{"id":"https://openalex.org/W4386552795","doi":"https://doi.org/10.1109/ojcoms.2023.3313352","title":"Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach","display_name":"Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386552795","doi":"https://doi.org/10.1109/ojcoms.2023.3313352"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2023.3313352","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2023.3313352","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/10008219/10243611.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/8782661/10008219/10243611.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027414521","display_name":"Hajar Moudoud","orcid":"https://orcid.org/0000-0003-2979-0862"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Hajar Moudoud","raw_affiliation_strings":["Department of Computer and Software Engineering, Polytechnique Montr&#x00E9;al, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software Engineering, Polytechnique Montr&#x00E9;al, Montreal, Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011549008","display_name":"Soumaya Cherkaoui","orcid":"https://orcid.org/0000-0001-6140-770X"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Soumaya Cherkaoui","raw_affiliation_strings":["Department of Computer and Software Engineering, Polytechnique Montr&#x00E9;al, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software Engineering, Polytechnique Montr&#x00E9;al, Montreal, Canada","institution_ids":["https://openalex.org/I45683168"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027414521"],"corresponding_institution_ids":["https://openalex.org/I45683168"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":2.9977,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91826631,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"4","issue":null,"first_page":"2410","last_page":"2420"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7694000005722046,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7694000005722046,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.6949999928474426,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.6832000017166138,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8331508636474609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8036267757415771},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5972878932952881},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5089337825775146},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5002403259277344},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4556690454483032},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.44954365491867065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3952121436595917},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2919427454471588},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28864508867263794}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8331508636474609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036267757415771},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5972878932952881},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5089337825775146},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5002403259277344},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4556690454483032},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.44954365491867065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3952121436595917},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2919427454471588},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28864508867263794}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ojcoms.2023.3313352","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2023.3313352","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/10008219/10243611.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:publications.polymtl.ca:56517","is_oa":true,"landing_page_url":null,"pdf_url":"https://publications.polymtl.ca/56517/1/2023_Moudoud_Empowering_Security_Trust_5G_Beyond.pdf","source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:ec16b7479af94cd28edc50299646fb02","is_oa":true,"landing_page_url":"https://doaj.org/article/ec16b7479af94cd28edc50299646fb02","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 4, Pp 2410-2420 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2023.3313352","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2023.3313352","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/10008219/10243611.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386552795.pdf","grobid_xml":"https://content.openalex.org/works/W4386552795.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2580448189","https://openalex.org/W2762776925","https://openalex.org/W2911505293","https://openalex.org/W2997698549","https://openalex.org/W3027095011","https://openalex.org/W3040389479","https://openalex.org/W3047861058","https://openalex.org/W3086114958","https://openalex.org/W3092232275","https://openalex.org/W3097179687","https://openalex.org/W3109376429","https://openalex.org/W3118181167","https://openalex.org/W3119160111","https://openalex.org/W3123908207","https://openalex.org/W3130982961","https://openalex.org/W3154108917","https://openalex.org/W3203072121","https://openalex.org/W3217115371","https://openalex.org/W4285058242","https://openalex.org/W4293198140","https://openalex.org/W4293868502","https://openalex.org/W4293902547","https://openalex.org/W4295832444","https://openalex.org/W4316660683","https://openalex.org/W6804969647"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W4245926026","https://openalex.org/W2586548817","https://openalex.org/W4362501864","https://openalex.org/W2625093826","https://openalex.org/W4306904969","https://openalex.org/W4380318855","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W2138720691"],"abstract_inverted_index":{"Recent":[0],"advances":[1,25],"in":[2,115,208],"5G":[3,104,120,210],"and":[4,20,72,98,105,129,141,153,189,211,238,251],"beyond":[5,106,212],"have":[6],"further":[7],"expanded":[8],"the":[9,44,67,87,155,203,209,233,245,281,293,297],"potential":[10],"of":[11,17,46,63,69,89,179,205,235],"IoT":[12,100,116,136,169,206],"applications,":[13],"bringing":[14],"unprecedented":[15],"levels":[16],"connectivity,":[18],"speed,":[19],"low":[21],"latency.":[22],"However,":[23,108],"these":[24,41],"come":[26],"with":[27,248],"significant":[28,123,166],"security":[29,91,204],"threats":[30],"that":[31,65,93,220,231,265,288],"can":[32,85,94,185],"cause":[33,186],"widespread":[34],"damage.":[35],"An":[36],"effective":[37,77],"approach":[38,200,225,291],"to":[39,75,96,103,119,126,150,157,201,243,268],"addressing":[40],"issues":[42],"involves":[43,226],"integration":[45],"cutting-edge":[47],"technologies":[48],"like":[49],"machine":[50],"learning":[51,56,71,74],"(ML),":[52],"particularly":[53],"deep":[54,70],"reinforcement":[55,73],"(DRL).":[57],"DRL":[58,84,162,183,222],"is":[59,138],"a":[60,165,198,227,256,262],"specialized":[61],"area":[62],"ML":[64],"integrates":[66],"concepts":[68],"create":[76],"solutions":[78,295],"for":[79,168],"various":[80],"tasks.":[81],"In":[82,193],"particular,":[83],"facilitate":[86],"creation":[88],"intelligent":[90],"systems":[92],"adapt":[95],"dynamic":[97],"intricate":[99],"applications":[101,117,207],"connected":[102,118,236],"networks.":[107],"effectively":[109],"implementing":[110],"DRL-based":[111],"intrusion":[112,217,277],"detection":[113,218,278],"frameworks":[114],"networks":[121],"poses":[122],"challenges":[124,246],"due":[125],"bandwidth":[127,249,257,267],"utilization":[128,250],"device":[130,252],"behavior.":[131,160],"The":[132,284],"data":[133,180],"generated":[134],"by":[135,172,182,214],"devices":[137,170,237],"often":[139],"limited,":[140],"malicious":[142],"behavior":[143,234],"may":[144],"be":[145],"infrequent,":[146],"making":[147],"it":[148],"difficult":[149],"accurately":[151],"identify":[152],"train":[154],"algorithm":[156,230],"detect":[158],"such":[159],"Moreover,":[161],"algorithms":[163,184],"pose":[164],"challenge":[167],"constrained":[171],"limited":[173],"bandwidth,":[174],"as":[175],"communicating":[176],"large":[177],"amounts":[178],"required":[181],"network":[187],"congestion":[188],"delay":[190],"critical":[191],"communications.":[192],"this":[194],"article,":[195],"we":[196,254,273],"introduce":[197,255],"novel":[199],"improving":[202],"era":[213],"developing":[215],"an":[216],"system":[219,279],"employs":[221],"algorithms.":[223],"Our":[224],"distributed":[228],"Q-learning":[229],"observes":[232],"predicts":[239],"anomalous":[240],"actions.":[241],"Additionally,":[242],"overcome":[244],"associated":[247],"behavior,":[253],"allocation":[258],"problem":[259],"based":[260],"on":[261,280,296],"reputation":[263],"mechanism":[264],"allocates":[266],"only":[269],"trustworthy":[270],"devices.":[271],"Finally,":[272],"evaluate":[274],"our":[275,289],"proposed":[276,290],"selected":[282,298],"indicators.":[283,299],"numerical":[285],"results":[286],"demonstrate":[287],"outperforms":[292],"referenced":[294]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
