{"id":"https://openalex.org/W3043157778","doi":"https://doi.org/10.1109/mwc.001.2000044","title":"Physical Layer Security in the Age of Artificial Intelligence and Edge Computing","display_name":"Physical Layer Security in the Age of Artificial Intelligence and Edge Computing","publication_year":2020,"publication_date":"2020-07-17","ids":{"openalex":"https://openalex.org/W3043157778","doi":"https://doi.org/10.1109/mwc.001.2000044","mag":"3043157778"},"language":"en","primary_location":{"id":"doi:10.1109/mwc.001.2000044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.001.2000044","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071653663","display_name":"Lindong Zhao","orcid":"https://orcid.org/0000-0001-6827-6968"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lindong Zhao","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100709504","display_name":"Xuguang Zhang","orcid":"https://orcid.org/0000-0001-7763-0308"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuguang Zhang","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100379139","display_name":"Jianxin Chen","orcid":"https://orcid.org/0000-0001-6204-1121"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxin Chen","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003201141","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-5099-4870"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071653663"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":1.9755,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.86650276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"27","issue":"5","first_page":"174","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8519233465194702},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7157950401306152},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6494937539100647},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.503786027431488},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4682798385620117},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4625188112258911},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45934754610061646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39040207862854004},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3482402563095093},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3044742941856384},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.25406336784362793},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1250968873500824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8519233465194702},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7157950401306152},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6494937539100647},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.503786027431488},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4682798385620117},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4625188112258911},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45934754610061646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39040207862854004},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3482402563095093},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3044742941856384},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.25406336784362793},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1250968873500824},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwc.001.2000044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.001.2000044","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1870509456","https://openalex.org/W1970334960","https://openalex.org/W1976842305","https://openalex.org/W2103063389","https://openalex.org/W2509004749","https://openalex.org/W2558778358","https://openalex.org/W2791256362","https://openalex.org/W2807731816","https://openalex.org/W2898104747","https://openalex.org/W2901096892","https://openalex.org/W2907645330","https://openalex.org/W2947923525","https://openalex.org/W2963688708","https://openalex.org/W2964113506","https://openalex.org/W2964345771"],"related_works":["https://openalex.org/W2997512100","https://openalex.org/W2331043530","https://openalex.org/W3048799479","https://openalex.org/W2393933887","https://openalex.org/W2779961139","https://openalex.org/W3006507989","https://openalex.org/W2374725260","https://openalex.org/W1607315280","https://openalex.org/W2107384724","https://openalex.org/W1481299995"],"abstract_inverted_index":{"Physical":[0],"layer":[1],"security":[2,9],"(PLS)":[3],"is":[4,41,108,126,146],"emerging":[5],"as":[6],"an":[7,115],"attractive":[8],"paradigm":[10],"to":[11,36,60,110,128,148],"complement":[12],"or":[13],"even":[14],"replace":[15],"complex":[16],"cryptography.":[17],"Although":[18],"information-theoretical":[19],"transmission":[20],"optimization":[21],"and":[22,56,83,99,119,143,152],"physical-layer":[23,122],"key":[24,123],"generation":[25,124],"have":[26],"been":[27],"thoroughly":[28],"researched,":[29],"there":[30],"still":[31],"exist":[32],"many":[33],"critical":[34],"issues":[35],"be":[37],"tackled":[38],"before":[39],"PLS":[40,72,117,157],"extensively":[42],"applied.":[43],"In":[44],"this":[45],"article,":[46],"we":[47,134],"investigate":[48],"the":[49,62,78,94,112,150,155],"prospect":[50],"for":[51],"exploiting":[52],"artificial":[53],"intelligent":[54],"(AI)":[55],"edge":[57],"computing":[58],"(EC)":[59],"facilitate":[61],"practical":[63],"application":[64],"of":[65,114,154],"PLS.":[66],"First,":[67],"two":[68,87],"outstanding":[69],"challenges":[70],"facing":[71],"designers":[73],"are":[74,90],"identified":[75],"by":[76,92,97],"analyzing":[77],"fundamental":[79],"assumptions":[80],"regarding":[81],"eavesdroppers":[82],"wireless":[84],"channels.":[85],"Accordingly,":[86],"enhancement":[88],"schemes":[89],"designed":[91,127],"reaping":[93],"benefits":[95],"offered":[96],"AI":[98],"EC.":[100],"Specifically,":[101],"a":[102,120,136],"novel":[103],"secure":[104],"resource":[105],"management":[106],"framework":[107],"developed":[109],"enhance":[111],"adaptability":[113],"optimization-based":[116],"paradigm,":[118],"robust":[121],"method":[125],"cope":[129],"with":[130,140],"reciprocity":[131],"failure.":[132],"Finally,":[133],"discuss":[135],"coordinated":[137],"defense":[138],"architecture":[139],"multi-layer,":[141],"multi-domain,":[142],"multi-dimension,":[144],"which":[145],"expected":[147],"exploit":[149],"compatibility":[151],"complementarity":[153],"existing":[156],"methods.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
