Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

Beyond the bound: A new performance perspective for identification via channels

C Von Lengerke, A Hefele, JA Cabrera… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Identification via channels (ID) is a goal-oriented (Post-Shannon) communications paradigm
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …

6G and the Post‐Shannon Theory

JA Cabrera, H Boche, C Deppe… - Shaping Future 6G …, 2021 - Wiley Online Library
Since the breakthrough of Shannon's seminal paper, researchers and engineers have
worked on codes and techniques that approach the fundamental limits of message …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Denial-of-service attacks on communication systems: Detectability and jammer knowledge

H Boche, RF Schaefer, HV Poor - IEEE Transactions on Signal …, 2020 - ieeexplore.ieee.org
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …

Performance analysis of identification codes

S Derebeyoğlu, C Deppe, R Ferrara - Entropy, 2020 - mdpi.com
In this paper, we analyze the construction of identification codes. Identification codes are
based on the question:“Is the message I have just received the one I am interested in?”, as …

[图书][B] Identification and other probabilistic models

R Ahlswede, A Ahlswede - 2021 - Springer
After an introduction to classical information theory, we present now primarily own methods
and models, which go considerably beyond it. They were also sketched in our Shannon …

Common randomness generation and identification over Gaussian channels

R Ezzine, W Labidi, H Boche… - GLOBECOM 2020-2020 …, 2020 - ieeexplore.ieee.org
Common randomness (CR), as a resource, is not commonly used in existing practical
communication systems. In the common randomness framework, both sender and receiver …

Review of Physical Layer Security in 5G Wireless Networks

J Boodai, A Alqahtani, M Frikha - Applied Sciences, 2023 - mdpi.com
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate
and connect to the internet. However, as with any new technology, 5G networks also bring …