Physical layer security

A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions

Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11
Watermarking
Security of Signal Transmission
Physical layer security

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03
Watermarking
Physical layer security
Watermark Evaluation

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12
Cybersecurity
Security Analysis
Physical layer security

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP

Authors: Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang | Published: 2023-08-04 | Updated: 2023-10-27
Fuzzing
Poisoning
Physical layer security

6G White paper: Research challenges for Trust, Security and Privacy

Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning | Published: 2020-04-24 | Updated: 2020-04-30
Secure Communication Channel
Privacy Enhancing Technology
Physical layer security

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04
Adversarial Learning
Physical layer security
Communication Model

Generative Adversarial Network for Wireless Signal Spoofing

Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07
Attack Scenario Analysis
Machine Learning
Physical layer security