Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
[HTML][HTML] Unleashing the potential of sixth generation (6G) wireless networks in smart energy grid management: A comprehensive review
As the world continues to seek sustainable and efficient energy solutions, the integration of
advanced technologies into smart energy grid management (SEGM) becomes a paramount …
advanced technologies into smart energy grid management (SEGM) becomes a paramount …
A survey on explainable ai for 6g o-ran: Architecture, use cases, challenges and research directions
The recent O-RAN specifications promote the evolution of RAN architecture by function
disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop …
disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
Secure video offloading in multi-UAV-enabled MEC networks: A deep reinforcement learning approach
Unmanned aerial vehicle (UAV)-enabled mobile-edge computing (MEC) has been widely
applied in Internet of Things networks while the security risk of wireless computation …
applied in Internet of Things networks while the security risk of wireless computation …
Blockchain-Based Federated Learning with Enhanced Privacy and Security Using Homomorphic Encryption and Reputation
Federated learning, leveraging distributed data from multiple nodes to train a common
model, allows for the use of more data to improve the model while also protecting the privacy …
model, allows for the use of more data to improve the model while also protecting the privacy …
Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …
enables a transmitter to convey information covertly to a recipient without being detected by …
Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments
Satellite communications (Satcoms) systems have become an integral part of modern
society, providing critical infrastructure for a wide range of applications. However, as the …
society, providing critical infrastructure for a wide range of applications. However, as the …
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G)
networks due to dense connectivity, ultrareliability, low latency, and high throughput …
networks due to dense connectivity, ultrareliability, low latency, and high throughput …
Trust Management of Tiny Federated Learning in Internet of Unmanned Aerial Vehicles
Lightweight training and distributed tiny data storage in the local model will lead to the
severe challenge of convergence for tiny federated learning (FL). Achieving fast …
severe challenge of convergence for tiny federated learning (FL). Achieving fast …