Deep reinforcement learning for cyber security
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …
being exposed to cyberattacks more than ever. The complexity and dynamics of …
Survey on physical layer security for 5G wireless networks
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …
methods. The idea of physical layer security is to take advantage of the propagation …
Beyond the bound: A new performance perspective for identification via channels
Identification via channels (ID) is a goal-oriented (Post-Shannon) communications paradigm
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …
6G and the Post‐Shannon Theory
Since the breakthrough of Shannon's seminal paper, researchers and engineers have
worked on codes and techniques that approach the fundamental limits of message …
worked on codes and techniques that approach the fundamental limits of message …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
Denial-of-service attacks on communication systems: Detectability and jammer knowledge
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …
paper, two classes of such jammers are considered: those with partial and full knowledge …
Performance analysis of identification codes
In this paper, we analyze the construction of identification codes. Identification codes are
based on the question:“Is the message I have just received the one I am interested in?”, as …
based on the question:“Is the message I have just received the one I am interested in?”, as …
[图书][B] Identification and other probabilistic models
R Ahlswede, A Ahlswede - 2021 - Springer
After an introduction to classical information theory, we present now primarily own methods
and models, which go considerably beyond it. They were also sketched in our Shannon …
and models, which go considerably beyond it. They were also sketched in our Shannon …
Common randomness generation and identification over Gaussian channels
Common randomness (CR), as a resource, is not commonly used in existing practical
communication systems. In the common randomness framework, both sender and receiver …
communication systems. In the common randomness framework, both sender and receiver …
Review of Physical Layer Security in 5G Wireless Networks
J Boodai, A Alqahtani, M Frikha - Applied Sciences, 2023 - mdpi.com
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate
and connect to the internet. However, as with any new technology, 5G networks also bring …
and connect to the internet. However, as with any new technology, 5G networks also bring …