2020
DOI: 10.1109/mwc.001.2000005
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Learning of Secure Wireless Communications: Confidential Transmission and Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The main drawback of the study is that Eve is assumed to have more noise than Bob. Another secure AE model is proposed in [296]. Similar to [295], the authors consider the design of a secure loss function based on cross-entropy.…”
Section: Anti-eavesdropping Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The main drawback of the study is that Eve is assumed to have more noise than Bob. Another secure AE model is proposed in [296]. Similar to [295], the authors consider the design of a secure loss function based on cross-entropy.…”
Section: Anti-eavesdropping Solutionsmentioning
confidence: 99%
“…Similar to [295], the authors consider the design of a secure loss function based on cross-entropy. As an addition, [296] also implements an authentication method into the AE.…”
Section: Anti-eavesdropping Solutionsmentioning
confidence: 99%
“…The main drawback of the study is that Eve is assumed to have more noise than Bob. Another secure AE model is proposed in [284]. Similar to [283], the authors consider the design of a secure loss function based on cross-entropy.…”
Section: Anti-eavesdropping Solutionsmentioning
confidence: 99%
“…Similar to [283], the authors consider the design of a secure loss function based on cross-entropy. As an addition, [284] also implements an authentication method into the AE.…”
Section: Anti-eavesdropping Solutionsmentioning
confidence: 99%
“…A major challenge comes from the increasing complexity in wireless systems, i.e., the chain of transmitter, channel and receiver. The two main approaches currently used to describe and optimize the system parameters are: i) model-based approach (e.g., using communication theory) where end-to-end communication is modelled as a set of blocks and each block can be parameterized and optimized independently, and, ii) model-free based approach (e.g., using machine learning techniques) where the whole system can be modelled and optimized as a single block [50]. The former approach is typically static, and, hence, performs well in stable environments.…”
Section: Location-based Authentication and Rf Fingerprintingmentioning
confidence: 99%