Deep learning in mobile and wireless networking: A survey
The rapid uptake of mobile devices and the rising popularity of mobile applications and
services pose unprecedented demands on mobile and wireless networking infrastructure …
services pose unprecedented demands on mobile and wireless networking infrastructure …
A survey of deep learning techniques for cybersecurity in mobile networks
The widespread use of mobile devices, as well as the increasing popularity of mobile
services has raised serious cybersecurity challenges. In the last years, the number of …
services has raised serious cybersecurity challenges. In the last years, the number of …
GNPassGAN: improved generative adversarial networks for trawling offline password guessing
The security of passwords depends on a thorough understanding of the strategies used by
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …
[HTML][HTML] Recurrent gans password cracker for iot password security enhancement
S Nam, S Jeon, H Kim, J Moon - Sensors, 2020 - mdpi.com
Text-based passwords are a fundamental and popular means of authentication. Password
authentication can be simply implemented because it does not require any equipment …
authentication can be simply implemented because it does not require any equipment …
PassMon: a technique for password generation and strength estimation
S Murmu, H Kasyap, S Tripathy - Journal of Network and Systems …, 2022 - Springer
The password is the most prevalent and reliant mode of authentication by date. We often
come across many websites with user registration pages having different password strength …
come across many websites with user registration pages having different password strength …
Countering cross-technology jamming attack
Internet-of-things (IoT) devices are sharing the radio frequency band (eg, 2.4 GHz ISM
band). The exponentially increasing number of IoT devices introduces potential security …
band). The exponentially increasing number of IoT devices introduces potential security …
Machine learning and artificial intelligence in next-generation wireless network
Due to the advancement in technologies, the next-generation wireless network will be very
diverse, complicated, and according to the changed demands of the consumers. The current …
diverse, complicated, and according to the changed demands of the consumers. The current …
Password guessing via neural language modeling
H Li, M Chen, S Yan, C Jia, Z Li - … Conference, ML4CS 2019, Xi'an, China …, 2019 - Springer
Passwords are the major part of authentication in current social networks. The state-of-the-
art password guessing approaches, such as Markov model and probabilistic context-free …
art password guessing approaches, such as Markov model and probabilistic context-free …
ML-based Secure Low-Power Communication in Adversarial Contexts
G Song, T Zhu - arXiv preprint arXiv:2212.13689, 2022 - arxiv.org
As wireless network technology becomes more and more popular, mutual interference
between various signals has become more and more severe and common. Therefore, there …
between various signals has become more and more severe and common. Therefore, there …
A Secured Protocol for IoT Devices in Tactical Networks
Nowadays, Internet-of-Things (IoT) have shown great potential to improve the performance
of different applications. However, the advances of IoT also make the security issue become …
of different applications. However, the advances of IoT also make the security issue become …