{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T23:21:55Z","timestamp":1769210515050,"version":"3.49.0"},"reference-count":167,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010426","name":"UGC-DAE\u00a0Consortium for Scientific Research, University Grants Commission","doi-asserted-by":"publisher","award":["22482\/(OBC)\/(NET-DEC.2015)"],"award-info":[{"award-number":["22482\/(OBC)\/(NET-DEC.2015)"]}],"id":[{"id":"10.13039\/501100010426","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11276-021-02781-1","type":"journal-article","created":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T16:02:31Z","timestamp":1631980951000},"page":"5351-5383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Machine learning-based physical layer security: techniques, open challenges, and applications"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0236-6738","authenticated-orcid":false,"given":"Anil Kumar","family":"Kamboj","sequence":"first","affiliation":[]},{"given":"Poonam","family":"Jindal","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,18]]},"reference":[{"key":"2781_CR1","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K. K., & Gao, X. (2018). A Survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 36, 679\u2013695. https:\/\/doi.org\/10.1109\/JSAC.2018.2825560","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2781_CR2","doi-asserted-by":"publisher","unstructured":"Dhanda SS, Singh B, Jindal P. Lightweight Cryptography: A Solution to Secure IoT. Springer US; 2020. doi: https:\/\/doi.org\/10.1007\/s11277-020-07134-3.","DOI":"10.1007\/s11277-020-07134-3"},{"key":"2781_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/jiot.2019.2927379","volume":"6","author":"N Wang","year":"2019","unstructured":"Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., & Zeng, K. (2019). Physical layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet of Things Journal, 6, 1\u20131. https:\/\/doi.org\/10.1109\/jiot.2019.2927379","journal-title":"IEEE Internet of Things Journal"},{"key":"2781_CR4","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Duong, T. Q., Marshall, A., & Woods, R. (2016). Key generation from wireless channels: A review. IEEE Access, 4, 614\u2013626. https:\/\/doi.org\/10.1109\/ACCESS.2016.2521718","journal-title":"IEEE Access"},{"key":"2781_CR5","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"JM Hamamreh","year":"2019","unstructured":"Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2019). Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys and Tutorials, 21, 1773\u20131828. https:\/\/doi.org\/10.1109\/COMST.2018.2878035","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR6","doi-asserted-by":"publisher","first-page":"2734","DOI":"10.1109\/COMST.2018.2865607","volume":"21","author":"F Jameel","year":"2018","unstructured":"Jameel, F., Wyne, S., Kaddoum, G., & Duong, T. Q. (2018). A Comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Communications Surveys and Tutorials, 21, 2734\u20132771. https:\/\/doi.org\/10.1109\/COMST.2018.2865607","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR7","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"D Wang","year":"2019","unstructured":"Wang, D., Bai, B., Zhao, W., & Han, Z. (2019). A survey of optimization approaches for wireless physical layer security. IEEE Communications Surveys and Tutorials, 21, 1878\u20131911. https:\/\/doi.org\/10.1109\/COMST.2018.2883144","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR8","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104, 1727\u20131765. https:\/\/doi.org\/10.1109\/JPROC.2016.2558521","journal-title":"Proceedings of the IEEE"},{"key":"2781_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2015.7120011","volume":"53","author":"W Trappe","year":"2015","unstructured":"Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53, 16\u201320. https:\/\/doi.org\/10.1109\/MCOM.2015.7120011","journal-title":"IEEE Communications Magazine"},{"key":"2781_CR10","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16, 1550\u20131573. https:\/\/doi.org\/10.1109\/SURV.2014.012314.00178","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"2781_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"The Bell System Technical Journal"},{"issue":"8","key":"2781_CR12","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal., 54(8), 1355\u20131387. https:\/\/doi.org\/10.1002\/j.1538-7305.1975.tb02040.x","journal-title":"Bell System Technical Journal."},{"key":"2781_CR13","volume-title":"Physical layer security in wireless communications","author":"X Zhou","year":"2013","unstructured":"Zhou, X., Song, L., & Zhang, Y. (2013). Physical layer security in wireless communications. CRC Press."},{"key":"2781_CR14","doi-asserted-by":"crossref","unstructured":"Duong TQ et.al. Trusted Communications with Physical Layer Security for 5G and Beyond.IET;2017","DOI":"10.1049\/PBTE076E"},{"key":"2781_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781315106106-3","author":"ES Hassan","year":"2019","unstructured":"Hassan, E. S., & Hassan, E. S. (2019). Physical layer security in wireless. Networks. https:\/\/doi.org\/10.1201\/9781315106106-3","journal-title":"Networks"},{"key":"2781_CR16","first-page":"93","volume":"56","author":"A Mukherjee","year":"2013","unstructured":"Mukherjee, A., Fakoorian, S. A., Huang, J., Swindlehurst, L., Zhou, X., Song, L., & Zhang, Y. (2013). MIMO signal processing algorithms for enhanced physical layer security. Physical Layer Security in Wireless Communications, 56, 93\u2013114.","journal-title":"Physical Layer Security in Wireless Communications"},{"key":"2781_CR17","doi-asserted-by":"publisher","first-page":"137184","DOI":"10.1109\/ACCESS.2019.2942390","volume":"7","author":"ME Morocho-Cayamcela","year":"2019","unstructured":"Morocho-Cayamcela, M. E., Lee, H., & Lim, W. (2019). Machine learning for 5G\/B5G mobile and wireless communications: Potential, limitations, and future directions. IEEE Access, 7, 137184\u2013137206. https:\/\/doi.org\/10.1109\/ACCESS.2019.2942390","journal-title":"IEEE Access"},{"key":"2781_CR18","doi-asserted-by":"publisher","first-page":"2184","DOI":"10.1109\/jsac.2019.2933969","volume":"37","author":"D Gunduz","year":"2019","unstructured":"Gunduz, D., de Kerret, P., Sidiropoulos, N. D., Gesbert, D., Murthy, C. R., & van der Schaar, M. (2019). Machine learning in the air. IEEE Journal on Selected Areas in Communications, 37, 2184\u20132199. https:\/\/doi.org\/10.1109\/jsac.2019.2933969","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2781_CR19","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/TCCN.2018.2881442","volume":"4","author":"O Simeone","year":"2018","unstructured":"Simeone, O. (2018). A very brief introduction to machine learning with applications to communication systems. IEEE Transactions on Cognitive Communications and Networking, 4, 648\u2013664. https:\/\/doi.org\/10.1109\/TCCN.2018.2881442","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"2781_CR20","doi-asserted-by":"publisher","first-page":"133653","DOI":"10.1109\/ACCESS.2019.2941229","volume":"7","author":"B Jang","year":"2019","unstructured":"Jang, B., Kim, M., Harerimana, G., & Kim, J. W. (2019). Q-learning algorithms: A comprehensive classification and applications. IEEE Access, 7, 133653\u2013133667. https:\/\/doi.org\/10.1109\/ACCESS.2019.2941229","journal-title":"IEEE Access"},{"key":"2781_CR21","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/THMS.2019.2912447","volume":"49","author":"G Li","year":"2019","unstructured":"Li, G., Gomez, R., Nakamura, K., & He, B. (2019). Human-centered reinforcement learning: A survey. IEEE Transactions on Human-Machine Systems, 49, 337\u2013349. https:\/\/doi.org\/10.1109\/THMS.2019.2912447","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"2781_CR22","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TCCN.2017.2758370","volume":"3","author":"T O\u2019Shea","year":"2017","unstructured":"O\u2019Shea, T., & Hoydis, J. (2017). An introduction to deep learning for the physical layer. IEEE Transactions on Cognitive Communications and Networking, 3, 563\u2013575. https:\/\/doi.org\/10.1109\/TCCN.2017.2758370","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"2781_CR23","doi-asserted-by":"publisher","first-page":"109063","DOI":"10.1109\/access.2019.2933448","volume":"7","author":"C Yang","year":"2019","unstructured":"Yang, C., He, Z., Peng, Y., Wang, Y., & Yang, J. (2019). Deep learning aided method for automatic modulation recognition. IEEE Access, 7, 109063\u2013109068. https:\/\/doi.org\/10.1109\/access.2019.2933448","journal-title":"IEEE Access"},{"key":"2781_CR24","doi-asserted-by":"publisher","first-page":"31595","DOI":"10.1109\/ACCESS.2021.3059648","volume":"9","author":"TM Hoang","year":"2021","unstructured":"Hoang, T. M., Duong, T. Q., Tuan, H. D., Lambotharan, S., & Hanzo, L. (2021). Physical layer security: Detection of active eavesdropping attacks by support vector machines. IEEE Access, 9, 31595\u201331607. https:\/\/doi.org\/10.1109\/ACCESS.2021.3059648","journal-title":"IEEE Access"},{"key":"2781_CR25","unstructured":"Germain KS, Kragh F. Physical-Layer Authentication Using Channel State Information and Machine Learning. arXiv preprint https:\/\/arxiv.org\/abs\/2006.03695. 2020 Jun 5."},{"key":"2781_CR26","doi-asserted-by":"publisher","first-page":"26139","DOI":"10.1109\/ACCESS.2020.2971260","volume":"8","author":"X Qiu","year":"2020","unstructured":"Qiu, X., Dai, J., & Hayes, M. (2020). A learning approach for physical layer authentication using adaptive neural network. IEEE Access., 8, 26139\u201336149. https:\/\/doi.org\/10.1109\/ACCESS.2020.2971260","journal-title":"IEEE Access."},{"key":"2781_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017767","author":"T Zhang","year":"2020","unstructured":"Zhang, T., Wen, H., Tang, J., Song, H., & Xie, F. (2020). Cooperative jamming secure scheme for iwns random mobile users aided by edge computing intelligent node selection. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2020.3017767","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2781_CR28","doi-asserted-by":"publisher","first-page":"12105","DOI":"10.1109\/ACCESS.2020.2965963","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang, X., & Liu, F. (2020). Data-driven relay selection for physical-layer security: A decision tree approach. IEEE Access, 8, 12105\u201312116. https:\/\/doi.org\/10.1109\/ACCESS.2020.2965963","journal-title":"IEEE Access"},{"key":"2781_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08458-4","author":"AK Kamboj","year":"2021","unstructured":"Kamboj, A. K., Jindal, P., & Verma, P. (2021). Intelligent physical layer secure relay selection for wireless cooperative networks with multiple eavesdroppers. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08458-4","journal-title":"Wireless Personal Communications"},{"key":"2781_CR30","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1109\/LWC.2018.2805902","volume":"7","author":"D He","year":"2018","unstructured":"He, D., Liu, C., Quek, T. Q. S., & Wang, H. (2018). Transmit antenna selection in MIMO wiretap channels: A machine learning approach. IEEE Wireless Communications Letters, 7, 634\u2013637. https:\/\/doi.org\/10.1109\/LWC.2018.2805902","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR31","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1109\/LWC.2019.2933392","volume":"8","author":"R Yao","year":"2019","unstructured":"Yao, R., Zhang, Y., Wang, S., Qi, N., Miridakis, N. I., & Tsiftsis, T. A. (2019). Deep neural network assisted approach for antenna selection in untrusted relay networks. IEEE Wireless Communications Letters, 8, 1644\u20131647. https:\/\/doi.org\/10.1109\/LWC.2019.2933392","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR32","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2009.2026454","volume":"4","author":"L Xiao","year":"2009","unstructured":"Xiao, L., Greenstein, L. J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4, 492\u2013503. https:\/\/doi.org\/10.1109\/TIFS.2009.2026454","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR33","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1109\/JSAC.2013.130912","volume":"31","author":"JK Tugnait","year":"2013","unstructured":"Tugnait, J. K. (2013). Wireless user authentication via comparison of power spectral densities. IEEE Journal on Selected Areas in Communications, 31, 1791\u20131802. https:\/\/doi.org\/10.1109\/JSAC.2013.130912","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2781_CR34","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TCOMM.2014.032914.120921","volume":"62","author":"W Hou","year":"2014","unstructured":"Hou, W., Wang, X., Chouinard, J. Y., & Refaey, A. (2014). Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Transactions on Communications, 62, 1658\u20131667. https:\/\/doi.org\/10.1109\/TCOMM.2014.032914.120921","journal-title":"IEEE Transactions on Communications"},{"key":"2781_CR35","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/TCSI.2019.2952936","volume":"67","author":"P Ramabadran","year":"2020","unstructured":"Ramabadran, P., Afanasyev, P., Malone, D., Leeser, M., McCarthy, D., O\u2019Brien, B., et al. (2020). A novel physical layer authentication with PAPR reduction based on channel and hardware frequency responses. IEEE Transactions on Circuits and Systems I: Regular Papers, 67, 526\u2013539. https:\/\/doi.org\/10.1109\/TCSI.2019.2952936","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"2781_CR36","doi-asserted-by":"publisher","first-page":"6076","DOI":"10.1109\/TWC.2013.110813.121671","volume":"12","author":"VNQ Bao","year":"2013","unstructured":"Bao, V. N. Q., Linh-Trung, N., & Debbah, M. (2013). Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Transactions on Wireless Communications, 12, 6076\u20136085. https:\/\/doi.org\/10.1109\/TWC.2013.110813.121671","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR37","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1109\/TWC.2019.2955128","volume":"19","author":"P Zhang","year":"2020","unstructured":"Zhang, P., Taleb, T., Jiang, X., & Wu, B. (2020). Physical layer authentication for massive MIMO systems with hardware impairments. IEEE Transactions on Wireless Communications, 19, 1563\u20131576. https:\/\/doi.org\/10.1109\/TWC.2019.2955128","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR38","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TIFS.2018.2868538","volume":"14","author":"A Vazquez-Castro","year":"2019","unstructured":"Vazquez-Castro, A., & Hayashi, M. (2019). Physical layer security for RF satellite channels in the finite-length regime. IEEE Transactions on Information Forensics and Security, 14, 981\u2013993. https:\/\/doi.org\/10.1109\/TIFS.2018.2868538","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR39","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TIFS.2007.916273","volume":"3","author":"PL Yu","year":"2008","unstructured":"Yu, P. L., Baras, J. S., & Sadler, B. M. (2008). Physical-layer authentication. IEEE Transactions on Information Forensics and Security, 3, 38\u201351. https:\/\/doi.org\/10.1109\/TIFS.2007.916273","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR40","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/LWC.2017.2689024","volume":"6","author":"G Chen","year":"2017","unstructured":"Chen, G., & Coon, J. P. (2017). Secrecy outage analysis in random wireless networks with antenna selection and user ordering. IEEE Wireless Communications Letters, 6, 334\u2013337. https:\/\/doi.org\/10.1109\/LWC.2017.2689024","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR41","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1109\/TWC.2012.12.112208","volume":"11","author":"G Chen","year":"2012","unstructured":"Chen, G., Dwyer, V., Krikidis, I., Thompson, J. S., McLaughlin, S., & Chambers, J. (2012). Comment on \u201crelay selection for secure cooperative networks with Jamming.\u201d IEEE Transactions on Wireless Communications, 11, 2351. https:\/\/doi.org\/10.1109\/TWC.2012.12.112208","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR42","doi-asserted-by":"publisher","first-page":"6259","DOI":"10.1109\/TVT.2015.2478029","volume":"65","author":"L Wang","year":"2016","unstructured":"Wang, L., Cai, Y., Zou, Y., Yang, W., & Hanzo, L. (2016). Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Transactions on Vehicular Technology, 65, 6259\u20136274. https:\/\/doi.org\/10.1109\/TVT.2015.2478029","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR43","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/LCOMM.2014.2379652","volume":"19","author":"A Jindal","year":"2015","unstructured":"Jindal, A., & Bose, R. (2015). Resource allocation for secure multicarrier AF relay system under total power constraint. IEEE Communications Letters, 19, 231\u2013234. https:\/\/doi.org\/10.1109\/LCOMM.2014.2379652","journal-title":"IEEE Communications Letters"},{"key":"2781_CR44","doi-asserted-by":"publisher","first-page":"5486","DOI":"10.1109\/TVT.2018.2813318","volume":"67","author":"Q Xu","year":"2018","unstructured":"Xu, Q., Ren, P., Du, Q., & Sun, L. (2018). Security-aware waveform and artificial noise design for time-reversal-based transmission. IEEE Transactions on Vehicular Technology, 67, 5486\u20135490. https:\/\/doi.org\/10.1109\/TVT.2018.2813318","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR45","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/LCOMM.2017.2783955","volume":"22","author":"XQ Jiang","year":"2018","unstructured":"Jiang, X. Q., Wen, M., Hai, H., Li, J., & Kim, S. (2018). Secrecy-enhancing scheme for spatial modulation. IEEE Communications Letters, 22, 550\u2013553. https:\/\/doi.org\/10.1109\/LCOMM.2017.2783955","journal-title":"IEEE Communications Letters"},{"key":"2781_CR46","doi-asserted-by":"publisher","first-page":"16693","DOI":"10.1109\/ACCESS.2017.2737528","volume":"5","author":"E Basar","year":"2017","unstructured":"Basar, E., Wen, M., Mesleh, R., Di Renzo, M., Xiao, Y., & Haas, H. (2017). Index modulation techniques for next-generation wireless networks. IEEE Access, 5, 16693\u201316746. https:\/\/doi.org\/10.1109\/ACCESS.2017.2737528","journal-title":"IEEE Access"},{"key":"2781_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tifs.2019.2945619","volume":"6013","author":"K-L Besser","year":"2019","unstructured":"Besser, K.-L., Lin, P.-H., Janda, C. R., & Jorswieck, E. A. (2019). Wiretap code design by neural network autoencoders. IEEE Transactions on Information Forensics and Security, 6013, 1\u20131. https:\/\/doi.org\/10.1109\/tifs.2019.2945619","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR48","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11277-019-06430-x","volume":"108","author":"S Pahuja","year":"2019","unstructured":"Pahuja, S., & Jindal, P. (2019). Cooperative communication in physical layer security: Technologies and challenges. Wireless Personal Communications, 108, 811\u2013837. https:\/\/doi.org\/10.1007\/s11277-019-06430-x","journal-title":"Wireless Personal Communications"},{"key":"2781_CR49","doi-asserted-by":"publisher","first-page":"7625","DOI":"10.1016\/j.ijleo.2016.05.086","volume":"127","author":"SS Chauhan","year":"2016","unstructured":"Chauhan, S. S., Verma, P., Mathur, M., Agarwal, M., & Gupta, T. (2016). Physical layer security of MIMO STBC over Rayleigh fading channels in the presence of channel estimation error. Optik, 127, 7625\u20137630. https:\/\/doi.org\/10.1016\/j.ijleo.2016.05.086","journal-title":"Optik"},{"key":"2781_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06954-2","author":"S Pal","year":"2019","unstructured":"Pal, S., & Jindal, P. (2019). Secrecy performance analysis of hybrid AF - DF relaying under multi hop environment. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-019-06954-2","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"2781_CR51","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel, A. L. (1959). Some studies in machine learning using the game of checkers. IBM Journal on Research and Development, 3(3), 210\u2013229. https:\/\/doi.org\/10.1147\/rd.33.0210","journal-title":"IBM Journal on Research and Development"},{"key":"2781_CR52","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1609\/aimag.v18i3.1303","volume":"18","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T. M. (1997). Does machine learning really work ? AI Management., 18, 71\u201383. https:\/\/doi.org\/10.1609\/aimag.v18i3.1303","journal-title":"AI Management."},{"key":"2781_CR53","unstructured":"Bishop CM. Pattern Recognition and Machine Learning. Springer, 2006. https:\/\/www.springer.com\/gp\/book\/9780387310732."},{"key":"2781_CR54","unstructured":"Alpaydin E, Introduction to machine learning. MIT press, 2014. https:\/\/mitpress.mit.edu\/books\/introduction-machine-learning-third-edition."},{"issue":"2","key":"2781_CR55","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","volume":"109","author":"JE Van Engelen","year":"2020","unstructured":"Van Engelen, J. E., & Hoos, H. H. (2020). A survey on semi-supervised learning. Machine Learning, 109(2), 373\u2013440. https:\/\/doi.org\/10.1007\/s10994-019-05855-6","journal-title":"Machine Learning"},{"key":"2781_CR56","doi-asserted-by":"publisher","first-page":"65579","DOI":"10.1109\/ACCESS.2019.2916648","volume":"7","author":"M Usama","year":"2019","unstructured":"Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K. L. A., Elkhatib, Y., Hussain, A., & Al-Fuqaha, A. (2019). Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE Access, 7, 65579\u201365615. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916648","journal-title":"IEEE Access"},{"key":"2781_CR57","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MWC.2019.1800601","volume":"26","author":"Z Qin","year":"2019","unstructured":"Qin, Z., Ye, H., Li, G. Y., & Juang, B. H. F. (2019). Deep learning in physical layer communications. IEEE Wireless Communications, 26, 93\u201399. https:\/\/doi.org\/10.1109\/MWC.2019.1800601","journal-title":"IEEE Wireless Communications"},{"key":"2781_CR58","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1109\/comst.2019.2904897","volume":"21","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys & Tutorials, 21, 2224\u20132287. https:\/\/doi.org\/10.1109\/comst.2019.2904897","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2781_CR59","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1049\/el.2018.6404","volume":"54","author":"Q Wu","year":"2018","unstructured":"Wu, Q., Feres, C., Kuzmenko, D., Zhi, D., Yu, Z., Liu, X., et al. (2018). Deep learning based RF fingerprinting for device identification and wireless security. Electronics Letters, 54, 1405\u20131407. https:\/\/doi.org\/10.1049\/el.2018.6404","journal-title":"Electronics Letters"},{"key":"2781_CR60","doi-asserted-by":"publisher","first-page":"6212","DOI":"10.1109\/TVT.2019.2909302","volume":"68","author":"X Wang","year":"2019","unstructured":"Wang, X. (2019). Decision-tree-based relay selection in Dualhop wireless communications. IEEE Transaction on Vehicular Communication., 68, 6212\u20136216. https:\/\/doi.org\/10.1109\/TVT.2019.2909302","journal-title":"IEEE Transaction on Vehicular Communication."},{"key":"2781_CR61","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1109\/LCOMM.2016.2594776","volume":"20","author":"J Joung","year":"2016","unstructured":"Joung, J. (2016). Machine learning-based antenna selection in wireless communications. IEEE Communications Letters, 20, 2241\u20132244. https:\/\/doi.org\/10.1109\/LCOMM.2016.2594776","journal-title":"IEEE Communications Letters"},{"key":"2781_CR62","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1049\/iet-com.2017.0829","volume":"12","author":"W Li","year":"2018","unstructured":"Li, W., & Huang, J. (2018). Mobile physical layer spoofing detection based on sparse representation. IET Communications, 12, 1709\u20131713. https:\/\/doi.org\/10.1049\/iet-com.2017.0829","journal-title":"IET Communications"},{"key":"2781_CR63","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/jrfid.2018.2880457","volume":"2","author":"K Youssef","year":"2018","unstructured":"Youssef, K., Bouchard, L., Haigh, K., Silovsky, J., Thapa, B., & Vander, Valk C. (2018). Machine learning approach to RF transmitter identification. IEEE Journal of Radio Frequency Identification, 2, 197\u2013205. https:\/\/doi.org\/10.1109\/jrfid.2018.2880457","journal-title":"IEEE Journal of Radio Frequency Identification"},{"key":"2781_CR64","doi-asserted-by":"publisher","first-page":"123026","DOI":"10.1109\/access.2019.2938533","volume":"7","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Li, H., Zhao, D., Chen, Z., Ye, S., & Cai, J. (2019). Deep neural networks for CSI-based authentication. IEEE Access, 7, 123026\u2013123034. https:\/\/doi.org\/10.1109\/access.2019.2938533","journal-title":"IEEE Access"},{"key":"2781_CR65","doi-asserted-by":"publisher","first-page":"10037","DOI":"10.1109\/TVT.2016.2524258","volume":"65","author":"L Xiao","year":"2016","unstructured":"Xiao, L., Li, Y., Han, G., Liu, G., & Zhuang, W. (2016). PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Transactions on Vehicular Technology, 65, 10037\u201310047. https:\/\/doi.org\/10.1109\/TVT.2016.2524258","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR66","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/LCOMM.2017.2690437","volume":"21","author":"N Wang","year":"2017","unstructured":"Wang, N., Jiang, T., Lv, S., & Xiao, L. (2017). Physical-layer authentication based on extreme learning machine. IEEE Communications Letters, 21, 1557\u20131560. https:\/\/doi.org\/10.1109\/LCOMM.2017.2690437","journal-title":"IEEE Communications Letters"},{"key":"2781_CR67","doi-asserted-by":"publisher","first-page":"53583","DOI":"10.1109\/ACCESS.2018.2871514","volume":"6","author":"X Qiu","year":"2018","unstructured":"Qiu, X., Jiang, T., Wu, S., & Hayes, M. (2018). Physical layer authentication enhancement using a gaussian mixture model. IEEE Access, 6, 53583\u201353592. https:\/\/doi.org\/10.1109\/ACCESS.2018.2871514","journal-title":"IEEE Access"},{"key":"2781_CR68","doi-asserted-by":"publisher","first-page":"2260","DOI":"10.1109\/TCOMM.2018.2881117","volume":"67","author":"H Fang","year":"2019","unstructured":"Fang, H., Wang, X., & Hanzo, L. (2019). Learning-aided physical layer authentication as an intelligent process. IEEE Transactions on Communications, 67, 2260\u20132273. https:\/\/doi.org\/10.1109\/TCOMM.2018.2881117","journal-title":"IEEE Transactions on Communications"},{"key":"2781_CR69","doi-asserted-by":"publisher","first-page":"49212","DOI":"10.1109\/ACCESS.2019.2910272","volume":"7","author":"Y Xu","year":"2020","unstructured":"Xu, Y., Xia, J., Wu, H., & Fan, L. (2020). Q-learning based physical-layer secure game against multiagent attacks. IEEE Access, 7, 49212\u201349222. https:\/\/doi.org\/10.1109\/ACCESS.2019.2910272","journal-title":"IEEE Access"},{"key":"2781_CR70","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/LWC.2019.2945022","volume":"9","author":"TM Hoang","year":"2020","unstructured":"Hoang, T. M., Nguyen, N. M., & Duong, T. Q. (2020). Detection of eavesdropping attack in UAV-aided wireless systems: unsupervised learning with one-class SVM and K-means clustering. IEEE Wireless Communications Letters, 9, 139\u2013142. https:\/\/doi.org\/10.1109\/LWC.2019.2945022","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR71","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TCCN.2019.2949308","volume":"6","author":"K Sankhe","year":"2020","unstructured":"Sankhe, K., Belgiovine, M., Zhou, F., Angioloni, L., Restuccia, F., D\u2019Oro, S., et al. (2020). No radio left behind: Radio fingerprinting through deep learning of physical-layer hardware impairments. IEEE Transactions on Cognitive Communications and Networking, 6, 165\u2013178. https:\/\/doi.org\/10.1109\/TCCN.2019.2949308","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"2781_CR72","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TVT.2019.2950670","volume":"69","author":"L Peng","year":"2020","unstructured":"Peng, L., Zhang, J., Liu, M., & Hu, A. (2020). Deep learning based rf fingerprint identification using differential constellation trace figure. IEEE Transactions on Vehicular Technology., 69, 1091\u20131095. https:\/\/doi.org\/10.1109\/TVT.2019.2950670","journal-title":"IEEE Transactions on Vehicular Technology."},{"key":"2781_CR73","doi-asserted-by":"publisher","first-page":"66082","DOI":"10.1109\/ACCESS.2018.2878595","volume":"6","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Guo, X., & Lin, Y. (2018). Trust management method of D2D Communication Based on RF fingerprint identification. IEEE Access, 6, 66082\u201366087. https:\/\/doi.org\/10.1109\/ACCESS.2018.2878595","journal-title":"IEEE Access"},{"key":"2781_CR74","doi-asserted-by":"publisher","first-page":"116390","DOI":"10.1109\/access.2019.2934122","volume":"7","author":"R-F Liao","year":"2019","unstructured":"Liao, R.-F., Wen, H., Wu, J., Pan, F., Xu, A., Song, H., et al. (2019). Security enhancement for mobile edge computing through physical layer authentication. IEEE Access, 7, 116390\u2013116401. https:\/\/doi.org\/10.1109\/access.2019.2934122","journal-title":"IEEE Access"},{"key":"2781_CR75","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1109\/JIOT.2019.2960099","volume":"7","author":"RF Liao","year":"2020","unstructured":"Liao, R. F., Wen, H., Chen, S., Xie, F., Pan, F., Tang, J., et al. (2020). Multiuser physical layer authentication in internet of things with data augmentation. IEEE Internet of Things Journal, 7, 2077\u20132088. https:\/\/doi.org\/10.1109\/JIOT.2019.2960099","journal-title":"IEEE Internet of Things Journal"},{"key":"2781_CR76","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1109\/ACCESS.2019.2962626","volume":"8","author":"K Sa","year":"2020","unstructured":"Sa, K., Lang, D., Wang, C., & Bai, Y. (2020). Specific emitter identification techniques for the internet of things. IEEE Access, 8, 1644\u20131652. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962626","journal-title":"IEEE Access"},{"issue":"8","key":"2781_CR77","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.3390\/s20082250","volume":"20","author":"W An","year":"2020","unstructured":"An, W., Zhang, P., Xu, J., Luo, H., Huang, L., & Zhong, S. (2020). A novel machine learning aided antenna selection scheme for MIMO Internet of Things. Sensors., 20(8), 2250. https:\/\/doi.org\/10.3390\/s20082250","journal-title":"Sensors."},{"key":"2781_CR78","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/LSP.2014.2387860","volume":"22","author":"H Hui","year":"2015","unstructured":"Hui, H., Swindlehurst, A. L., Li, G., & Liang, J. (2015). Secure relay and jammer selection for physical layer security. IEEE Signal Processing Letters, 22, 1147\u20131151. https:\/\/doi.org\/10.1109\/LSP.2014.2387860","journal-title":"IEEE Signal Processing Letters"},{"key":"2781_CR79","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TIFS.2014.2374356","volume":"10","author":"H Deng","year":"2015","unstructured":"Deng, H., Wang, H. M., Guo, W., & Wang, W. (2015). Secrecy transmission with a Helper: To relay or to Jam. IEEE Transactions on Information Forensics and Security, 10, 293\u2013307. https:\/\/doi.org\/10.1109\/TIFS.2014.2374356","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR80","volume-title":"Intelligent computing and communication systems algorithms for intelligent systems","author":"AK Kamboj","year":"2021","unstructured":"Kamboj, A. K., Jindal, P., & Verma, P. (2021). Physical layer security-based relay selection for wireless cooperative networks: A reinforcement learning approach. In B. Singh, C. A. Coello Coello, P. Jindal, & P. Verma (Eds.), Intelligent computing and communication systems algorithms for intelligent systems. Singapore: Springer."},{"key":"2781_CR81","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TCOMM.2015.2412939","volume":"63","author":"FS Al-Qahtani","year":"2015","unstructured":"Al-Qahtani, F. S., Zhong, C., & Alnuweiri, H. M. (2015). Opportunistic relay selection for secrecy enhancement in cooperative networks. IEEE Transactions on Communications, 63, 1756\u20131770. https:\/\/doi.org\/10.1109\/TCOMM.2015.2412939","journal-title":"IEEE Transactions on Communications"},{"key":"2781_CR82","doi-asserted-by":"publisher","first-page":"3180","DOI":"10.1109\/GLOCOM.2014.7037295","volume":"62","author":"X Lei","year":"2014","unstructured":"Lei, X., Fan, L., Hu, R. Q., Michalopoulos, D. S., & Fan, P. (2014). Secure multiuser communications in multiple decode-and-forward relay networks. IEEE Transactions on Communication, 62, 3180\u20133185. https:\/\/doi.org\/10.1109\/GLOCOM.2014.7037295","journal-title":"IEEE Transactions on Communication"},{"key":"2781_CR83","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/LCOMM.2014.040214.140109","volume":"18","author":"TT Tran","year":"2014","unstructured":"Tran, T. T., & Kong, H. Y. (2014). CSI-Secured orthogonal jamming method for wireless physical layer security. IEEE Communications Letters, 18, 841\u2013844. https:\/\/doi.org\/10.1109\/LCOMM.2014.040214.140109","journal-title":"IEEE Communications Letters"},{"key":"2781_CR84","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31, 2099\u20132111. https:\/\/doi.org\/10.1109\/JSAC.2013.131011","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2781_CR85","doi-asserted-by":"publisher","first-page":"3349","DOI":"10.1109\/ACCESS.2016.2582719","volume":"4","author":"NP Nguyen","year":"2016","unstructured":"Nguyen, N. P., Duong, T. Q., Ngo, H. Q., Hadzi-Velkov, Z., & Shu, L. (2016). Secure 5G wireless communications: A joint relay selection and wireless power transfer approach. IEEE Access, 4, 3349\u20133359. https:\/\/doi.org\/10.1109\/ACCESS.2016.2582719","journal-title":"IEEE Access"},{"key":"2781_CR86","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.1109\/TWC.2015.2418316","volume":"14","author":"N Zhang","year":"2015","unstructured":"Zhang, N., Cheng, N., Lu, N., Zhang, X., Mark, J. W., & Shen, X. (2015). Partner selection and incentive mechanism for physical layer security. IEEE Transactions on Wireless Communications, 14, 4265\u20134276. https:\/\/doi.org\/10.1109\/TWC.2015.2418316","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR87","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/TWC.2016.2617328","volume":"16","author":"L Yang","year":"2017","unstructured":"Yang, L., Chen, J., Jiang, H., Vorobyov, S. A., & Zhang, H. (2017). Optimal relay selection for secure cooperative communications with an adaptive eavesdropper. IEEE Transactions on Wireless Communications, 16, 26\u201342. https:\/\/doi.org\/10.1109\/TWC.2016.2617328","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR88","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.1109\/TWC.2017.2675402","volume":"16","author":"MRA Khandaker","year":"2017","unstructured":"Khandaker, M. R. A., Wong, K. K., & Zheng, G. (2017). Truth-Telling mechanism for two-way relay selection for secrecy communications with energy-harvesting revenue. IEEE Transactions on Wireless Communications, 16, 3111\u20133123. https:\/\/doi.org\/10.1109\/TWC.2017.2675402","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR89","doi-asserted-by":"publisher","first-page":"64836","DOI":"10.1109\/ACCESS.2018.2878058","volume":"6","author":"S Jia","year":"2018","unstructured":"Jia, S., Zhang, J., Zhao, H., Lou, Y., & Xu, Y. (2018). Relay selection for improved physical layer security in cognitive relay networks using artificial noise. IEEE Access, 6, 64836\u201364846. https:\/\/doi.org\/10.1109\/ACCESS.2018.2878058","journal-title":"IEEE Access"},{"key":"2781_CR90","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/GLOCOM.2011.6133875","volume":"7","author":"J Chen","year":"2012","unstructured":"Chen, J., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay network. IEEE Transactions on Information Forensics And Security, 7, 310\u2013320. https:\/\/doi.org\/10.1109\/GLOCOM.2011.6133875","journal-title":"IEEE Transactions on Information Forensics And Security"},{"key":"2781_CR91","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875\u20131888. https:\/\/doi.org\/10.1109\/TSP.2009.2038412","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2781_CR92","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1049\/iet-com.2016.1046","volume":"11","author":"MA Jadoon","year":"2017","unstructured":"Jadoon, M. A., & Kim, S. (2017). Relay selection algorithm for wireless cooperative networks: A learning-based approach. IET Communications, 11, 1061\u20131066. https:\/\/doi.org\/10.1049\/iet-com.2016.1046","journal-title":"IET Communications"},{"key":"2781_CR93","doi-asserted-by":"publisher","first-page":"9561","DOI":"10.1109\/JSEN.2019.2925719","volume":"19","author":"Y Su","year":"2019","unstructured":"Su, Y., Lu, X., Zhao, Y., Huang, L., & Du, X. (2019). Cooperative communications with relay selection based on deep reinforcement learning in wireless sensor networks. IEEE Sensors Journal, 19, 9561\u20139569. https:\/\/doi.org\/10.1109\/JSEN.2019.2925719","journal-title":"IEEE Sensors Journal"},{"key":"2781_CR94","doi-asserted-by":"publisher","first-page":"9534","DOI":"10.1109\/TVT.2017.2715328","volume":"66","author":"D Tian","year":"2017","unstructured":"Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q., & Leung, V. C. M. (2017). Self-organized relay selection for cooperative transmission in vehicular Ad-Hoc networks. IEEE Transactions on Vehicular Technology, 66, 9534\u20139549. https:\/\/doi.org\/10.1109\/TVT.2017.2715328","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR95","doi-asserted-by":"publisher","first-page":"949","DOI":"10.3390\/electronics8090949","volume":"8","author":"T-T Nguyen","year":"2019","unstructured":"Nguyen, T.-T., Lee, J.-H., Nguyen, M.-T., & Kim, Y.-H. (2019). Machine learning-based relay selection for secure transmission in multi-hop DF relay networks. Electronics, 8, 949. https:\/\/doi.org\/10.3390\/electronics8090949","journal-title":"Electronics"},{"key":"2781_CR96","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1109\/LCOMM.2013.071813.131048","volume":"17","author":"N Yang","year":"2013","unstructured":"Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Yuan, J. (2013). MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining. IEEE Communications Letters, 17, 1754\u20131757. https:\/\/doi.org\/10.1109\/LCOMM.2013.071813.131048","journal-title":"IEEE Communications Letters"},{"key":"2781_CR97","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TWC.2014.022714131252","volume":"13","author":"Z Ding","year":"2014","unstructured":"Ding, Z., Ma, Z., & Fan, P. (2014). Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise. IEEE Transactions on Wireless Communications, 13, 2189\u20132203. https:\/\/doi.org\/10.1109\/TWC.2014.022714131252","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR98","doi-asserted-by":"publisher","first-page":"5189","DOI":"10.1109\/TCOMM.2016.2606396","volume":"64","author":"M Yang","year":"2016","unstructured":"Yang, M., Guo, D., Huang, Y., Duong, T. Q., & Zhang, B. (2016). Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks. IEEE Transactions on Communications, 64, 5189\u20135202. https:\/\/doi.org\/10.1109\/TCOMM.2016.2606396","journal-title":"IEEE Transactions on Communications"},{"key":"2781_CR99","doi-asserted-by":"publisher","first-page":"5380","DOI":"10.1109\/TSP.2019.2940128","volume":"67","author":"J Chen","year":"2019","unstructured":"Chen, J., Chen, S., Qi, Y., & Fu, S. (2019). Intelligent massive MIMO antenna selection using monte carlo tree search. IEEE Transactions on Signal Processing, 67, 5380\u20135390. https:\/\/doi.org\/10.1109\/TSP.2019.2940128","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2781_CR100","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1049\/el.2019.3233","volume":"56","author":"X Yang","year":"2020","unstructured":"Yang, X., & Zhao, F. (2020). Multi-class import vector machine for transmit antenna selection in MIMO systems. Electronics Letters, 56, 62\u201365. https:\/\/doi.org\/10.1049\/el.2019.3233","journal-title":"Electronics Letters"},{"key":"2781_CR101","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/LWC.2019.2944179","volume":"9","author":"S Gecgel","year":"2020","unstructured":"Gecgel, S., Goztepe, C., Kurt, G. K., & Member, S. (2020). Transmit antenna selection for large-scale MIMO. IEEE Wireless Communications Letters, 9, 113\u2013116. https:\/\/doi.org\/10.1109\/LWC.2019.2944179","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR102","doi-asserted-by":"publisher","first-page":"51634","DOI":"10.1109\/access.2020.2980285","volume":"8","author":"MS Sim","year":"2020","unstructured":"Sim, M. S., Lim, Y.-G., Park, S. H., Dai, L., & Chae, C.-B. (2020). Deep learning-based mmWave beam selection for 5G NR\/6G with sub-6 ghz channel information: Algorithms and prototype validation. IEEE Access, 8, 51634\u201351646. https:\/\/doi.org\/10.1109\/access.2020.2980285","journal-title":"IEEE Access"},{"key":"2781_CR103","doi-asserted-by":"publisher","unstructured":"Chai X, Gao H, Sun J, Su X, Lv T, Zeng J. Reinforcement Learning Based Antenna Selection in User-Centric Massive MIMO. In2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) 2020 May 25 (pp. 1\u20136). IEEE. https:\/\/https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9129108.","DOI":"10.1109\/VTC2020-Spring48590.2020.9129108"},{"key":"2781_CR104","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2020.3033967","author":"M Guo","year":"2020","unstructured":"Guo, M., & Gursoy, M. C. (2020). Statistical learning based joint antenna selection and user scheduling for single-cell massive MIMO systems. IEEE Transactions on Green Communications and Networking. https:\/\/doi.org\/10.1109\/TGCN.2020.3033967","journal-title":"IEEE Transactions on Green Communications and Networking"},{"key":"2781_CR105","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1049\/iet-rsn.2018.5438","volume":"13","author":"AM Elbir","year":"2019","unstructured":"Elbir, A. M., Mishra, K. V., & Eldar, Y. C. (2019). Cognitive radar antenna selection via deep learning. IET Radar, Sonar and Navigation, 13, 871\u2013880. https:\/\/doi.org\/10.1049\/iet-rsn.2018.5438","journal-title":"IET Radar, Sonar and Navigation"},{"key":"2781_CR106","doi-asserted-by":"crossref","unstructured":"Wang Y, Klautau A, Ribero M, Narasimha M, Heath RW. MmWave Vehicular Beam Training with Situational Awareness by Machine Learning. IEEE Globecom 2018.","DOI":"10.1109\/GLOCOMW.2018.8644288"},{"key":"2781_CR107","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"GJ Simmons","year":"1988","unstructured":"Simmons, G. J. (1988). A survey of information authentication. Proceedings of the IEEE, 76, 603\u2013620. https:\/\/doi.org\/10.1109\/5.4445.","journal-title":"Proceedings of the IEEE"},{"key":"2781_CR108","volume-title":"Cryptography and network security: Principles and Practice","author":"W Stallings","year":"2010","unstructured":"Stallings, W. (2010). Cryptography and network security: Principles and Practice (5th ed.). Prentice Hall.","edition":"5"},{"key":"2781_CR109","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959","author":"K Zeng","year":"2010","unstructured":"Zeng, K. (2010). Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications. https:\/\/doi.org\/10.1109\/MWC.2010.5601959","journal-title":"IEEE Wireless Communications"},{"key":"2781_CR110","doi-asserted-by":"publisher","DOI":"10.1109\/9780470545287","volume-title":"Microwave mobile communications","author":"WC Jakes","year":"1994","unstructured":"Jakes, W. C., & Cox, D. C. (1994). Microwave mobile communications. Wiley-IEEE Press."},{"key":"2781_CR111","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1049\/iet-ifs.2009.0197","volume":"4","author":"H Wen","year":"2010","unstructured":"Wen, H., Ho, P. H., Qi, C., & Gong, G. (2010). Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Information Security, 4, 390\u2013396. https:\/\/doi.org\/10.1049\/iet-ifs.2009.0197","journal-title":"IET Information Security"},{"key":"2781_CR112","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MWC.2018.1800155","volume":"26","author":"U Challita","year":"2019","unstructured":"Challita, U., Ferdowsi, A., Chen, M., & Saad, W. (2019). Machine learning for wireless connectivity and security of cellular-connected UAV\u2019s. IEEE Wireless Communications, 26, 28\u201335. https:\/\/doi.org\/10.1109\/MWC.2018.1800155","journal-title":"IEEE Wireless Communications"},{"key":"2781_CR113","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19112440","volume":"19","author":"RF Liao","year":"2019","unstructured":"Liao, R. F., Wen, H., Wu, J., Pan, F., Xu, A., Jiang, Y., et al. (2019). Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sensors (Basel, Switzerland), 19, 1\u201317. https:\/\/doi.org\/10.3390\/s19112440","journal-title":"Sensors (Basel, Switzerland)"},{"key":"2781_CR114","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TMC.2015.2425409","volume":"15","author":"G Zheng","year":"2016","unstructured":"Zheng, G., Hua, C., Zheng, R., & Wang, Q. (2016). toward robust relay placement in 60 GHz mmWave wireless personal area networks with directional antenna. IEEE Transactions on Mobile Computing, 15, 762\u2013773. https:\/\/doi.org\/10.1109\/TMC.2015.2425409","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2781_CR115","doi-asserted-by":"publisher","first-page":"14460","DOI":"10.1109\/ACCESS.2020.2966271","volume":"8","author":"WSHMW Ahmad","year":"2020","unstructured":"Ahmad, W. S. H. M. W., Radzi, N. A. M., Samidi, F. S., Ismail, A., Abdullah, F., Jamaludin, M. Z., et al. (2020). 5G technology: Towards DYNAMIC SPECTRUM SHARING USING COGNITIVE RADIO NETWORKs. IEEE Access, 8, 14460\u201388. https:\/\/doi.org\/10.1109\/ACCESS.2020.2966271","journal-title":"IEEE Access"},{"key":"2781_CR116","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1016\/j.ijleo.2015.11.072","volume":"127","author":"P Verma","year":"2016","unstructured":"Verma, P., & Singh, B. (2016). Throughput maximization by alternative use of single and double thresholds based energy detection method. Optik, 127, 1635\u20131638. https:\/\/doi.org\/10.1016\/j.ijleo.2015.11.072","journal-title":"Optik"},{"key":"2781_CR117","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07189-2","author":"P Verma","year":"2020","unstructured":"Verma, P. (2020). Adaptive threshold based energy detection over rayleigh fading channel. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-020-07189-2","journal-title":"Wireless Personal Communications"},{"key":"2781_CR118","doi-asserted-by":"publisher","first-page":"2676","DOI":"10.1049\/iet-com.2011.0638","volume":"6","author":"H Sakran","year":"2012","unstructured":"Sakran, H., Shokair, M., Nasr, O., El-Rabaie, S., & El-Azm, A. A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6, 2676\u20132687. https:\/\/doi.org\/10.1049\/iet-com.2011.0638","journal-title":"IET Communications"},{"key":"2781_CR119","doi-asserted-by":"publisher","unstructured":"Zou Y, Member S, Champagne B, Member S, Zhu W. Relay-Selection Improves the Security-Reliability Trade-off in Cognitive Radio Systems n. IEEE Transaction on Communications 2015. . https:\/\/https:\/\/doi.org\/10.1109\/TCOMM.2014.2377239.","DOI":"10.1109\/TCOMM.2014.2377239"},{"key":"2781_CR120","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Wang, L., Duy, T. T., Elkashlan, M., & Duong, T. Q. (2015). Relay selection for security enhancement in cognitive relay networks. IEEE Wireless Communication. Letter, 4, 46\u201349. https:\/\/doi.org\/10.1109\/LWC.2014.2365808","journal-title":"IEEE Wireless Communication. Letter"},{"key":"2781_CR121","doi-asserted-by":"publisher","unstructured":"Yan P, Zou Y, Zhu J. Transmit antenna selection to improve physical layer security for MIMO-CR systems. 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 2016:1\u20134. doi: https:\/\/doi.org\/10.1109\/WCSP.2016.7752737.","DOI":"10.1109\/WCSP.2016.7752737"},{"key":"2781_CR122","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TGCN.2017.2684827","volume":"1","author":"H Lei","year":"2017","unstructured":"Lei, H., Xu, M., Ansari, I. S., Pan, G., Qaraqe, K. A., & Alouini, M. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transaction on Green Communication Networks, 1, 192\u2013203. https:\/\/doi.org\/10.1109\/TGCN.2017.2684827","journal-title":"IEEE Transaction on Green Communication Networks"},{"key":"2781_CR123","doi-asserted-by":"publisher","first-page":"7055","DOI":"10.1109\/ACCESS.2017.2762738","volume":"6","author":"D Chen","year":"2018","unstructured":"Chen, D., Cheng, Y., Yang, W., Hu, J., Member, S., Cai, Y., et al. (2018). Physical layer security in cognitive untrusted relay networks. IEEE Access, 6, 7055\u20137065. https:\/\/doi.org\/10.1109\/ACCESS.2017.2762738","journal-title":"IEEE Access"},{"key":"2781_CR124","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1109\/TSG.2012.2197644","volume":"3","author":"Q Yang","year":"2012","unstructured":"Yang, Q., Laurenson, D. I., & Barria, J. A. (2012). On the use of LEO satellite constellation for active network management in power distribution. Networks, 3, 1371\u20131381. https:\/\/doi.org\/10.1109\/TSG.2012.2197644","journal-title":"Networks"},{"key":"2781_CR125","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1049\/cje.2018.05.016","volume":"27","author":"J Liu","year":"2018","unstructured":"Liu, J., Wang, J., Liu, W., Wang, Q., & Wang, M. (2018). A novel cooperative physical layer security scheme for satellite downlinks. Chinese Journal of Electronics, 27, 860\u2013865. https:\/\/doi.org\/10.1049\/cje.2018.05.016","journal-title":"Chinese Journal of Electronics"},{"key":"2781_CR126","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/JSAC.2016.2615261","volume":"34","author":"K An","year":"2016","unstructured":"An, K., Lin, M., Ouyang, J., & Zhu, W. (2016). Secure transmission in cognitive satellite terrestrial networks. IEEE Journal on Selected Areas in Communication, 34, 3025\u20133037. https:\/\/doi.org\/10.1109\/JSAC.2016.2615261","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"2781_CR127","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MNET.2018.1800052","volume":"32","author":"L Boero","year":"2018","unstructured":"Boero, L., Bruschi, R., Davoli, F., Marchese, M., & Patrone, F. (2018). Satellite networking integration in the 5g ecosystem: Research trends and open challenges. IEEE Network, 32, 9\u201315. https:\/\/doi.org\/10.1109\/MNET.2018.1800052","journal-title":"IEEE Network"},{"key":"2781_CR128","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1109\/JSAC.2018.2832819","volume":"36","author":"M Lin","year":"2018","unstructured":"Lin, M., Lin, Z., Zhu, W., Member, S., & Wang, J. (2018). Joint beamforming for secure communication in cognitive satellite terrestrial networks. IEEE Journal on Selected Areas in Communication, 36, 1017\u201329. https:\/\/doi.org\/10.1109\/JSAC.2018.2832819","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"2781_CR129","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TVT.2019.2893366","volume":"68","author":"V Bankey","year":"2019","unstructured":"Bankey, V., & Upadhyay, P. K. (2019). Physical layer security of multiuser multirelay hybrid satellite-terrestrial relay networks. IEEE Transactions on Vehicular Technology, 68, 2488\u20132501. https:\/\/doi.org\/10.1109\/TVT.2019.2893366","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR130","doi-asserted-by":"publisher","first-page":"55815","DOI":"10.1109\/ACCESS.2018.2872718","volume":"6","author":"K Guo","year":"2018","unstructured":"Guo, K., An, K., Zhang, B., Huang, Y., & Guo, D. (2018). Physical layer security for hybrid satellite terrestrial relay networks with joint relay selection and user scheduling. IEEE Access, 6, 55815\u201355827. https:\/\/doi.org\/10.1109\/ACCESS.2018.2872718","journal-title":"IEEE Access"},{"key":"2781_CR131","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/iet-com.2017.0948","volume":"12","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Lin, M., An, K., Ouyang, J., & Zhu, W. P. (2018). Secrecy performance of hybrid satellite-terrestrial relay networks in the presence of multiple eavesdroppers. IET Communications, 12, 26\u201334. https:\/\/doi.org\/10.1049\/iet-com.2017.0948","journal-title":"IET Communications"},{"key":"2781_CR132","doi-asserted-by":"publisher","first-page":"65275","DOI":"10.1109\/ACCESS.2018.2877709","volume":"6","author":"W Cao","year":"2018","unstructured":"Cao, W., Zou, Y., Yang, Z., & Zhu, J. (2018). Relay selection for improving physical-layer security in hybrid satellite-terrestrial relay networks. IEEE Access, 6, 65275\u201365285. https:\/\/doi.org\/10.1109\/ACCESS.2018.2877709","journal-title":"IEEE Access"},{"key":"2781_CR133","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/JSYST.2019.2921306","volume":"14","author":"J Li","year":"2020","unstructured":"Li, J., Han, S., Tai, X., Gao, C., & Zhang, Q. (2020). Physical layer security enhancement for satellite communication among similar channels: Relay selection and power allocation. IEEE Systems Journal, 14, 433\u2013444. https:\/\/doi.org\/10.1109\/JSYST.2019.2921306","journal-title":"IEEE Systems Journal"},{"key":"2781_CR134","doi-asserted-by":"publisher","first-page":"7011","DOI":"10.1109\/TVT.2019.2916992","volume":"68","author":"W Zeng","year":"2019","unstructured":"Zeng, W., Zhang, J., Ng, D. W. K., Ai, B., & Zhong, Z. (2019). Two-way hybrid terrestrial-satellite relaying systems: Performance analysis and relay selection. IEEE Transactions on Vehicular Technology, 68, 7011\u20137023. https:\/\/doi.org\/10.1109\/TVT.2019.2916992","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR135","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1049\/iet-com.2018.5333","volume":"13","author":"P Lai","year":"2019","unstructured":"Lai, P., Bai, H., Huang, Y., Chen, Z., & Liu, T. (2019). Performance evaluation of underlay cognitive hybrid satellite-terrestrial relay networks with relay selection scheme. IET Communications, 13, 2550\u20132557. https:\/\/doi.org\/10.1049\/iet-com.2018.5333","journal-title":"IET Communications"},{"key":"2781_CR136","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1049\/iet-net.2017.0119","volume":"7","author":"ON Hamoud","year":"2018","unstructured":"Hamoud, O. N., Kenaza, T., & Challal, Y. (2018). Security in device-to-device communications: A survey. IET Networks, 7, 14\u201322. https:\/\/doi.org\/10.1049\/iet-net.2017.0119","journal-title":"IET Networks"},{"key":"2781_CR137","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A. Y., Li, Y., & Member, S. (2017). Security and privacy in device-to-device ( D2D ) communication : A review. IEEE Communications Surveys and Tutorials, 19, 1054\u20131079.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR138","doi-asserted-by":"publisher","first-page":"2068","DOI":"10.1109\/LCOMM.2013.092813.131367","volume":"17","author":"J Yue","year":"2013","unstructured":"Yue, J., Ma, C., Yu, H., & Zhou, W. (2013). Secrecy-based access control for device-to-device communication underlaying cellular networks. IEEE Communications Letters, 17, 2068\u20132071. https:\/\/doi.org\/10.1109\/LCOMM.2013.092813.131367","journal-title":"IEEE Communications Letters"},{"key":"2781_CR139","doi-asserted-by":"publisher","first-page":"5651","DOI":"10.1109\/TWC.2016.2565579","volume":"15","author":"R Zhang","year":"2016","unstructured":"Zhang, R., Cheng, X., & Yang, L. (2016). Cooperation via spectrum sharing for physical layer security in device-to-device communications Underlaying cellular networks. IEEE Transactions on Wireless Communications, 15, 5651\u20135663. https:\/\/doi.org\/10.1109\/TWC.2016.2565579","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2781_CR140","doi-asserted-by":"publisher","first-page":"15162","DOI":"10.1109\/ACCESS.2017.2734807","volume":"5","author":"R Wang","year":"2017","unstructured":"Wang, R., Liu, K., Wu, D., Wang, H., & Yan, J. (2017). Malicious-behavior-aware D2D Link selection mechanism. IEEE Access, 5, 15162\u201315173. https:\/\/doi.org\/10.1109\/ACCESS.2017.2734807","journal-title":"IEEE Access"},{"key":"2781_CR141","doi-asserted-by":"publisher","first-page":"42279","DOI":"10.1109\/ACCESS.2018.2859781","volume":"6","author":"P Hao","year":"2018","unstructured":"Hao, P., Wang, X., & Shen, W. (2018). A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication. IEEE Access, 6, 42279\u201342293. https:\/\/doi.org\/10.1109\/ACCESS.2018.2859781","journal-title":"IEEE Access"},{"key":"2781_CR142","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1049\/iet-com.2019.0419","volume":"13","author":"H Qian","year":"2019","unstructured":"Qian, H., Yu, J., & Hua, L. (2019). Relay selection algorithm based on social network combined with Q-learning for vehicle D2D communication. IET Communications, 13, 3582\u20133587. https:\/\/doi.org\/10.1049\/iet-com.2019.0419","journal-title":"IET Communications"},{"key":"2781_CR143","doi-asserted-by":"publisher","first-page":"41324","DOI":"10.1109\/ACCESS.2019.2906845","volume":"7","author":"Y Luo","year":"2019","unstructured":"Luo, Y., Feng, Z., Jiang, H., Yang, Y., Huang, Y., & Yao, J. (2019). Game-theoretic learning approaches for secure D2D communications against full-duplex active eavesdropper. IEEE Access, 7, 41324\u201341335. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906845","journal-title":"IEEE Access"},{"key":"2781_CR144","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2016","unstructured":"Gupta, L., Jain, R., & Vaszkun, G. (2016). Survey of Important Issues in UAV communication networks. IEEE Communications Surveys and Tutorials, 18, 1123\u20131152. https:\/\/doi.org\/10.1109\/COMST.2015.2495297","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR145","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1109\/COMST.2019.2906228","volume":"21","author":"A Fotouhi","year":"2019","unstructured":"Fotouhi, A., Qiang, H., Ding, M., Hassan, M., Giordano, L. G., Garcia-Rodriguez, A., et al. (2019). Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges. IEEE Communications Surveys and Tutorials, 21, 3417\u20133442. https:\/\/doi.org\/10.1109\/COMST.2019.2906228","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR146","doi-asserted-by":"publisher","first-page":"48572","DOI":"10.1109\/ACCESS.2019.2909530","volume":"7","author":"H Shakhatreh","year":"2019","unstructured":"Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., et al. (2019). Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges. IEEE Access, 7, 48572\u201348634. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909530","journal-title":"IEEE Access"},{"key":"2781_CR147","doi-asserted-by":"publisher","first-page":"119729","DOI":"10.1109\/access.2019.2933231","volume":"7","author":"R Ma","year":"2019","unstructured":"Ma, R., Yang, W., Zhang, Y., Liu, J., & Shi, H. (2019). Secure mmWave communication using UAV-enabled relay and cooperative jammer. IEEE Access, 7, 119729\u2013119741. https:\/\/doi.org\/10.1109\/access.2019.2933231","journal-title":"IEEE Access"},{"key":"2781_CR148","doi-asserted-by":"publisher","first-page":"7769","DOI":"10.1109\/TVT.2018.2830345","volume":"67","author":"KW Huang","year":"2018","unstructured":"Huang, K. W., & Wang, H. M. (2018). Combating the Control Signal Spoofing Attack in UAV Systems. IEEE Transactions on Vehicular Technology, 67, 7769\u20137773. https:\/\/doi.org\/10.1109\/TVT.2018.2830345","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR149","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/TIFS.2018.2819126","volume":"13","author":"A Shoufan","year":"2018","unstructured":"Shoufan, A., Al-Angari, H. M., Sheikh, M. F. A., & Damiani, E. (2018). Drone pilot identification by classifying radio-control signals. IEEE Transactions on Information Forensics and Security, 13, 2439\u20132447. https:\/\/doi.org\/10.1109\/TIFS.2018.2819126","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR150","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1109\/LWC.2019.2919536","volume":"8","author":"B Wang","year":"2019","unstructured":"Wang, B., Sun, Y., Sheng, Z., Nguyen, H. M., & Duong, T. Q. (2019). Inconspicuous manipulation for social-aware relay selection in flying internet of things. IEEE Wireless Communications Letters, 8, 1394\u20131397. https:\/\/doi.org\/10.1109\/LWC.2019.2919536","journal-title":"IEEE Wireless Communications Letters"},{"key":"2781_CR151","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TVT.2019.2952549","volume":"69","author":"H Huang","year":"2020","unstructured":"Huang, H., Yang, Y., Wang, H., Ding, Z., Sari, H., & Adachi, F. (2020). Deep reinforcement learning for UAV navigation through massive MIMO technique. IEEE Transactions on Vehicular Technology, 69, 1117\u20131121. https:\/\/doi.org\/10.1109\/TVT.2019.2952549","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR152","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2019). Anatomy of threats to the internet of things. IEEE Communications Surveys and Tutorials, 21, 1636\u20131675. https:\/\/doi.org\/10.1109\/COMST.2018.2874978","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2781_CR153","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use ai to enhance security? IEEE Signal Processing Magazine, 35, 41\u201349. https:\/\/doi.org\/10.1109\/MSP.2018.2825478","journal-title":"IEEE Signal Processing Magazine"},{"key":"2781_CR154","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TASE.2015.2497663","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for IoT under Eavesdropper Collusion. IEEE Transactions on Automation Science and Engineering, 13, 1281\u20131293. https:\/\/doi.org\/10.1109\/TASE.2015.2497663","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"2781_CR155","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TIFS.2020.2978627","volume":"15","author":"M Letafati","year":"2020","unstructured":"Letafati, M., Kuhestani, A., & Behroozi, H. (2020). Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things. IEEE Transactions on Information Forensics and Security, 15, 2856\u20132868. https:\/\/doi.org\/10.1109\/TIFS.2020.2978627","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2781_CR156","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/9781119333142.ch4","volume":"20","author":"L Dai","year":"2018","unstructured":"Dai, L., Wang, B., Jiao, R., Ding, Z., Han, S., & Chih-Lin, I. (2018). Nonorthogonal multiple access for 5G. 5G Networks: Fundamental requirements Enabling Technologies, and Operations Management, 20, 135\u2013203. https:\/\/doi.org\/10.1002\/9781119333142.ch4","journal-title":"5G Networks: Fundamental requirements Enabling Technologies, and Operations Management"},{"key":"2781_CR157","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/TCCN.2019.2933835","volume":"5","author":"M Vaezi","year":"2019","unstructured":"Vaezi, M., Aruma Baduge, G. A., Liu, Y., Arafa, A., Fang, F., & Ding, Z. (2019). Interplay between NOMA and Other Emerging Technologies: A Survey. IEEE Transactions on Cognitive Communications and Networking, 5, 900\u2013919. https:\/\/doi.org\/10.1109\/TCCN.2019.2933835","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"2781_CR158","doi-asserted-by":"publisher","first-page":"17450","DOI":"10.1109\/ACCESS.2017.2737330","volume":"5","author":"H Lei","year":"2017","unstructured":"Lei, H., Zhang, J., Park, K. H., Xu, P., Ansari, I. S., Pan, G., et al. (2017). On secure NOMA Systems With Transmit Antenna Selection Schemes. IEEE Access, 5, 17450\u201317464. https:\/\/doi.org\/10.1109\/ACCESS.2017.2737330","journal-title":"IEEE Access"},{"key":"2781_CR159","doi-asserted-by":"publisher","first-page":"6981","DOI":"10.1109\/TVT.2018.2824310","volume":"67","author":"H Lei","year":"2018","unstructured":"Lei, H., Zhang, J., Park, K. H., Xu, P., Zhang, Z., Pan, G., et al. (2018). Secrecy outage of max-min TAS scheme in MIMO-NOMA systems. IEEE Transactions on Vehicular Technology, 67, 6981\u20136990. https:\/\/doi.org\/10.1109\/TVT.2018.2824310","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR160","doi-asserted-by":"publisher","first-page":"6282","DOI":"10.1109\/TCOMM.2019.2916070","volume":"67","author":"H Lei","year":"2019","unstructured":"Lei, H., Yang, Z., Park, K. H., Ansari, I. S., Guo, Y., Pan, G., et al. (2019). Secrecy outage analysis for cooperative NOMA systems with relay selection schemes. IEEE Transactions on Communications, 67, 6282\u20136298. https:\/\/doi.org\/10.1109\/TCOMM.2019.2916070","journal-title":"IEEE Transactions on Communications"},{"key":"2781_CR161","doi-asserted-by":"publisher","first-page":"4645","DOI":"10.1109\/TVT.2017.2789223","volume":"67","author":"J Chen","year":"2018","unstructured":"Chen, J., Yang, L., & Alouini, M. S. (2018). Physical layer security for cooperative NOMA systems. IEEE Transactions on Vehicular Technology, 67, 4645\u20134649. https:\/\/doi.org\/10.1109\/TVT.2017.2789223","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR162","doi-asserted-by":"publisher","first-page":"86274","DOI":"10.1109\/ACCESS.2019.2925380","volume":"7","author":"Z Wang","year":"2019","unstructured":"Wang, Z., & Peng, Z. (2019). Secrecy performance analysis of relay selection in cooperative NOMA systems. IEEE Access, 7, 86274\u201386287. https:\/\/doi.org\/10.1109\/ACCESS.2019.2925380","journal-title":"IEEE Access"},{"key":"2781_CR163","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1109\/LCOMM.2019.2934410","volume":"23","author":"C Yu","year":"2019","unstructured":"Yu, C., Ko, H. L., Peng, X., Xie, W., & Zhu, P. (2019). Jammer-aided secure communications for cooperative NOMA systems. IEEE Communications Letters, 23, 1935\u20131939. https:\/\/doi.org\/10.1109\/LCOMM.2019.2934410","journal-title":"IEEE Communications Letters"},{"key":"2781_CR164","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/TVT.2019.2962860","volume":"69","author":"K Cao","year":"2020","unstructured":"Cao, K., Wang, B., Ding, H., Li, T., & Gong, F. (2020). Optimal Relay Selection For Secure NOMA systems under untrusted users. IEEE Transactions on Vehicular Technology, 69, 1942\u20131955. https:\/\/doi.org\/10.1109\/TVT.2019.2962860","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR165","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tvt.2020.2973726","volume":"69","author":"X Pei","year":"2020","unstructured":"Pei, X., Yu, H., Wen, M., Li, Q., & Ding, Z. (2020). Secure outage analysis for cooperative NOMA Systems With Antenna Selection. IEEE Transactions on Vehicular Technology, 69, 1\u20131. https:\/\/doi.org\/10.1109\/tvt.2020.2973726","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2781_CR166","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16, 2985\u20132996. https:\/\/doi.org\/10.1109\/TITS.2015.2439292","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2781_CR167","doi-asserted-by":"publisher","first-page":"4087","DOI":"10.1109\/TVT.2018.2789466","volume":"67","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Lu, X., Xu, D., Tang, Y., Wang, L., & Zhuang, W. (2018). UAV relay in VANETs against smart jamming with reinforcement learning. IEEE Transactions on Vehicular Technology, 67, 4087\u20134097. https:\/\/doi.org\/10.1109\/TVT.2018.2789466","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02781-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02781-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02781-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T07:18:28Z","timestamp":1637047108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02781-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,18]]},"references-count":167,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["2781"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02781-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,18]]},"assertion":[{"value":"3 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}