2023
DOI: 10.1109/twc.2022.3192225
|View full text |Cite
|
Sign up to set email alerts
|

Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 42 publications
0
1
0
Order By: Relevance
“…The research by [94] brings forward a scalable solution for Next Generation Internet of Things (NGIoT) networks, leveraging beam pattern features of mmWave devices. In contrast, [95] and [96] provide varied methodologies, focusing on the 5G mmWave 60 GHz band and Akaike, Bayesian, and Generalized Information Criteria, respectively. Expanding the horizon, [97] and [98] delve into the potentials and challenges within wireless communications, with [99] concluding our discussion by introducing Thermal Pattern Analysis as a promising tool for spoofing attack prediction.…”
Section: Spoofing Attacks In V2x Communication Scenariosmentioning
confidence: 99%
“…The research by [94] brings forward a scalable solution for Next Generation Internet of Things (NGIoT) networks, leveraging beam pattern features of mmWave devices. In contrast, [95] and [96] provide varied methodologies, focusing on the 5G mmWave 60 GHz band and Akaike, Bayesian, and Generalized Information Criteria, respectively. Expanding the horizon, [97] and [98] delve into the potentials and challenges within wireless communications, with [99] concluding our discussion by introducing Thermal Pattern Analysis as a promising tool for spoofing attack prediction.…”
Section: Spoofing Attacks In V2x Communication Scenariosmentioning
confidence: 99%
“…where h 2 ∼ CN (0, β 2 ) is the channel gain of the wireless link from the computational node N 2 to the edge server, and P 2 denotes the transmit power at the computational node N 2 . Particularly, P 1 and P 2 should satisfy the following constraint [16,17],…”
Section: System Modelmentioning
confidence: 99%
“…Deep learning-based models have already surpassed classical machine learning-based approaches in various text mining fields [15][16][17]. One of the key steps in traditional machine learning is to extract features, but feature extraction has a disadvantage of relying mainly on human labor and each extraction method is not universal.…”
Section: Introductionmentioning
confidence: 99%