{"id":"https://openalex.org/W4412567061","doi":"https://doi.org/10.1109/ojcoms.2025.3591535","title":"A Trust-By-Learning Framework for Secure 6G Wireless Networks Under Native Generative AI Attacks","display_name":"A Trust-By-Learning Framework for Secure 6G Wireless Networks Under Native Generative AI Attacks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412567061","doi":"https://doi.org/10.1109/ojcoms.2025.3591535"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2025.3591535","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3591535","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2025.3591535","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058796764","display_name":"Md. Shirajum Munir","orcid":"https://orcid.org/0000-0002-7255-1085"},"institutions":[{"id":"https://openalex.org/I5950314","display_name":"University of West Georgia","ror":"https://ror.org/01cqxk816","country_code":"US","type":"education","lineage":["https://openalex.org/I5950314"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Shirajum Munir","raw_affiliation_strings":["School of Computing, Analytics, and Modeling, University of West Georgia, Carrollton, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Analytics, and Modeling, University of West Georgia, Carrollton, GA, USA","institution_ids":["https://openalex.org/I5950314"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094134501","display_name":"Sravanthi Proddatoori","orcid":null},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sravanthi Proddatoori","raw_affiliation_strings":["Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094134502","display_name":"Manjushree Muralidhara","orcid":null},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manjushree Muralidhara","raw_affiliation_strings":["Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062220824","display_name":"Trinidad Mario Dena","orcid":null},"institutions":[{"id":"https://openalex.org/I5950314","display_name":"University of West Georgia","ror":"https://ror.org/01cqxk816","country_code":"US","type":"education","lineage":["https://openalex.org/I5950314"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trinidad Mario Dena","raw_affiliation_strings":["School of Computing, Analytics, and Modeling, University of West Georgia, Carrollton, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Analytics, and Modeling, University of West Georgia, Carrollton, GA, USA","institution_ids":["https://openalex.org/I5950314"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024108653","display_name":"Walid Saad","orcid":"https://orcid.org/0000-0003-2247-2458"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Walid Saad","raw_affiliation_strings":["Electrical and Computer Engineering, Virginia Tech, Arlington, VA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Virginia Tech, Arlington, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063667378","display_name":"Zhu Han","orcid":"https://orcid.org/0000-0002-6606-5822"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhu Han","raw_affiliation_strings":["Electrical and Computer Engineering, University of Houston, Houston, TX, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052787847","display_name":"Sachin Shetty","orcid":"https://orcid.org/0000-0002-8789-0610"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sachin Shetty","raw_affiliation_strings":["Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure and Intelligent Critical Systems, Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5058796764"],"corresponding_institution_ids":["https://openalex.org/I5950314"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21037356,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"6045","last_page":"6065"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6289348006248474},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5754489302635193},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4103524088859558},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37027567625045776}],"concepts":[{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6289348006248474},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5754489302635193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4103524088859558},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37027567625045776}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ojcoms.2025.3591535","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3591535","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.odu.edu:csics_pubs-1000","is_oa":true,"landing_page_url":"https://digitalcommons.odu.edu/csics_pubs/1","pdf_url":null,"source":{"id":"https://openalex.org/S4377196314","display_name":"ODU Digital Commons (Old Dominion University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I81365321","host_organization_name":"Old Dominion University","host_organization_lineage":["https://openalex.org/I81365321"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Center for Secure and Intelligent Critical Systems (CSICS) Publications","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:3f28ed43203e4b8c840cd44f21f79f6e","is_oa":true,"landing_page_url":"https://doaj.org/article/3f28ed43203e4b8c840cd44f21f79f6e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 6, Pp 6045-6065 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2025.3591535","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3591535","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W317957491","https://openalex.org/W1982821497","https://openalex.org/W2041004593","https://openalex.org/W2084924291","https://openalex.org/W2969519626","https://openalex.org/W3007087231","https://openalex.org/W3009388141","https://openalex.org/W3017194848","https://openalex.org/W3046449146","https://openalex.org/W3144404977","https://openalex.org/W3161594686","https://openalex.org/W3187564029","https://openalex.org/W4299581060","https://openalex.org/W4301347335","https://openalex.org/W4382618630","https://openalex.org/W4385695892","https://openalex.org/W4387245356","https://openalex.org/W4391305431","https://openalex.org/W4391428204","https://openalex.org/W4391547794","https://openalex.org/W4392026544","https://openalex.org/W4392523536","https://openalex.org/W4392796562","https://openalex.org/W4392847142","https://openalex.org/W4399525892","https://openalex.org/W4401509292","https://openalex.org/W4402156521","https://openalex.org/W4408100192","https://openalex.org/W4408520711","https://openalex.org/W4410030527","https://openalex.org/W4410341203","https://openalex.org/W4411949529","https://openalex.org/W6631190155","https://openalex.org/W6856054706"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2380075625","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Sixth-generation":[0],"(6G)":[1],"wireless":[2,68,91,126,165],"networks":[3],"will":[4],"become":[5],"vulnerable":[6],"due":[7],"to":[8,62,100,129,179,190,239],"native":[9,44,60,155,222],"generative":[10,227],"AI":[11],"(GenAI)-driven":[12],"intelligent":[13,102,161,210,274,307],"poisoning":[14,65,103,162,241,253,308],"attacks":[15,66,80,163,189,211,254,309],"in":[16,31,67,89,125,164,251,301,305],"both":[17],"the":[18,22,43,57,90,131,134,181,192,209,246,295,303],"radio":[19],"unit":[20],"and":[21,29,38,51,118,168,197,234,259,264,285,290,313,319],"core":[23],"network.":[24,92],"In":[25],"particular,":[26],"network":[27,229,311],"parameters":[28,312],"metrics":[30,167,314],"cross-layer":[32],"design":[33],"pose":[34],"fundamentally":[35],"uncertain":[36],"conditions":[37],"can":[39,159,207],"be":[40],"compromised":[41],"through":[42,74,121],"GenAI":[45,61,156,223],"mechanism,":[46],"which":[47],"leverages":[48],"data":[49],"augmentation":[50],"reconstruction":[52],"capabilities.":[53],"This":[54],"work":[55],"investigates":[56],"capabilities":[58,255],"of":[59,114,133,150,184,187,256,282],"create":[63],"novel":[64,138],"networks,":[69],"while":[70],"investigating":[71],"their":[72,106],"impact":[73],"uncertainty-informed":[75],"root":[76,107,182,317],"analysis.":[77],"Then,":[78],"detected":[79],"are":[81],"mitigated":[82],"by":[83,109,212,277,315],"developing":[84],"a":[85,94,111,137,154,171,199,279],"trustworthy":[86,122,214],"service":[87,123,215],"aggregation":[88,124],"First,":[93],"joint":[95],"decision":[96],"problem":[97],"is":[98,142,177],"formulated":[99,135],"generate":[101],"attacks,":[104],"understand":[105,180],"cause":[108,183],"defining":[110],"new":[112],"measure":[113],"uncertainty":[115,186],"as":[116,226],"plausibility,":[117],"mitigate":[119,208],"them":[120],"networks.":[127],"Second,":[128],"address":[130],"challenges":[132],"problem,":[136],"Trust-By-Learning":[139],"(TBL)":[140],"framework":[141,147,205,271,298],"developed.":[143],"The":[144,268],"proposed":[145,269,296],"TBL":[146,270,297],"primarily":[148],"consists":[149],"three":[151],"components:":[152],"1)":[153],"mechanism":[157,175],"that":[158,176,206,221,245],"penetrate":[160],"networks\u2019":[166],"parameters;":[169],"2)":[170],"Dempster-Shafer-based":[172],"evidence":[173],"theoretic":[174],"developed":[178],"inherently":[185],"those":[188],"quantify":[191],"trust":[193,280,304],"for":[194,261,287],"further":[195],"mitigation;":[196],"3)":[198],"meta-reinforcement-based":[200],"Markov":[201],"Decision":[202],"Process":[203],"learning":[204],"enforcing":[213],"aggregation.":[216],"Extensive":[217],"experimental":[218],"analysis":[219],"demonstrates":[220],"methods,":[224],"such":[225],"adversarial":[228],"(GAN),":[230],"variational":[231],"autoencoder":[232,235,247],"(VAE),":[233],"have":[236],"significant":[237],"capability":[238],"enforce":[240],"attacks.":[242],"Results":[243],"show":[244],"performs":[248],"significantly":[249],"better":[250],"generating":[252],"98.2%,":[257],"97.4%,":[258],"95%":[260],"Amazon,":[262,288],"Netflix,":[263],"Download":[265],"services,":[266,292],"respectively.":[267,293],"effectively":[272],"replicates":[273],"attack":[275],"dependencies":[276],"achieving":[278],"score":[281],"0.972,":[283],"0.922,":[284],"0.892":[286],"Download,":[289],"Netflix":[291],"Finally,":[294],"shows":[299],"efficacy":[300],"understanding":[302],"GenAI-driven":[306],"on":[310],"quantifying":[316],"causes":[318],"mitigating":[320],"rates.":[321]},"counts_by_year":[],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
