-
A Tutorial on Fluid Antenna System for 6G Networks: Encompassing Communication Theory, Optimization Methods and Hardware Designs IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-11-15 Wee Kiat New, Kai-Kit Wong, Hao Xu, Chao Wang, Farshad Rostami Ghadi, Jichen Zhang, Junhui Rao, Ross Murch, Pablo Ramírez-Espinosa, David Morales-Jimenez, Chan-Byoung Chae, Kin-Fai Tong
-
Towards Secured Smart Grid 2.0: Exploring Security Threats, Protection Models, and Challenges IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-11-07 Lan-Huong Nguyen, Van-Linh Nguyen, Ren-Hung Hwang, Jian-Jhih Kuo, Yu-Wen Chen, Chien-Chung Huang, Ping-I Pan
-
Centrality-Based On-Path Caching Strategies in NDN-Based Internet of Things: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-11-07 Muhammad Ali Naeem, Ikram Ud Din, Yahui Meng, Ahmad Almogren, Joel J. P. C. Rodrigues
-
From Simulators to Digital Twins for Enabling Emerging Cellular Networks: A Tutorial and Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-11-04 Marvin Manalastas, Muhammad Umar Bin Farooq, Syed Muhammad Asad Zaidi, Haneya Naeem Qureshi, Yusuf Sambo, Ali Imran
-
A Comprehensive Overview on UWB Radar: Applications, Standards, Signal Processing Techniques, Datasets, Radio Chips, Trends and Future Research Directions IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-30 Mohammad Cheraghinia, Adnan Shahid, Stijn Luchie, Gert-Jan Gordebeke, Olivier Caytan, Jaron Fontaine, Ben Van Herbruggen, Sam Lemey, Eli De Poorter
-
Online Network DoS/DDoS Detection: Sampling, Change Point Detection, and Machine Learning Methods IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-30 Evans Owusu, Mohamed Rahouti, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong, Yufeng Xin, Lu Lu, D. Frank Hsu
-
Understanding Wireless Charger Networks: Concepts, Current Research, and Future Directions IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-28 Meixuan Ren, Haipeng Dai, Tang Liu, Xianjun Deng, Wanchun Dou, Yuanyuan Yang, Guihai Chen
-
Odor-Based Molecular Communications: State-of-the-Art, Vision, Challenges, and Frontier Directions IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-28 Dilara Aktas, Beyza E. Ortlek, Meltem Civas, Elham Baradari, Ahmet B. Kilic, Fatih E. Bilgen, Ayse S. Okcu, Melanie Whitfield, Oktay Cetinkaya, Ozgur B. Akan
-
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-28 Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo
-
Interference Burden in Wireless Communications: A Comprehensive Survey from PHY Layer Perspective IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-28 Armed Tusha, Hüseyin Arslan
-
Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-28 Mostafa M. Fouda, Zubair Md Fadlullah, Mohamed I. Ibrahem, Nei Kato
-
A Comprehensive Survey of Wireless Time-Sensitive Networking (TSN): Architecture, Technologies, Applications, and Open Issues IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-25 Kouros Zanbouri, Md. Noor-A-Rahim, Jobish John, Cormac J. Sreenan, H. Vincent Poor, Dirk Pesch
-
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-25 Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti
-
Game Theory and Reinforcement Learning for Anti-jamming Defense in Wireless Communications: Current Research, Challenges, and Solutions IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-24 Luliang Jia, Nan Qi, Zhe Su, Feihuang Chu, Shengliang Fang, Kai-Kit Wong, Chan-Byoung Chae
-
Reinforcement-Learning-Based Intrusion Detection in Communication Networks: A Review IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-22 Hamza Kheddar, Diana W. Dawoud, Ali Ismail Awad, Yassine Himeur, Muhammad Khurram Khan
-
Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-17 Xiaofei Wang, Yunfeng Zhao, Chao Qiu, Qinghua Hu, Victor C. M. Leung
-
Near-Field Communications: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-14 Yuanwei Liu, Chongjun Ouyang, Zhaolin Wang, Jiaqi Xu, Xidong Mu, A. Lee Swindlehurst
-
Resource Management, Security, and Privacy Issues in Semantic Communications: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-03 Dongwook Won, Geeranuch Woraphonbenjakul, Ayalneh Bitew Wondmagegn, Anh Tien Tran, Donghyun Lee, Demeke Shumeye Lakew, Sungrae Cho
-
Blind Carrier Frequency Offset Estimation Techniques for Next-Generation Multicarrier Communication Systems: Challenges, Comparative Analysis, and Future Prospects IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-01 Shivani Singh, Sushant Kumar, Sudhan Majhi, Udit Satija, Chau Yuen
-
Trajectory-Prediction Techniques for Unmanned Aerial Vehicles (UAVs): A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-01 Pushpak Shukla, Shailendra Shukla, Amit Kumar Singh
-
A Survey on Indoor Visible Light Positioning Systems: Fundamentals, Applications, and Challenges IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-10-01 Zhiyu Zhu, Yang Yang, Mingzhe Chen, Caili Guo, Julian Cheng, Shuguang Cui
-
Resource Management in RIS-Assisted Rate Splitting Multiple Access for Next Generation (xG) Wireless Communications: Models, State-of-the-Art, and Future Directions IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-09-30 Ibrahim Aboumahmoud, Ekram Hossain, Amine Mezghani
-
Large Language Model (LLM) for Telecommunications: A Comprehensive Survey on Principles, Key Techniques, and Opportunities IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-09-23 Hao Zhou, Chengming Hu, Ye Yuan, Yufei Cui, Yili Jin, Can Chen, Haolun Wu, Dun Yuan, Li Jiang, Di Wu, Xue Liu, Charlie Zhang, Xianbin Wang, Jiangchuan Liu
-
Wireless Sensing for Material Identification: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-09-06 Yande Chen, Chongzhi Xu, Kexin Li, Jia Zhang, Xiuzhen Guo, Meng Jin, Xiaolong Zheng, Yuan He
-
Bacterial Communications and Computing in Internet of Everything (IoE) IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-28 B. Yagmur Koca, Ozgur B. Akan
-
Multi-Satellite MIMO Systems for Direct Satellite-to-Device Communications: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-26 Zohre Mashayekh Bakhsh, Yasaman Omid, Gaojie Chen, Farbod Kayhan, Yi Ma, Rahim Tafazolli
-
Evolution of High-Throughput Satellite Systems: A Vision of Programmable Regenerative Payload IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-26 Olfa Ben Yahia, Zineb Garroussi, Olivier Bélanger, Brunilde Sansò, Jean-François Frigon, Stéphane Martel, Antoine Lesage-Landry, Gunes Karabulut Kurt
-
A Tutorial on 5G Positioning IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-23 Lorenzo Italiano, Bernardo Camajori Tedeschini, Mattia Brambilla, Huiping Huang, Monica Nicoli, Henk Wymeersch
-
Editorial: Third Quarter 2024 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-22 Dusit Niyato
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 19 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “Network Virtualization”, “Vehicular and Sensor Communications”, “Multimedia Communications”, “Network and Service Management
-
-
A Survey on Haptics: Communication, Sensing and Feedback IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-14 Melika Emami, Amirhossein Bayat, Rahim Tafazolli, Atta Quddus
-
A Survey on Artificial Intelligence Techniques for Improved Rich Media Content Delivery in a 5G and Beyond Network Slicing Context IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-14 Fazal E Subhan, Abid Yaqoob, Cristina Hava Muntean, Gabriel-Miro Muntean
-
Modeling, Estimation, and Applications of Phase Noise in Wireless Communications: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-13 Zikai Chang, Yuntao Xu, Junjie Chen, Ning Xie, Yejun He, Hongbin Li
-
Intellicise Wireless Networks From Semantic Communications: A Survey, Research Issues, and Challenges IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-13 Ping Zhang, Wenjun Xu, Yiming Liu, Xiaoqi Qin, Kai Niu, Shuguang Cui, Guangming Shi, Zhijin Qin, Xiaodong Xu, Fengyu Wang, Yue Meng, Chen Dong, Jincheng Dai, Qianqian Yang, Yaping Sun, Dahua Gao, Hui Gao, Shujun Han, Xiaodan Song
-
Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-12 Aditya Kulkarni, Vivek Balachandran, Tamal Das
-
Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-08-12 Abeer Awadallah, Khouloud Eledlebi, Jamal Zemerly, Deepak Puthal, Ernesto Damiani, Kamal Taha, Tae-Yeon Kim, Paul D. Yoo, Kim-Kwang Raymond Choo, Man-Sung Yim, Chan Yeob Yeun
-
Evolution of RAN Architectures Toward 6G: Motivation, Development, and Enabling Technologies IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-04-15 Jiacheng Chen, Xiaohu Liang, Jianzhe Xue, Yu Sun, Haibo Zhou, Xuemin Shen
In this survey paper, we first provide insights on the evolution of radio access networks (RANs) through investigating the existing paradigms and future trends towards 6G. We then present the fully-decoupled RAN (FD-RAN), which aligns with the trends by integrating existing paradigms and introducing new features such as physical decoupling of uplink and downlink base stations. We also discuss the key
-
A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-04-10 Howe Yuan Zhu, Nguyen Quang Hieu, Dinh Thai Hoang, Diep N. Nguyen, Chin-Teng Lin
The growing interest in the Metaverse has generated momentum for members of academia and industry to innovate toward realizing the Metaverse world. The Metaverse is a unique, continuous, and shared virtual world where humans embody a digital form within an online platform. Through a digital avatar, Metaverse users should have a perceptual presence within the environment and can interact and control
-
Wireless Access for V2X Communications: Research, Challenges and Opportunities IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-04-01 Joseph Clancy, Darragh Mullins, Brian Deegan, Jonathan Horgan, Enda Ward, Ciar谩n Eising, Patrick Denny, Edward Jones, Martin Glavin
Autonomous vehicles and Intelligent Transport Systems (ITS) have started to become a reality in recent years. However, shortcomings of these early intelligent vehicles demonstrate a need to increase an intelligent vehicle’s perceptual bubble beyond the vehicle’s onboard sensors. Vehicle-to-Everything (V2X) communications is a technology intended to enable intelligent vehicles to increase their perceptive
-
Beam Alignment in MmWave V2X Communications: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-29 Jingru Tan, Tom H. Luan, Wenbo Guan, Yuntao Wang, Haixia Peng, Yao Zhang, Dongmei Zhao, Ning Lu
The digital transformation within the automotive industry is accelerating towards an era dominated by autonomous vehicles, with vehicle-to-everything (V2X) communications being a fundamental enabler for this advancement. As vehicular networks evolve to meet the complex demands of autonomous driving, traditional communication systems encounter limitations in bandwidth and data transfer rates. Millimeter-wave
-
Survey on Unified Threat Management (UTM) Systems for Home Networks IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-28 Asif Siddiqui, Bhaskar P. Rimal, Martin Reisslein, Yong Wang
Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous security risks for networked applications. A Unified Threat Management (UTM) system strives to comprehensively protect a home network by providing firewall, intrusion detection and prevention, as well as antibot protection in an integrated
-
A Tutorial on Radio System-Level Simulations With Emphasis on 3GPP 5G-Advanced and Beyond IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-27 Klaus Pedersen, Roberto Maldonado, Guillermo Pocovi, Enric Juan, Mads Lauridsen, Istv谩n Z. Kov谩cs, Mads Brix, Jeroen Wigard
In this tutorial we present recipes for dynamic systemlevel simulations (SLSs) of 5G and beyond cellular radio systems. A key ingredient for such SLSs is selection of proper models to make sure that the performance determining effects are properly reflected to ensure output of realistic radio performance results. We therefore present a significant number of SLS models and related methodologies for
-
Two Decades of Research Progress in Resource Allocation for PLC Systems: From Core Concepts to Frontiers IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-25 Yan F. Coutinho, 脗ndrei Camponogara, Mateus de L. Filomeno, Marcello L. R. de Campos, Andrea M. Tonello, Mois茅s V. Ribeiro
In this paper, we review the current state-of-the-art of resource allocation for power line communication systems. The study systematically presents the advancements achieved in this field over the past decades. To achieve this, we adopt two complementary perspectives: a power line communication-centric view and an optimization-centric view. The former highlights resource allocation within the eye
-
A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-18 Gabriel Antonio F. Rebello, Gustavo F. Camilo, Lucas Airam C. de Souza, Maria Potop-Butucaru, Marcelo Dias de Amorim, Miguel Elias M. Campista, Lu铆s Henrique M. K. Costa
Despite the great success of blockchain systems in recent years, blockchains still struggle to provide the same level of latency and throughput as centralized financial systems. The core of this problem lies in the inefficiency of consensus protocols. In this paper, we provide a survey on recent efforts to improve the scalability of blockchains. We focus on layer-two protocols, such as payment channel
-
Empowering Cloud Computing With Network Acceleration: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-14 Lorenzo Rosa, Luca Foschini, Antonio Corradi
Modern interactive and data-intensive applications must operate under demanding time constraints, prompting a shift toward the adoption of specialized software and hardware network acceleration technologies. This specialization, however, poses significant scalability, flexibility, security, and economic sustainability challenges for application developers. Cloud computing holds the potential to overcome
-
Security Analysis of Critical 5G Interfaces IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-13 Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, Ezekiel Ndubisi, Ashraf Matrawy
Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect Network Functions (NFs) to exchange data and services. Certain interfaces are particularly critical because they are involved in the exchange of sensitive data or are exposed externally. To the best of our knowledge, no literature work analyzes the 5G security from a network architecture or interface perspective
-
A Survey on Human Profile Information Inference via Wireless Signals IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-07 Qiuye He, Edwin Yang, Song Fang
-
Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-04 Sujitha Lakshminarayana, Amit Praseed, P. Santhi Thilagam
The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are
-
Network Slicing Based Learning Techniques for IoV in 5G and Beyond Networks IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-01 Wafa Hamdi, Chahrazed Ksouri, Hasan Bulut, Mohamed Mosbah
The effects of transport development on people’s lives are diverse, ranging from economy to tourism, health care, etc. Great progress has been made in this area, which has led to the emergence of the Internet of Vehicles (IoV) concept. The main objective of this concept is to offer a safer and more comfortable travel experience through making available a vast array of applications, by relying on a
-
Visible Light Positioning as a Next-Generation Indoor Positioning Technology: A Tutorial IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-03-01 Sander Bastiaens, Morteza Alijani, Wout Joseph, David Plets
Indoor positioning technology has become undisputedly pervasive in modern society. It can be used for numerous applications in various environments, ranging from agriculture to smart industry. Among the different indoor positioning technologies, the development of the indoor visible light positioning (VLP) system has gained momentum recently thanks to its low cost and centimetre-order accuracy. Moreover
-
Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-27 Xianhao Chen, Yiqin Deng, Haichuan Ding, Guanqiao Qu, Haixia Zhang, Pan Li, Yuguang Fang
Smart cities demand resources for rich immersive sensing, ubiquitous communications, powerful computing, large storage, and high intelligence (SCCSI) to support various kinds of applications, such as public safety, connected and autonomous driving, smart and connected health, and smart living. At the same time, vehicles equipped with significantly powerful SCCSI capabilities are expected to become
-
Editorial First Quarter 2024 IEEE Communications Surveys and Tutorials IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-26 Dusit Niyato
I welcome you to the first issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Vehicular and Sensor Communications”, “Internet Technologies”, “Network Virtualization” and “Network
-
-
Frequency Selective Surface towards 6G Communication Systems: A Contemporary Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-23 Xuehan Chen, Jingjing Tan, Litian Kang, Fengxiao Tang, Ming Zhao, Nei Kato
Frequency selective surfaces (FSSs) have attracted extensive attention for suppressing interference and improving channel quality and coverage by selectively transmitting or directionally reflecting electromagnetic waves in a specific frequency range in wireless communication networks. Therefore, FSS technology is considered to be another candidate after intelligent reflective surfaces (IRSs) in the
-
The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-19 Dong Pan, Gui-Lu Long, Liuguo Yin, Yu-Bo Sheng, Dong Ruan, Soon Xin Ng, Jianhua Lu, Lajos Hanzo
Communication security has to evolve to a higher plane in the face of the threat from the massive computing power of the emerging quantum computers. Quantum secure direct communication (QSDC) constitutes a promising branch of quantum communication, which is provably secure and overcomes the threat of quantum computing, whilst conveying secret messages directly via the quantum channel. In this survey
-
Leveraging Deep Learning to Strengthen the Cyber-Resilience of Renewable Energy Supply Chains: A Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-12 Malka N. Halgamuge
Deep learning shows immense potential for strengthening the cyber-resilience of renewable energy supply chains. However, research gaps in comprehensive benchmarks, real-world model evaluations, and data generation tailored to the renewable domain persist. This study explores applying state-of-the-art deep learning techniques to secure renewable supply chains, drawing insights from over 300 publications
-
A Tutorial On Environment-Aware Communications via Channel Knowledge Map for 6G IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-09 Yong Zeng, Junting Chen, Jie Xu, Di Wu, Xiaoli Xu, Shi Jin, Xiqi Gao, David Gesbert, Shuguang Cui, Rui Zhang
Sixth-generation (6G) mobile communication networks are expected to have dense infrastructures, large antenna size, wide bandwidth, cost-effective hardware, diversified positioning methods, and enhanced intelligence. Such trends bring both new challenges and opportunities for the practical design of 6G. On one hand, acquiring channel state information (CSI) in real time for all wireless links becomes
-
Physical Layer Authentication and Security Design in the Machine Learning Era IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-08 Tiep M. Hoang, Alireza Vahid, Hoang Duong Tuan, Lajos Hanzo
Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY security is of crucial importance in the landscape of more and more data-driven wireless services. In this context, we first summarize the family of bespoke
-
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-07 Yichen Wan, Youyang Qu, Wei Ni, Yong Xiang, Longxiang Gao, Ekram Hossain
Due to the greatly improved capabilities of devices, massive data, and increasing concern about data privacy, Federated Learning (FL) has been increasingly considered for applications to wireless communication networks (WCNs). Wireless FL (WFL) is a distributed method of training a global deep learning model in which a large number of participants each train a local model on their training datasets
-
A Survey of Quantum Internet Protocols From a Layered Perspective IEEE Commun. Surv. Tutor. (IF 34.4) Pub Date : 2024-02-05 Yuan Li, Hao Zhang, Chen Zhang, Tao Huang, F. Richard Yu
With the development of quantum technologies, the quantum Internet has demonstrated unique applications beyond the classical Internet and has been investigated extensively in recent years. In the construction of conventional Internet software, the protocol stack is the core architecture for coordinating modules. How to design a protocol stack for the quantum Internet is a challenging problem. In this