[5]
W. Zhang, M. Feng, M. Krunz, and A. Hossein Yazdani Abyaneh, Signal detection and classification in shared spectrum: A deep learning approach, in Proc. IEEE INFOCOM 2021 - IEEE Conf. Computer Communications, Vancouver, Canada, 2021, pp. 1–10.
[6]
H. Ye, L. Liang, and G. Y. Li, Circular convolutional auto-encoder for channel coding, in Proc. 2019 IEEE 20th Int. Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2019, pp. 1–5.
[7]
A. V. Makkuva, X. Liu, M. V. Jamali, H. Mahdavifar, S. Oh, and P. Viswanath, KO codes: Inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning, arXiv preprint arXiv: 2108.12920, 2021.
[15]
A. Burg, A. Chattopadhyay, and K. -Y. Lam, Wireless communication and security issues for cyber-physical systems and the internet-of-things, Proc. IEEE, vol. 106, no. 1, pp. 38–60, 2017.
[16]
N. Goergen, T. C. Clancy, and T. R. Newman, Physical layer authentication watermarks through synthetic channel emulation, in Proc. 2010 IEEE Symp. on New Frontiers in Dynamic Spectrum (DySPAN), Singapore, 2010, pp. 1–7.
[19]
T. Dean and A. Goldsmith, Physical-layer cryptography through massive MIMO, in Proc. 2013 IEEE Information Theory Workshop (ITW), Seville, Spain, 2013, pp. 1–5.
[21]
M. Arvandi, S. Wu, A. Sadeghian, W. W. Melek, and I. Woungang, Symmetric cipher design using recurrent neural networks, in Proc. 2006 IEEE Int. Joint Conf. Neural Network Proceedings, Vancouver, Canada, 2006, pp. 2039–2046.
[22]
M. Abadi and D. G. Andersen, Learning to protect communications with adversarial neural cryptography, arXiv preprint arXiv: 1610.06918, 2016.
[26]
Z. Li, R. Yates, and W. Trappe, Secrecy capacity of independent parallel channels, in Securing Wireless Communications at the Physical Layer, R. Liu and W. Trappe, Eds. Boston, MA, USA: Springer, 2009, pp. 1–18.
[27]
H. Suo, J. Wan, C. Zou, and J. Liu, Security in the Internet of Things: A review, in Proc. 2012 Int. Conf. Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 648–651.
[28]
W. Diffie and M. E. Hellman, New directions in cryptography, in Democratizing cryptography : The work of Whitfield Diffie and Martin Hellman, R. Slayton, Ed. New York, NY, USA: ACM, 2022. pp. 365–390.
[30]
M. Uzair and N. Jamil, Effects of hidden layers on the efficiency of neural networks, in Proc. 2020 IEEE 23rd Int. Multitopic Conf. (INMIC), Bahawalpur, Pakistan, 2021, pp. 1–6.
[32]
C. F. R. Chen, Q. Fan, and R. Panda, CrossViT: Cross-attention multi-scale vision transformer for image classification, in Proc. 2021 IEEE/CVF Int. Conf. Computer Vision (ICCV), Montreal, Canada, 2022, pp. 347–356.