Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …
Smart jamming attacks in 5G new radio: A review
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …
emergency services, natural disasters rescue, public safety, and military communications …
Learning k for kNN Classification
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …
mining and machine learning due to its simple implementation and distinguished …
Jamming and anti–jamming techniques in wireless networks: a survey
Because of the proliferation of wireless technologies, jamming in wireless networks has
become a major research problem due to the ease in blocking communication in wireless …
become a major research problem due to the ease in blocking communication in wireless …
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
In this work, we take on the role of a wireless adversary and investigate one of its most
powerful tools---radio frequency jamming. Although different jammer designs are discussed …
powerful tools---radio frequency jamming. Although different jammer designs are discussed …
A statistical approach to detect jamming attacks in wireless sensor networks
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising
network solutions with a wide variety of applications in the areas of agriculture, environment …
network solutions with a wide variety of applications in the areas of agriculture, environment …
Jamming detection in low-ber mobile indoor scenarios via deep learning
S Sciancalepore, F Kusters… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The current state of the art on jamming detection relies on link-layer metrics. A few examples
are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …
are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …
Jamming resilient communication using MIMO interference cancellation
Jamming attack is a serious threat to the wireless communications. Reactive jamming
maximizes the attack efficiency by jamming only when the targets are communicating, which …
maximizes the attack efficiency by jamming only when the targets are communicating, which …
Physical layer wireless security made fast and channel independent
There is a growing interest in physical layer security. Recent work has demonstrated that
wireless devices can generate a shared secret key by exploiting variations in their channel …
wireless devices can generate a shared secret key by exploiting variations in their channel …
Detection of reactive jamming in DSSS-based wireless communications
Reactive jammers have been shown to be a serious threat for wireless communication.
Despite this, it is difficult to detect their presence reliably. We propose a novel method to …
Despite this, it is difficult to detect their presence reliably. We propose a novel method to …