ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1505.07919
  4. Cited By
A Survey on Wireless Security: Technical Challenges, Recent Advances and
  Future Trends
v1v2 (latest)

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

29 May 2015
Yulong Zou
Jia Zhu
Xianbin Wang
L. Hanzo
ArXiv (abs)PDFHTML

Papers citing "A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends"

44 / 44 papers shown
Title
Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF Fingerprinting
Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF Fingerprinting
Tianya Zhao
Ningning Wang
Junqing Zhang
Xuyu Wang
AAML
73
0
0
01 May 2025
Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks
Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks
Li Yang
Shimaa A. Naser
Abdallah Shami
Sami Muhaidat
Lyndon Ong
Merouane Debbah
105
2
0
28 Feb 2025
Adversarial Network Optimization under Bandit Feedback: Maximizing
  Utility in Non-Stationary Multi-Hop Networks
Adversarial Network Optimization under Bandit Feedback: Maximizing Utility in Non-Stationary Multi-Hop Networks
Yan Dai
Longbo Huang
70
2
0
29 Aug 2024
Generative AI for Secure Physical Layer Communications: A Survey
Generative AI for Secure Physical Layer Communications: A Survey
Changyuan Zhao
Hongyang Du
Dusit Niyato
Jiawen Kang
Zehui Xiong
Dong In Kim
Xuemin
X. Shen
K. B. Letaief
91
22
0
21 Feb 2024
How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical
  Systems
How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems
Stephanie Gil
M. Yemini
A. Chorti
Angelia Nedić
H. Vincent Poor
Andrea J. Goldsmith
AI4CE
108
12
0
13 Nov 2023
Data-driven classification of low-power communication signals by an
  unauthenticated user using a software-defined radio
Data-driven classification of low-power communication signals by an unauthenticated user using a software-defined radio
Tarun Rao Keshabhoina
Marcos M. Vasconcelos
21
0
0
08 Sep 2023
Open-Set RF Fingerprinting via Improved Prototype Learning
Open-Set RF Fingerprinting via Improved Prototype Learning
Weidong Wang
H. Liao
Lu Gan
50
0
0
24 Jun 2023
It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates
  Against an Eavesdropping Node
It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates Against an Eavesdropping Node
Laura Crosara
Nicola Laurenti
L. Badia
25
1
0
14 Jun 2023
Physical Layer Authentication and Security Design in the Machine
  Learning Era
Physical Layer Authentication and Security Design in the Machine Learning Era
T. M. Hoang
Alireza Vahid
H. Tuan
L. Hanzo
84
23
0
16 May 2023
Semi-Supervised RF Fingerprinting with Consistency-Based Regularization
Semi-Supervised RF Fingerprinting with Consistency-Based Regularization
Weidong Wang
Cheng Luo
Jiancheng An
Lu Gan
H. Liao
Chau Yuen
51
13
0
28 Apr 2023
Collaborative Authentication for 6G Networks: An Edge Intelligence based
  Autonomous Approach
Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach
He Fang
Zhenlong Xiao
Xianbin Wang
Li Xu
L. Hanzo
117
16
0
27 Mar 2023
Federated Radio Frequency Fingerprinting with Model Transfer and
  Adaptation
Federated Radio Frequency Fingerprinting with Model Transfer and Adaptation
Chuanting Zhang
Shuping Dang
Junqing Zhang
Haixia Zhang
M. Beach
64
2
0
22 Feb 2023
Optimal Privacy Preserving for Federated Learning in Mobile Edge
  Computing
Optimal Privacy Preserving for Federated Learning in Mobile Edge Computing
Hai M. Nguyen
N. Chu
Diep N. Nguyen
D. Hoang
Van-Dinh Nguyen
Minh Hoàng Hà
E. Dutkiewicz
Marwan Krunz
FedML
70
1
0
14 Nov 2022
Enabling Deep Learning-based Physical-layer Secret Key Generation for
  FDD-OFDM Systems in Multi-Environments
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments
Xinwei Zhang
Guyue Li
Junqing Zhang
Linning Peng
A. Hu
Xianbin Wang
75
11
0
06 Nov 2022
Smart Channel State Information Pre-processing for Joint Authentication
  and Secret Key Distillation
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
M. Srinivasan
Sotiris Skaperas
A. Chorti
Mahdi Shakiba-Herfeh
M. K. Shehzad
P. Sehier
51
1
0
01 Jun 2022
Physical Layer Security for 6G Systems why it is needed and how to make
  it happen
Physical Layer Security for 6G Systems why it is needed and how to make it happen
A. Chorti
42
0
0
03 May 2022
Evaluating the Security of Open Radio Access Networks
Evaluating the Security of Open Radio Access Networks
D. Mimran
Ron Bitton
Y. Kfir
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
A. Shabtai
73
25
0
16 Jan 2022
Waveform-Defined Security: A Low-Cost Framework for Secure
  Communications
Waveform-Defined Security: A Low-Cost Framework for Secure Communications
Tongyang Xu
21
7
0
21 Dec 2021
Reinforcement Learning for Security-Aware Computation Offloading in
  Satellite Networks
Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks
Saurav Sthapit
Subhash Lakshminarayana
Ligang He
Gregory Epiphaniou
Carsten Maple
81
20
0
09 Nov 2021
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
M. Srinivasan
Sotiris Skaperas
A. Chorti
51
10
0
28 Oct 2021
Internet-of-Things Devices and Assistive Technologies for Healthcare:
  Applications, Challenges, and Opportunities
Internet-of-Things Devices and Assistive Technologies for Healthcare: Applications, Challenges, and Opportunities
Marc Jayson Baucas
P. Spachos
S. Gregori
30
35
0
11 Jul 2021
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems
Xinwei Zhang
Guyue Li
Junqing Zhang
A. Hu
Zongyue Hou
Bin Xiao
30
59
0
18 May 2021
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and
  Countermeasures
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
Hussain Ahmad
I. Dharmadasa
Faheem Ullah
M. Babar
61
26
0
24 Apr 2021
Artificial Intelligence for Satellite Communication: A Review
Artificial Intelligence for Satellite Communication: A Review
Fares Fourati
Mohamed-Slim Alouini
95
113
0
25 Jan 2021
Radio Frequency Fingerprint Identification for LoRa Using Spectrogram
  and CNN
Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN
Guanxiong Shen
Junqing Zhang
A. Marshall
Linning Peng
Xianbin Wang
106
108
0
30 Dec 2020
Internet Security Awareness of Filipinos: A Survey Paper
Internet Security Awareness of Filipinos: A Survey Paper
Challiz D. Omorog
Ruji P. Medina
33
10
0
21 Nov 2020
Safeguarding the IoT from Malware Epidemics: A Percolation Theory
  Approach
Safeguarding the IoT from Malware Epidemics: A Percolation Theory Approach
Ainur Zhaikhan
Mustafa A. Kishk
Hesham Elsawy
Mohamed-Slim Alouini
38
16
0
24 Oct 2020
Unleashing the power of disruptive and emerging technologies amid
  COVID-19: A detailed review
Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review
Sonali Agarwal
Narinder Singh Punn
S. K. Sonbhadra
M. Tanveer
P. Nagabhushan
K. K. S. Pandian
Praveer Saxena
63
58
0
23 May 2020
Non-Orthogonal Waveforms in Secure Communications
Non-Orthogonal Waveforms in Secure Communications
Tongyang Xu
39
0
0
21 Apr 2020
Physical Layer Authentication for Non-coherent Massive SIMO-Based
  Industrial IoT Communications
Physical Layer Authentication for Non-coherent Massive SIMO-Based Industrial IoT Communications
Zhifang Gu
Hong Chen
P. Xu
Yonghui Li
Branka Vucetic
43
6
0
21 Jan 2020
UAV-Aided Jamming for Secure Ground Communication with Unknown
  Eavesdropper Location
UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location
C. Nnamani
Muhammad R. A. Khandaker
M. Sellathurai
20
21
0
25 Nov 2019
BrokenStrokes: On the (in)Security of Wireless Keyboards
BrokenStrokes: On the (in)Security of Wireless Keyboards
Gabriele Oligeri
Savio Sciancalepore
Simone Raponi
Roberto Di Pietro
51
9
0
09 Oct 2019
Security in Brain-Computer Interfaces: State-of-the-art, opportunities,
  and future challenges
Security in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges
Sergio López Bernal
Alberto Huertas Celdrán
Gregorio Martínez Pérez
Michael Taynnan Barros
Sasitharan Balasubramaniam
89
13
0
09 Aug 2019
Learning-Aided Physical Layer Attacks Against Multicarrier
  Communications in IoT
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Alireza Nooraiepour
W. Bajwa
N. Mandayam
AAML
33
8
0
01 Aug 2019
Secure OTA Software Updates in Connected Vehicles: A survey
Secure OTA Software Updates in Connected Vehicles: A survey
Subir Halder
Amrita Ghosal
Mauro Conti
21
30
0
01 Apr 2019
Learning and Management for Internet-of-Things: Accounting for
  Adaptivity and Scalability
Learning and Management for Internet-of-Things: Accounting for Adaptivity and Scalability
Tianyi Chen
Sergio Barbarossa
Xin Wang
G. Giannakis
Zhi-Li Zhang
73
81
0
27 Oct 2018
Physical Layer Key Generation for Secure Power Line Communications
Physical Layer Key Generation for Secure Power Line Communications
Federico Passerini
Andrea M. Tonello
24
13
0
25 Sep 2018
Learning-Aided Physical Layer Authentication as an Intelligent Process
Learning-Aided Physical Layer Authentication as an Intelligent Process
He Fang
Xianbin Wang
L. Hanzo
63
141
0
07 Aug 2018
Secure Mobile Edge Computing in IoT via Collaborative Online Learning
Secure Mobile Edge Computing in IoT via Collaborative Online Learning
Bingcong Li
Tianyi Chen
G. Giannakis
37
31
0
09 May 2018
Securing the Internet of Things in the Age of Machine Learning and
  Software-defined Networking
Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking
Francesco Restuccia
Salvatore D’oro
Tommaso Melodia
53
204
0
13 Mar 2018
Securing Wireless Communications of the Internet of Things from the
  Physical Layer, An Overview
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
Junqing Zhang
T. Duong
Roger Francis Woods
A. Marshall
58
78
0
17 Aug 2017
Surveillance and Intervention of Infrastructure-Free Mobile
  Communications: A New Wireless Security Paradigm
Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm
Jie Xu
Lingjie Duan
Rui Zhang
40
120
0
23 Dec 2016
State Estimation with Secrecy against Eavesdroppers
State Estimation with Secrecy against Eavesdroppers
Anastasios Tsiamis
Konstantinos Gatsis
George J. Pappas
53
55
0
15 Dec 2016
Random-Training-Assisted Pilot Spoofing Detection and Secure
  Transmission
Random-Training-Assisted Pilot Spoofing Detection and Secure Transmission
Xiaowen Tian
Ming Li
Qian Liu
34
0
0
01 Sep 2016
1