Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas

P Scalise, M Boeding, M Hempel, H Sharif… - Future Internet, 2024 - mdpi.com
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …

Channel-aware adversarial attacks against deep learning-based wireless signal classifiers

B Kim, YE Sagduyu, K Davaslioglu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper presents channel-aware adversarial attacks against deep learning-based
wireless signal classifiers. There is a transmitter that transmits signals with different …

[HTML][HTML] Ml-based 5g network slicing security: A comprehensive survey

R Dangi, A Jadhav, G Choudhary, N Dragoni… - Future Internet, 2022 - mdpi.com
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband
and communication services. There has been a continuing advancement from 4G to 5G …

Vulnerability of machine learning approaches applied in iot-based smart grid: A review

Z Zhang, M Liu, M Sun, R Deng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Machine learning (ML) sees an increasing prevalence of being used in the Internet of Things
(IoT)-based smart grid. However, the trustworthiness of ML is a severe issue that must be …

Evasion attack and defense on machine learning models in cyber-physical systems: A survey

S Wang, RKL Ko, G Bai, N Dong… - … surveys & tutorials, 2023 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML)
techniques to reduce labor costs and improve efficiency. However, the adoption of ML also …

Seamless connectivity: The power of integrating power line and wireless communications

MV Ribeiro, ML Filomeno… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Aimed at inspiring researchers and practitioners, this paper presents comprehensive and
multidimensional discussions of the potential and benefits of integrating power line and …

Unveiling the potential of NOMA: A journey to next generation multiple access

A Ahmed, W **ngfu, A Hawbani, W Yuan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The revolutionary sixth-generation wireless communications technologies and applications,
notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air …