Deep learning in mobile and wireless networking: A survey

C Zhang, P Patras, H Haddadi - IEEE Communications surveys …, 2019 - ieeexplore.ieee.org
The rapid uptake of mobile devices and the rising popularity of mobile applications and
services pose unprecedented demands on mobile and wireless networking infrastructure …

A survey of deep learning techniques for cybersecurity in mobile networks

E Rodriguez, B Otero, N Gutierrez… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The widespread use of mobile devices, as well as the increasing popularity of mobile
services has raised serious cybersecurity challenges. In the last years, the number of …

GNPassGAN: improved generative adversarial networks for trawling offline password guessing

F Yu, MV Martin - 2022 IEEE European Symposium on Security …, 2022 - ieeexplore.ieee.org
The security of passwords depends on a thorough understanding of the strategies used by
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …

[HTML][HTML] Recurrent gans password cracker for iot password security enhancement

S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …

PassMon: a technique for password generation and strength estimation

S Murmu, H Kasyap, S Tripathy - Journal of Network and Systems …, 2022 - Springer
The password is the most prevalent and reliant mode of authentication by date. We often
come across many websites with user registration pages having different password strength …

Countering cross-technology jamming attack

Z Chi, Y Li, X Liu, W Wang, Y Yao, T Zhu… - Proceedings of the 13th …, 2020 - dl.acm.org
Internet-of-things (IoT) devices are sharing the radio frequency band (eg, 2.4 GHz ISM
band). The exponentially increasing number of IoT devices introduces potential security …

Machine learning and artificial intelligence in next-generation wireless network

W Iqbal, W Wang, T Zhu - arXiv preprint arXiv:2202.01690, 2021 - arxiv.org
Due to the advancement in technologies, the next-generation wireless network will be very
diverse, complicated, and according to the changed demands of the consumers. The current …

Password guessing via neural language modeling

H Li, M Chen, S Yan, C Jia, Z Li - … Conference, ML4CS 2019, Xi'an, China …, 2019 - Springer
Passwords are the major part of authentication in current social networks. The state-of-the-
art password guessing approaches, such as Markov model and probabilistic context-free …

ML-based Secure Low-Power Communication in Adversarial Contexts

G Song, T Zhu - arXiv preprint arXiv:2212.13689, 2022 - arxiv.org
As wireless network technology becomes more and more popular, mutual interference
between various signals has become more and more severe and common. Therefore, there …

A Secured Protocol for IoT Devices in Tactical Networks

W Wang, Z Chi, X Liu, AV Bhaskar… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Nowadays, Internet-of-Things (IoT) have shown great potential to improve the performance
of different applications. However, the advances of IoT also make the security issue become …