{"id":"https://openalex.org/W4285047795","doi":"https://doi.org/10.1109/iccworkshops53468.2022.9814628","title":"Deep Learning for Secure Transmission in Wireless Communication Networks","display_name":"Deep Learning for Secure Transmission in Wireless Communication Networks","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4285047795","doi":"https://doi.org/10.1109/iccworkshops53468.2022.9814628"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops53468.2022.9814628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops53468.2022.9814628","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060468429","display_name":"Felix Olowononi","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Felix O. Olowononi","raw_affiliation_strings":["Howard University,Department of Electrical Engineering &#x0026; Computer Science,DC,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of Electrical Engineering &#x0026; Computer Science,DC,USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Howard University,Department of Electrical Engineering &#x0026; Computer Science,DC,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of Electrical Engineering &#x0026; Computer Science,DC,USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090126029","display_name":"Charles Kamhoua","orcid":"https://orcid.org/0000-0003-2169-5975"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles A. Kamhoua","raw_affiliation_strings":["U.S. Army Research Laboratory,Adelphi,MD,USA","U.S. Army Research Laboratory, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128"]},{"raw_affiliation_string":"U.S. Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060468429"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04654169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"379","last_page":"384"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7027567625045776},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5734598636627197},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.56596839427948},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5290704369544983},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42111724615097046},{"id":"https://openalex.org/keywords/electronic-warfare","display_name":"Electronic warfare","score":0.41720470786094666},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4138169586658478},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3867754638195038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3390270471572876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32714706659317017},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3263477683067322},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.2368263602256775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7027567625045776},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5734598636627197},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.56596839427948},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5290704369544983},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42111724615097046},{"id":"https://openalex.org/C133082901","wikidata":"https://www.wikidata.org/wiki/Q272826","display_name":"Electronic warfare","level":3,"score":0.41720470786094666},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4138169586658478},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3867754638195038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3390270471572876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32714706659317017},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3263477683067322},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.2368263602256775},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops53468.2022.9814628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops53468.2022.9814628","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8999999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2043769961","https://openalex.org/W2238937638","https://openalex.org/W2272847350","https://openalex.org/W2398796932","https://openalex.org/W2399438058","https://openalex.org/W2402669159","https://openalex.org/W2434476332","https://openalex.org/W2605107826","https://openalex.org/W2734408173","https://openalex.org/W2770606349","https://openalex.org/W2897006654","https://openalex.org/W2901240584","https://openalex.org/W2911910187","https://openalex.org/W2955338161","https://openalex.org/W2962964572","https://openalex.org/W2963145597","https://openalex.org/W2963385530","https://openalex.org/W2963622214","https://openalex.org/W2964113506","https://openalex.org/W2981096252","https://openalex.org/W2981214342","https://openalex.org/W3112733201","https://openalex.org/W3112756300","https://openalex.org/W3157093784","https://openalex.org/W3189514731","https://openalex.org/W4225725784","https://openalex.org/W4287683067","https://openalex.org/W6775015740","https://openalex.org/W6782586698","https://openalex.org/W6810891734"],"related_works":["https://openalex.org/W2355663289","https://openalex.org/W2106913410","https://openalex.org/W4380372336","https://openalex.org/W2354248671","https://openalex.org/W2359134391","https://openalex.org/W2594116857","https://openalex.org/W2947628004","https://openalex.org/W2935229758","https://openalex.org/W2352791832","https://openalex.org/W2387913039"],"abstract_inverted_index":{"Advancements":[0],"in":[1,25,40,110,129,178,193],"information":[2],"and":[3,28,62,90,145,169],"communication":[4,140,181],"technologies":[5,33],"have":[6],"contributed":[7],"significantly":[8],"to":[9,35,66,81,100,120,158,185,205,223],"the":[10,29,44,51,68,71,74,102,107,111,135,143,160,164,167,170,179,195,207,217],"optimization":[11,187],"of":[12,31,55,70,113,139,197,209],"next":[13],"generation":[14],"wireless":[15,19,53,96,118],"communications":[16,20,119,165],"networks.":[17],"Moreover,":[18],"play":[21],"a":[22,37,122,174],"huge":[23],"role":[24],"electronic":[26],"warfare":[27],"emergence":[30],"new":[32],"continue":[34],"provoke":[36],"corresponding":[38],"revolution":[39],"battlefield":[41,56,130],"operations.":[42,131],"Nevertheless,":[43],"widened":[45],"attack":[46],"surface":[47],"that":[48,189],"result":[49],"from":[50,162],"increased":[52],"networking":[54],"devices":[57],"lure":[58],"attackers":[59],"like":[60],"jammers":[61],"eavesdroppers":[63],"who":[64],"seek":[65],"explore":[67],"vulnerability":[69],"network":[72],"through":[73],"physical":[75],"layer.":[76],"Consequently,":[77],"it":[78],"is":[79,157],"imperative":[80],"direct":[82],"research":[83],"efforts":[84],"not":[85],"only":[86],"towards":[87],"advancing":[88],"spectral":[89],"energy":[91],"efficiency":[92],"but":[93],"also":[94],"secure":[95,126],"communications.":[97],"In":[98,183],"order":[99],"address":[101,206],"challenges,":[103],"we":[104,133,215],"leverage":[105],"on":[106],"recent":[108],"developments":[109],"use":[112,134],"machine":[114],"learning":[115,200],"(ML)":[116],"for":[117,125],"propose":[121],"novel":[123],"approach":[124],"wave-form":[127],"transmission":[128],"Specifically,":[132],"learning-based":[136],"end-to-end":[137],"representation":[138],"systems":[141],"where":[142],"transmitter":[144,168],"receiver":[146,171],"are":[147,190],"represented":[148],"by":[149],"two":[150],"deep":[151,199],"neural":[152],"networks":[153],"(DNN).":[154],"The":[155],"goal":[156],"prevent":[159],"eavesdropper":[161],"accessing":[163],"between":[166],"without":[172],"necessarily":[173],"feedback":[175],"mechanism":[176],"as":[177],"conventional":[180],"system.":[182],"comparison":[184],"traditional":[186],"methods":[188,222],"usually":[191],"iterative":[192],"nature,":[194],"advantages":[196],"employing":[198],"(DL)":[201],"includes":[202],"its":[203,225],"ability":[204],"challenges":[208],"statistically":[210],"inclined":[211],"methods.":[212],"Using":[213],"simulations,":[214],"compare":[216],"proposed":[218],"method":[219],"with":[220],"other":[221],"ascertain":[224],"credibility.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
