Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
RIS-assisted visible light communication systems: A tutorial
Recent intensive and extensive development of the fifth-generation (5G) of cellular networks
has led to their deployment throughout much of the world. As part of this implementation …
has led to their deployment throughout much of the world. As part of this implementation …
Intelligent reflecting surface assisted anti-jamming communications: A fast reinforcement learning approach
Malicious jamming launched by smart jammers can attack legitimate transmissions, which
has been regarded as one of the critical security challenges in wireless communications …
has been regarded as one of the critical security challenges in wireless communications …
An intermittent anti-competition communication mechanism based formation maneuvers for the internet of unmanned surface vehicles
B Huang, X Ren, B Zhou, Z Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The development of unmanned surface vehicles (USVs) technologies considerably promote
the application of Internet of Things (IoT) in marine activities. However, frequently changed …
the application of Internet of Things (IoT) in marine activities. However, frequently changed …
GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable
to interference attacks by malicious jammers, which endangers the communication quality of …
to interference attacks by malicious jammers, which endangers the communication quality of …
Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …
Outage constrained robust beamforming optimization for multiuser IRS-assisted anti-jamming communications with incomplete information
Malicious jamming attacks have been regarded as a serious threat to Internet of Things (IoT)
networks, which can significantly degrade the Quality of Service (QoS) of users. This article …
networks, which can significantly degrade the Quality of Service (QoS) of users. This article …
Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions
L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
communication networks are vulnerable to jamming attacks, and effective anti-jamming …
Cloud-fog automation: Vision, enabling technologies, and future research directions
The Industry 4.0 digital transformation envisages future industrial systems to be fully
automated, including the control, upgrade, and configuration processes of a large number of …
automated, including the control, upgrade, and configuration processes of a large number of …
Wireless communication, sensing, and REM: A security perspective
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …
awareness, flexibility, and intelligence as essential building blocks of future wireless …