{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T13:49:51Z","timestamp":1774014591584,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:00:00Z","timestamp":1773964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:00:00Z","timestamp":1773964800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"The Science and Technology Development Fund of Macao","award":["0044\/2022\/A1"],"award-info":[{"award-number":["0044\/2022\/A1"]}]},{"DOI":"10.13039\/501100006469","name":"FDCT","doi-asserted-by":"crossref","award":["0033\/2023\/RIA1"],"award-info":[{"award-number":["0033\/2023\/RIA1"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"DOI":"10.1007\/s44443-026-00644-3","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T11:24:36Z","timestamp":1774005876000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An adaptive physical-layer security enhancement framework for ambient backscatter communication in industrial IoT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-0297","authenticated-orcid":false,"given":"Han","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8022-7744","authenticated-orcid":false,"given":"Chan-Tong","family":"Lam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5901-5694","authenticated-orcid":false,"given":"Benjamin K.","family":"Ng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1615-2925","authenticated-orcid":false,"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,20]]},"reference":[{"issue":"2","key":"644_CR1","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/s11227-024-06819-x","volume":"81","author":"SZU Abideen","year":"2025","unstructured":"Abideen SZU, Wahid A, Kamal MM, Imtiaz N, Sehito N, Daradkeh YI, Al-Khasawneh MA, Alwabli A, Ullah I (2025) Advancements in iot system security: a reconfigurable intelligent surfaces and backscatter communication approach. J Supercomput 81(2):362","journal-title":"J Supercomput"},{"key":"644_CR2","doi-asserted-by":"crossref","unstructured":"Abideen SZU, Kamal MM, Alharbi E, Malik AA, Alhalabi W, Anwar MS, Ali L (2025) Computational optimization of ris-enhanced backscatter and direct communication for 6g iot: A ddpg-based approach with physical layer security. Comput Model Eng Sci (CMES) 142(3)","DOI":"10.32604\/cmes.2025.061744"},{"issue":"17","key":"644_CR3","doi-asserted-by":"crossref","first-page":"7470","DOI":"10.3390\/s23177470","volume":"23","author":"B Alotaibi","year":"2023","unstructured":"Alotaibi B (2023) A survey on industrial internet of things security: Requirements, attacks, ai-based solutions, and edge computing opportunities. Sensors 23(17):7470","journal-title":"Sensors"},{"issue":"15","key":"644_CR4","doi-asserted-by":"crossref","first-page":"15448","DOI":"10.1109\/JSEN.2022.3184267","volume":"22","author":"R Aragon\u00e9s","year":"2022","unstructured":"Aragon\u00e9s R, Alegret RN, Oliver J, Ferrer C (2022) Autonomous battery-less vibration iiot powered by waste heat for chemical plants using nb-iot. IEEE Sens J 22(15):15448\u201315456","journal-title":"IEEE Sens J"},{"issue":"1","key":"644_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/JSYST.2023.3270620","volume":"18","author":"B Babayigit","year":"2023","unstructured":"Babayigit B, Abubaker M (2023) Industrial internet of things: A review of improvements over traditional scada systems for industrial automation. IEEE Syst J 18(1):120\u2013133","journal-title":"IEEE Syst J"},{"issue":"1","key":"644_CR6","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/LCOMM.2021.3124277","volume":"26","author":"J Chen","year":"2021","unstructured":"Chen J, Yu H, Guan Q, Yang G, Liang Y-C (2021) Spatial modulation based multiple access for ambient backscatter networks. IEEE Commun Lett 26(1):197\u2013201","journal-title":"IEEE Commun Lett"},{"key":"644_CR7","doi-asserted-by":"crossref","unstructured":"Dhondge K, Shorey R, Tew J (2016) Hola: Heuristic and opportunistic link selection algorithm for energy efficiency in industrial internet of things (iiot) systems. In: 2016 8th International Conference on Communication Systems and Networks (COMSNETS), pp 1\u20136. IEEE","DOI":"10.1109\/COMSNETS.2016.7439960"},{"key":"644_CR8","doi-asserted-by":"crossref","DOI":"10.1016\/j.peva.2024.102441","volume":"166","author":"AN Elbattrawy","year":"2024","unstructured":"Elbattrawy AN, Abd El-Malek AH, Rabia SI, Zahra WK (2024) Security-reliability trade-off analysis for transmit antenna selection in cognitive ambient backscatter communications. Perform Eval 166:102441","journal-title":"Perform Eval"},{"key":"644_CR9","doi-asserted-by":"crossref","first-page":"128890","DOI":"10.1109\/ACCESS.2022.3227499","volume":"10","author":"DAL Galappaththige","year":"2022","unstructured":"Galappaththige DAL, Rezaei F, Tellambura C, Herath S (2022) Link budget analysis for backscatter-based passive iot. IEEE Access 10:128890\u2013128922","journal-title":"IEEE Access"},{"issue":"10","key":"644_CR10","doi-asserted-by":"crossref","first-page":"10623","DOI":"10.1109\/JIOT.2020.3005832","volume":"7","author":"E Goudeli","year":"2020","unstructured":"Goudeli E, Psomas C, Krikidis I (2020) Spatial-modulation-based techniques for backscatter communication systems. IEEE Internet Things J 7(10):10623\u201310634","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"644_CR11","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/COMST.2024.3436082","volume":"27","author":"B Gu","year":"2024","unstructured":"Gu B, Li D, Ding H, Wang G, Tellambura C (2024) Breaking the interference and fading gridlock in backscatter communications: State-of-the-art, design challenges, and future directions. IEEE Commun Surv Tutor 27(2):870\u2013911","journal-title":"IEEE Commun Surv Tutor"},{"key":"644_CR12","doi-asserted-by":"crossref","unstructured":"Han JY, Kim J, Kim SM (2019) Physical layer security improvement using artificial noise-aided tag scheduling in ambient backscatter communication systems. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), pp 432\u2013436. IEEE","DOI":"10.1109\/ICUFN.2019.8806154"},{"key":"644_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/9781108691383","volume-title":"Ambient Backscatter Communication Networks","author":"DT Hoang","year":"2020","unstructured":"Hoang DT, Niyato D, Kim DI, Kim T-I, Van Huynh N, Gong S (2020) Ambient Backscatter Communication Networks. Cambridge University Press, Cambridge, United Kingdom"},{"issue":"1","key":"644_CR14","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3390\/sym13010005","volume":"13","author":"P Hou","year":"2020","unstructured":"Hou P, Gong J, Zhao J (2020) A physical layer security enhancement scheme under the ambient backscatter system. Symmetry 13(1):5","journal-title":"Symmetry"},{"issue":"2","key":"644_CR15","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1109\/TCCN.2023.3330065","volume":"10","author":"Y Huang","year":"2023","unstructured":"Huang Y, Li M, Yu FR, Si P, Zhang H, Qiao J (2023) Resources scheduling for ambient backscatter communication-based intelligent iiot: A collective deep reinforcement learning method. IEEE Trans Cogn Commun Netw 10(2):634\u2013648","journal-title":"IEEE Trans Cogn Commun Netw"},{"issue":"3","key":"644_CR16","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1109\/TGCN.2023.3260199","volume":"7","author":"Y Huang","year":"2023","unstructured":"Huang Y, Li M, Yu FR, Si P, Zhang Y (2023) Performance optimization for energy-efficient industrial internet of things based on ambient backscatter communication: an a3c-fl approach. IEEE Trans Green Commun Netw 7(3):1121\u20131134","journal-title":"IEEE Trans Green Commun Netw"},{"key":"644_CR17","doi-asserted-by":"crossref","unstructured":"Imtiaz N, Wahid A, Ul Abideen SZ, Muhammad Kamal M, Sehito N, Khan S, Virdee BS, Kouhalvandi L, Alibakhshikenari M (2025) A deep learning-based approach for the detection of various internet of things intrusion attacks through optical networks. In: Photonics 12:35. MDPI","DOI":"10.3390\/photonics12010035"},{"issue":"4","key":"644_CR18","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/IOTM.0001.2000055","volume":"3","author":"F Jameel","year":"2020","unstructured":"Jameel F, Zeb S, Khan WU, Hassan SA, Chang Z, Liu J (2020) Noma-enabled backscatter communications: Toward battery-free iot networks. IEEE Internet of Things Magazine 3(4):95\u2013101","journal-title":"IEEE Internet of Things Magazine"},{"key":"644_CR19","volume":"135","author":"B Ji","year":"2020","unstructured":"Ji B, Chen Z, Chen S, Zhou B, Li C, Wen H (2020) Joint optimization for ambient backscatter communication system with energy harvesting for iot. Mech Syst Signal Process 135:106412","journal-title":"Mech Syst Signal Process"},{"issue":"3","key":"644_CR20","doi-asserted-by":"crossref","first-page":"2880","DOI":"10.1109\/TITS.2023.3250427","volume":"25","author":"S Jia","year":"2023","unstructured":"Jia S, Wang R, Xu Y, Lou Y, Zhang D, Sato T (2023) Secrecy analysis of abcom-based intelligent transportation systems with jamming. IEEE Trans Intell Transp Syst 25(3):2880\u20132892","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"644_CR21","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1109\/COMST.2023.3278239","volume":"25","author":"T Jiang","year":"2023","unstructured":"Jiang T, Zhang Y, Ma W, Peng M, Peng Y, Feng M, Liu G (2023) Backscatter communication meets practical battery-free internet of things: A survey and outlook. IEEE Commun Surv Tutor 25(3):2021\u20132051","journal-title":"IEEE Commun Surv Tutor"},{"issue":"9","key":"644_CR22","doi-asserted-by":"crossref","first-page":"6236","DOI":"10.1109\/TII.2021.3125376","volume":"18","author":"Z Jin","year":"2021","unstructured":"Jin Z, Zhang C, Jin Y, Zhang L, Su J (2021) A resource allocation scheme for joint optimizing energy consumption and delay in collaborative edge computing-based industrial iot. IEEE Trans Industr Inf 18(9):6236\u20136243","journal-title":"IEEE Trans Industr Inf"},{"key":"644_CR23","doi-asserted-by":"crossref","unstructured":"Kanoun O, Khriji S, Naifar S, Bradai S, Bouattour G, Bouhamed A, El Houssaini D, Viehweger C (2021) Prospects of wireless energy-aware sensors for smart factories in the industry 4.0 era. Electronics 10(23):2929","DOI":"10.3390\/electronics10232929"},{"key":"644_CR24","doi-asserted-by":"crossref","unstructured":"Kumar V, Flanagan MF, Ng DWK, Tran L-N (2021) On the secrecy rate under statistical qos provisioning for ris-assisted miso wiretap channel. In: 2021 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136. IEEE","DOI":"10.1109\/GLOBECOM46510.2021.9685957"},{"issue":"2","key":"644_CR25","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/JIOT.2018.2887086","volume":"6","author":"B Li","year":"2018","unstructured":"Li B, Fei Z, Zhang Y (2018) Uav communications for 5g and beyond: Recent advances and future trends. IEEE Internet Things J 6(2):2241\u20132263","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"644_CR26","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1109\/JSYST.2022.3190297","volume":"17","author":"M Li","year":"2022","unstructured":"Li M, Yuan H, Maple C, Cheng W, Epiphaniou G (2022) Physical layer security analysis of cognitive noma internet of things networks. IEEE Syst J 17(1):1045\u20131055","journal-title":"IEEE Syst J"},{"issue":"3","key":"644_CR27","doi-asserted-by":"crossref","first-page":"1422","DOI":"10.1109\/TCCN.2022.3179431","volume":"8","author":"M Li","year":"2022","unstructured":"Li M, Yuan H, Maple C, Li Y, Alluhaibi O (2022) Security outage probability analysis of cognitive networks with multiple eavesdroppers for industrial internet of things. IEEE Trans Cogn Commun Netw 8(3):1422\u20131433","journal-title":"IEEE Trans Cogn Commun Netw"},{"issue":"4","key":"644_CR28","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2534169.2486015","volume":"43","author":"V Liu","year":"2013","unstructured":"Liu V, Parks A, Talla V, Gollakota S, Wetherall D, Smith JR (2013) Ambient backscatter: Wireless communication out of thin air. ACM SIGCOMM computer communication review 43(4):39\u201350","journal-title":"ACM SIGCOMM computer communication review"},{"issue":"12","key":"644_CR29","doi-asserted-by":"crossref","first-page":"15829","DOI":"10.1109\/TVT.2023.3291546","volume":"72","author":"W Liu","year":"2023","unstructured":"Liu W, Shen S, Tsang DH, Murch R (2023) Mimo ambient backscatter communications: Capacity maximization and beamforming optimization. IEEE Trans Veh Technol 72(12):15829\u201315843","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"644_CR30","doi-asserted-by":"crossref","first-page":"4122","DOI":"10.1109\/TII.2021.3115697","volume":"18","author":"A Mahmood","year":"2021","unstructured":"Mahmood A, Beltramelli L, Abedin SF, Zeb S, Mowla NI, Hassan SA, Sisinni E, Gidlund M (2021) Industrial iot in 5g-and-beyond networks: Vision, architecture, and design trends. IEEE Trans Industr Inf 18(6):4122\u20134137","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"644_CR31","doi-asserted-by":"crossref","first-page":"265","DOI":"10.3390\/electronics13020265","volume":"13","author":"Y Miao","year":"2024","unstructured":"Miao Y, Shao Y, Zhang J (2024) Irs backscatter-based secrecy enhancement against active eavesdropping. Electronics 13(2):265","journal-title":"Electronics"},{"key":"644_CR32","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1109\/OJCOMS.2021.3103735","volume":"2","author":"L Mucchi","year":"2021","unstructured":"Mucchi L, Jayousi S, Caputo S, Panayirci E, Shahabuddin S, Bechtold J, Morales I, Stoica R-A, Abreu G, Haas H (2021) Physical-layer security in 6g networks. IEEE Open J Commun Soc 2:1901\u20131914","journal-title":"IEEE Open J Commun Soc"},{"issue":"10","key":"644_CR33","doi-asserted-by":"crossref","first-page":"1747","DOI":"10.1109\/JPROC.2015.2466548","volume":"103","author":"A Mukherjee","year":"2015","unstructured":"Mukherjee A (2015) Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747\u20131761","journal-title":"Proc IEEE"},{"issue":"3","key":"644_CR34","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee A, Fakoorian SAA, Huang J, Swindlehurst AL (2014) Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun Surv Tutor 16(3):1550\u20131573","journal-title":"IEEE Commun Surv Tutor"},{"issue":"12","key":"644_CR35","doi-asserted-by":"crossref","first-page":"52","DOI":"10.23919\/JCC.2020.12.004","volume":"17","author":"Z Niu","year":"2021","unstructured":"Niu Z, Ma W, Wang W, Jiang T (2021) Spatial modulation-based ambient backscatter: Bringing energy self-sustainability to massive internet of everything in 6g. China Communications 17(12):52\u201365","journal-title":"China Communications"},{"key":"644_CR36","doi-asserted-by":"crossref","first-page":"1100","DOI":"10.1109\/OJCOMS.2020.3012466","volume":"1","author":"F Rezaei","year":"2020","unstructured":"Rezaei F, Tellambura C, Herath S (2020) Large-scale wireless-powered networks with backscatter communications\u2013a comprehensive survey. IEEE Open J Commun Soc 1:1100\u20131130","journal-title":"IEEE Open J Commun Soc"},{"key":"644_CR37","doi-asserted-by":"crossref","first-page":"101791","DOI":"10.1016\/j.phycom.2022.101791","volume":"54","author":"H Sharma","year":"2022","unstructured":"Sharma H, Kumar N, Tekchandani R (2022) Physical layer security using beamforming techniques for 5g and beyond networks: A systematic review. Phys Commun 54:101791","journal-title":"Phys Commun"},{"issue":"9","key":"644_CR38","doi-asserted-by":"crossref","first-page":"12890","DOI":"10.1109\/TVT.2024.3384080","volume":"73","author":"X Song","year":"2024","unstructured":"Song X, Han D, Shi L, Sun H, Hu RQ (2024) Relay assisted cooperative ambient backscatter communication with hybrid long-short packets. IEEE Trans Veh Technol 73(9):12890\u201312903","journal-title":"IEEE Trans Veh Technol"},{"key":"644_CR39","doi-asserted-by":"crossref","unstructured":"Tham M-L, Wong YJ, Iqbal A, Ramli NB, Zhu Y, Dagiuklas T (2023) Deep reinforcement learning for secrecy energy-efficient uav communication with reconfigurable intelligent surface. In: 2023 IEEE Wireless Communications and Networking Conference (WCNC), pp 1\u20136. IEEE","DOI":"10.1109\/WCNC55385.2023.10118891"},{"issue":"1","key":"644_CR40","doi-asserted-by":"crossref","first-page":"31072","DOI":"10.1038\/s41598-025-16553-w","volume":"15","author":"S Ullah","year":"2025","unstructured":"Ullah S, Wu J, Lin Z, Kamal MM, Mostafa H, Sheraz M, Chuah TC (2025) Comparative analysis of deep learning and traditional methods for iot botnet detection using a multi-model framework across diverse datasets. Sci Rep 15(1):31072","journal-title":"Sci Rep"},{"issue":"4","key":"644_CR41","doi-asserted-by":"crossref","first-page":"2889","DOI":"10.1109\/COMST.2018.2841964","volume":"20","author":"N Van Huynh","year":"2018","unstructured":"Van Huynh N, Hoang DT, Lu X, Niyato D, Wang P, Kim DI (2018) Ambient backscatter communications: A contemporary survey. IEEE Commun Surv Tutor 20(4):2889\u20132922","journal-title":"IEEE Commun Surv Tutor"},{"key":"644_CR42","doi-asserted-by":"crossref","unstructured":"Vetrivel S, Maheswari R, Saravanan TP (2024) Industrial iot: Security threats and counter measures. In: Communication Technologies and Security Challenges in IoT: Present and Future, pp 403\u2013425. Springer, Singapore","DOI":"10.1007\/978-981-97-0052-3_20"},{"key":"644_CR43","doi-asserted-by":"crossref","first-page":"3632","DOI":"10.1109\/ACCESS.2024.3520151","volume":"13","author":"A Wahid","year":"2024","unstructured":"Wahid A, Abideen SZU, Imtiaz N, Kamal MM, Alharbi A, Tolba A, Al-Khasawneh M, Ullah I (2024) Enhancing security with hybrid active-passive ris: a drl approach against eavesdropping and jamming. IEEE Access 13:3632\u20133643","journal-title":"IEEE Access"},{"key":"644_CR44","doi-asserted-by":"crossref","first-page":"91627","DOI":"10.1109\/ACCESS.2019.2927217","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Capitaneanu SL, Marinca D, Lohan E-S (2019) Comparative analysis of channel models for industrial iot wireless communication. IEEE Access 7:91627\u201391640","journal-title":"IEEE Access"},{"issue":"24","key":"644_CR45","doi-asserted-by":"crossref","first-page":"17678","DOI":"10.1109\/JIOT.2021.3082161","volume":"8","author":"H Xu","year":"2021","unstructured":"Xu H, Li Q, Gao H, Xu X, Han Z (2021) Residual energy maximization-based resource allocation in wireless-powered edge computing industrial iot. IEEE Internet Things J 8(24):17678\u201317690","journal-title":"IEEE Internet Things J"},{"issue":"24","key":"644_CR46","doi-asserted-by":"crossref","first-page":"21763","DOI":"10.1109\/JIOT.2023.3299210","volume":"10","author":"F Xu","year":"2023","unstructured":"Xu F, Hussain T, Ahmed M, Ali K, Mirza MA, Khan WU, Ihsan A, Han Z (2023) The state of ai-empowered backscatter communications: A comprehensive survey. IEEE Internet Things J 10(24):21763\u201321786","journal-title":"IEEE Internet Things J"},{"key":"644_CR47","doi-asserted-by":"crossref","unstructured":"Yadav RK, Rajendran PS et al (2024) A novel approach to optimize energy consumption in industries using iiot and machine learning. In: 2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS), pp 1\u20136. IEEE","DOI":"10.1109\/ADICS58448.2024.10533637"},{"issue":"5","key":"644_CR48","doi-asserted-by":"crossref","first-page":"8496","DOI":"10.1109\/JIOT.2019.2919743","volume":"6","author":"N Zhang","year":"2019","unstructured":"Zhang N, Wu R, Yuan S, Yuan C, Chen D (2019) Rav: Relay aided vectorized secure transmission in physical layer security for internet of things under active attacks. IEEE Internet Things J 6(5):8496\u20138506","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"644_CR49","doi-asserted-by":"crossref","first-page":"1544","DOI":"10.1002\/tee.23459","volume":"16","author":"H Zhu","year":"2021","unstructured":"Zhu H, Peng Y (2021) Secrecy enhancing for ssk-based communications in the presence of imperfect csi estimation. IEEJ Trans Electr Electron Eng 16(11):1544\u20131546","journal-title":"IEEJ Trans Electr Electron Eng"},{"issue":"1","key":"644_CR50","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/TGCN.2021.3100622","volume":"6","author":"S Zhu","year":"2021","unstructured":"Zhu S, Ota K, Dong M (2021) Green ai for iiot: Energy efficient intelligent edge computing for industrial internet of things. IEEE Trans Green Commun Netw 6(1):79\u201388","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"18","key":"644_CR51","doi-asserted-by":"crossref","first-page":"18192","DOI":"10.1109\/JSEN.2022.3193638","volume":"22","author":"H Zhu","year":"2022","unstructured":"Zhu H, Peng Y, Xu H, Tong F, Jiang X-Q, Mirza MM (2022) Secrecy enhancement for ssk-based communications in wireless sensing systems. IEEE Sens J 22(18):18192\u201318201","journal-title":"IEEE Sens J"},{"key":"644_CR52","doi-asserted-by":"crossref","unstructured":"Zhu H, Huang Z, Lam C-T, Wu Q, Yang B, Ng BK (2023) A space shift keying-based optimization scheme for secure communication in iiot. IEEE Syst J 17(4):5261\u20135271","DOI":"10.1109\/JSYST.2023.3308775"},{"issue":"2","key":"644_CR53","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TCCN.2024.3457532","volume":"11","author":"H Zhu","year":"2024","unstructured":"Zhu H, Zhan J, Lam C-T, Chen B, Ng BK (2024) Machine learning based blind signal detection for ambient backscatter communication systems. IEEE Trans Cogn Commun Netw 11(2):1172\u20131183","journal-title":"IEEE Trans Cogn Commun Netw"},{"issue":"9","key":"644_CR54","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: Technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727\u20131765","journal-title":"Proc IEEE"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00644-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T11:24:43Z","timestamp":1774005883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00644-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,20]]},"references-count":54,"alternative-id":["644"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00644-3","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,20]]},"assertion":[{"value":"29 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"This article does not contain studies with human participants or animals carried out by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}