135] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[136] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[137] Hong Wen,et al. Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication , 2019, IEEE Access.
[138] Harald Haas,et al. Index Modulation Techniques for Next-Generation Wireless Networks , 2017, IEEE Access.
[139] Junjie Yan,et al. Malicious-Behavior-Aware D2D Link Selection Mechanism , 2017, IEEE Access.
[140] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[141] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[142] Ranjan Bose,et al. Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.
[143] Yonina C. Eldar,et al. Cognitive radar antenna selection via deep learning , 2018, IET Radar, Sonar & Navigation.
[144] Jakob Hoydis,et al. An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.
[145] Pankaj Verma. Adaptive Threshold Based Energy Detection over Rayleigh Fading Channel , 2020, Wirel. Pers. Commun..
[146] Yu Zhang,et al. Secure mmWave Communication Using UAV-Enabled Relay and Cooperative Jammer , 2019, IEEE Access.
[147] Brahmjit Singh,et al. Throughput maximization by alternative use of single and double thresholds based energy detection method , 2016 .
[148] Mohamed-Slim Alouini,et al. Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[149] Feng Zhao,et al. Multi‐class import vector machine for transmit antenna selection in MIMO systems , 2020 .
[150] Sunghwan Kim,et al. Relay selection Algorithm for wireless cooperative networks: a learning-based approach , 2017, IET Commun..
[151] Wei-Ping Zhu,et al. Secrecy performance of hybrid satellite-terrestrial relay networks in the presence of multiple eavesdroppers , 2018, IET Commun..
[152] Fengkui Gong,et al. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users , 2020, IEEE Transactions on Vehicular Technology.
[153] Sheng Wu,et al. Physical Layer Authentication Enhancement Using a Gaussian Mixture Model , 2018, IEEE Access.
[154] Xiaohong Jiang,et al. On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.
[155] Shengyao Wang,et al. Deep Neural Network Assisted Approach for Antenna Selection in Untrusted Relay Networks , 2019, IEEE Wireless Communications Letters.