Physical layer security (PLS) technologies have attracted much attention in recent years for their potential to provide information-theoretically secure communications. Artificial Noise (AN)-aided transmission is considered as one of the most practicable PLS technologies, as it can realize secure transmission independent of the eavesdropper’s channel status. In this paper, we reveal that AN transmission has the dependency of eavesdropper’s channel condition by introducing our proposed attack method based on a supervised-learning algorithm which utilizes the modulation scheme, available from known packet preamble and/or header information, as supervisory signals of training data. Numerical simulation results with the comparison to convention...
WOS: 000470838000028Physical layer security (PLS) has emerged as a new concept and powerful alternat...
A novel method for providing physical layer security (PLS) depending on the randomness of wireless c...
As wireless network technology becomes more and more popular, mutual interference between various si...
Physical layer security (PLS) technologies have attracted much attention in recent years for their ...
Most physical-layer security (PLS) work employ information theoretic metrics for performance analysi...
Machine Learning (ML) is becoming a cornerstone enabling technology for the next generation of wirel...
peer reviewedIn this work, we introduce a machine-learning (ML) based detection attack, where an eav...
Physical layer security schemes for wireless communication systems have been broadly studied from an...
The problem of determining the source of a message in a wireless communication link is challenging, ...
We consider a communication scenario, in which an intruder tries to determine the modulation scheme ...
This article presents a framework for converting wireless signals into structured datasets, which ca...
In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-ou...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
WOS: 000470838000028Physical layer security (PLS) has emerged as a new concept and powerful alternat...
A novel method for providing physical layer security (PLS) depending on the randomness of wireless c...
As wireless network technology becomes more and more popular, mutual interference between various si...
Physical layer security (PLS) technologies have attracted much attention in recent years for their ...
Most physical-layer security (PLS) work employ information theoretic metrics for performance analysi...
Machine Learning (ML) is becoming a cornerstone enabling technology for the next generation of wirel...
peer reviewedIn this work, we introduce a machine-learning (ML) based detection attack, where an eav...
Physical layer security schemes for wireless communication systems have been broadly studied from an...
The problem of determining the source of a message in a wireless communication link is challenging, ...
We consider a communication scenario, in which an intruder tries to determine the modulation scheme ...
This article presents a framework for converting wireless signals into structured datasets, which ca...
In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-ou...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Abstract—Existing studies on physical layer security often assume the availability of perfect channe...
WOS: 000470838000028Physical layer security (PLS) has emerged as a new concept and powerful alternat...
A novel method for providing physical layer security (PLS) depending on the randomness of wireless c...
As wireless network technology becomes more and more popular, mutual interference between various si...