Game theory for anti-jamming strategy in multichannel slow fading IoT networks
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …
attacks by malicious users. To detect their presence and to avoid such attacks, several …
Collaborative byzantine resilient federated learning
Federated learning (FL) enables an effective and private distributed learning process.
However, it is vulnerable against several types of attacks, such as Byzantine behaviors. The …
However, it is vulnerable against several types of attacks, such as Byzantine behaviors. The …
Federated learning stability under byzantine attacks
Federated Learning (FL) is a machine learning approach that enables private and
decentralized model training. Although FL has been shown to be very useful in several …
decentralized model training. Although FL has been shown to be very useful in several …
Robust beamforming design for STAR-RIS-assisted anti-jamming and secure transmission
T Zhou, K Xu, G Hu, X Xia, W Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Potential eavesdropping and malicious jamming attacks pose an enormous threat to
wireless communication. In this paper, a novel architecture of reconfigurable intelligent …
wireless communication. In this paper, a novel architecture of reconfigurable intelligent …
Accelerated iot anti-jamming: A game theoretic power allocation strategy
A jamming combating power allocation strategy is proposed to secure the data
communication in IoT networks. The proposed strategy aims to minimize the worst case …
communication in IoT networks. The proposed strategy aims to minimize the worst case …
Deep reinforcement learning-based anti-jamming algorithm using dual action network
Due to the open nature of wireless communication, malicious electromagnetic jamming has
long been a severe threat to the establishment and stability of communication links. To …
long been a severe threat to the establishment and stability of communication links. To …
A secure energy efficient scheme for cooperative IoT networks
A secure energy efficient approach is proposed to connect Internet of Things (IoT) sensors
that operate with limited power resources. This is done by optimizing simultaneously the …
that operate with limited power resources. This is done by optimizing simultaneously the …
Adversarial jamming and catching games over AWGN channels with mobile players
G Perin, A Buratto, NM Anselmi… - … on Wireless and …, 2021 - ieeexplore.ieee.org
We consider a wireless jamming game played by a receiver and a malicious interferer that
wants to disrupt communication. The outcome of the game depends on the characteristics of …
wants to disrupt communication. The outcome of the game depends on the characteristics of …
Toward secure IoT networks in healthcare applications: A game-theoretic anti-jamming framework
The Internet of Things (IoT) is used to interconnect a massive number of heterogeneous
resource-constrained smart devices. This makes such networks exposed to various types of …
resource-constrained smart devices. This makes such networks exposed to various types of …
Security challenges and solutions in IoT networks for the smart cities
A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …
Overpopulation in urban cities causes numerous problems including environmental …