>>REN Kuiis a professor and the Dean of School of Cybe"/>
999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Editorial: Special Topic on Wireless Communication and Its Security:Challenges and Solutions

2022-02-07 06:04:44
ZTE Communications 2022年4期

Guest Editors >>>

REN Kuiis a professor and the Dean of School of Cyber Science and Technology at Zhejiang University (ZJU),China,where he also directs the Institute of Cyber Science and Technology.Before that,he was SUNY Empire Innovation Professor at State University of New York at Buffalo,USA.He received his PhD degree in electrical and computer engineering from Worcester Polytechnic Institute,USA.Prof.REN’s current research interests include data security,IoT security,AI security,and privacy.He received many recognitions including Guohua Distinguished Scholar Award of ZJU,IEEE CISTC Technical Recognition Award,SUNY Chancellor’s Research Excellence Award,Sigma Xi Research Excellence Award,NSF CAREER Award,etc.Prof.REN has published papers extensively in peer-reviewed journals and conferences and received the Test-of-Time Paper Award from IEEE INFOCOM and many Best Paper Awards,including ACM MobiSys,IEEE ICDCS,IEEE ICNP,IEEE Globecom,ACM/IEEE IWQoS,etc.His h-index is 87,with a total citation exceeding 41 000 according to Google Scholar.Prof.REN is a Fellow of ACM and IEEE.He is a frequent reviewer for funding agencies internationally and serves on the editorial boards of many IEEE and ACM journals.Among others,he currently serves as Chair of SIGSAC of ACM China Council,a member of ACM ASIACCS steering committee,and a member of S&T Committee of Ministry of Education of China.

WANG Zhibois a professor of the School of Cyber Science and Technology at Zhejiang University,China.He received his BE degree in automation from Zhejiang University in 2007,and his PhD degree from the Department of Electrical Engineering and Computer Science from University of Tennessee,Knoxville,USA in 2014.His research interests include Internet of Things,AI security,edge intelligence and security.He has published more than 100 papers in top-tier journals and conferences,such asToN,JSAC,CCS,Mobicom,S&P,INFOCOM,ICCV and CVPR.He serves as an editor ofIEEE Transactions on Cloud Computing,and the TPC member of many flagship conferences including INFOCOM,WWW,ICDCS,AAAI,KDD and IWQoS.He is the recipient of the National Science Foundation for Excellent Young Scholars,the best student paper award of FUSION 2019,and the outstanding paper award of IEEE HPCC 2019.He is a senior member of IEEE and CCF and a member of ACM.

Recent years have witnessed the phenomenal growth of wireless technologies and applications on a massively large scale since the fifth generation (5G) wireless technologies were proposed as a key propellent to meet the increasing demands of future networks.Going further,the sixth generation (6G) wireless technologies have already been under preparation.However,wireless communication technologies are faced with new opportunities as well as challenges.

On the one hand,emerging technologies provide fundamental issues including higher system capacity,higher data rate,lower latency,higher security,and improved quality of service(QoS),which enables the application of wireless communication technologies in the Internet of Things (IoT) scenarios such as industry,automobile,drone,port,and subway.On the other hand,these new technologies will also introduce new vulnerabilities,which lead to new threats to the security of wireless communication systems.Concerns about security have triggered research in this domain to build up a highly effective safeguard.

The goal of this special issue is to stimulate discussions around open problems of security issues in wireless communication.Focusing on wireless communication and its security,this special issue receives both theoretical and applicationbased contributions which demonstrate both the challenges and solutions with the rapid development of wireless technologies and applications.

The call-for-papers of this special issue have brought excellent submissions in both quality and quantity.After two-round reviews,five excellent papers have been selected for publication in this special issue which is organized as follows.We assembled five papers with a balanced selection between theoretical research and practical engineering: three of them carry out comprehensive surveys and the other two propose novel mechanisms.The topics addressed in this special issue cover a broad range,including security in edge blockchains,data collection with local differential privacy (LDP) for mobile devices,security technologies in 6G,federated learning (FL) for secure 6G,and physical layer security for mmWave communication.The detailed information is as follows.

The first paper titled “Security in Edge Blockchains: Attacks and Countermeasures” is the first survey that discusses the attacks and countermeasures of edge blockchains.In this paper,the authors summarize the three-layer architecture of edge blockchains (i.e.blockchain management,blockchain consensus,and blockchain lightweight client) and point out the inherent vulnerabilities of edge blockchains.On this basis,they also summarize the security issues caused by the deployment of vulnerable edge blockchain devices and networks.To be specific,seven specific attacks on edge blockchain components and the corresponding countermeasures are concretely demonstrated in detail.At last,the authors discuss the future directions for researchers to design and implement secure edge blockchains.

Titled “Utility-Improved Key-Value Data Collection with Local Differential Privacy for Mobile Devices”,the second paper proposes a utility-improved data collection framework with LDP to deal with key-value data generated by mobile devices.This paper focuses on the problem of limited utility caused by excessive privacy protections and achieves personalized privacy protection by dividing the key-value data into sensitive and non-sensitive parts.The authors validate the mechanism based on two real datasets and prove in experiments that the proposed mechanism can provide better utility and simultaneously protect privacy.

The third paper titled “Key Intrinsic Security Technologies in 6G Networks” provides a general overview of 6G intrinsic security in the industry.In this paper,the authors not only review key security technologies in 5G and security technology enhancement in 5G-Advanced evolution but also analyze the vision and requirements of 6G intrinsic security.Although the technical systems and standards of 6G intrinsic security have not yet reached a unified understanding in the industry,this paper still pays close attention to the disruptive impact that intrinsic 6G security may bring and preliminarily focuses on the key technologies of 6G intrinsic security,including the massive equipment connection security technology,physical layer security technology,and blockchain technology.

Aiming to solve the problem that limited energy restricts the popularization of UAV-enabled FL applications,the fourth paper titled “Air-Ground Integrated Low-energy Federated Learning for Secure 6G Communications” proposes an airground integrated low-energy federated learning framework.In this paper,the authors optimize the deployment of unmanned aerial vehicles (UAVs) with a deep Q-network approach to minimize the overall energy consumption of the application communication.This paper shows in the experiment that the proposed method can reduce energy consumption while maintaining the quality of the FL model.

The fifth paper titled “Physical Layer Security for MmWave Communications: Challenges and Solutions” presents a comprehensive overview of physical layer security (PLS) issues in mmWave Communication.In this paper,the theoretical foundation of PLS and the most typical PLS techniques are briefly introduced together with the typical PLS performance metrics secrecy rate,and outrage probability.Several schemes based on these techniques are discussed in detail to compare their advantages and constraints in the mmWave environment and to point out the future direction for researchers.

As demonstrated above,we have briefly introduced the main content of this special issue and given a general overview of the five papers collected in the issue.We would like to express our sincere gratitude to all the authors for their valuable contributions.In the meanwhile,we also want to show our appreciation to all the reviewers for their timely and insightful comments on the submissions.This special issue would not be possible without their help and collaboration.We hope that this special issue can serve as an informative and significant collection to lay a solid foundation for future research works about wireless communication and its security.

主站蜘蛛池模板: 亚洲av综合网| 性欧美久久| 99久久精品免费看国产免费软件| 五月婷婷丁香综合| 亚洲婷婷六月| 欧美日韩激情| www精品久久| 国产免费久久精品99re不卡| 中文字幕亚洲专区第19页| 久久黄色影院| 亚洲一级毛片在线播放| 久久精品欧美一区二区| 精品少妇人妻一区二区| 亚洲最新地址| 高清不卡一区二区三区香蕉| 国产波多野结衣中文在线播放| 欧美精品成人| 少妇精品久久久一区二区三区| 午夜日本永久乱码免费播放片| 福利在线不卡| 国产免费a级片| 高清久久精品亚洲日韩Av| 午夜福利在线观看成人| 国产在线精品香蕉麻豆| 高h视频在线| 久久国产精品影院| 91国内外精品自在线播放| 成年午夜精品久久精品| 欧美啪啪网| 亚洲天堂成人在线观看| 国产av无码日韩av无码网站| 伊人色天堂| 亚洲品质国产精品无码| 好吊色妇女免费视频免费| 亚洲精品无码久久毛片波多野吉| 国产成人精品综合| 四虎精品国产AV二区| 国产精品一区不卡| 久久99热66这里只有精品一| 综合色在线| 精品欧美一区二区三区久久久| 丝袜亚洲综合| 国产精品自在在线午夜| 亚洲狠狠婷婷综合久久久久| 欧美人人干| 國產尤物AV尤物在線觀看| 精品無碼一區在線觀看 | 无码精品福利一区二区三区| 婷婷色在线视频| 久久久久久午夜精品| 亚洲av无码专区久久蜜芽| 18禁色诱爆乳网站| 国产精品v欧美| 手机在线国产精品| 老司机午夜精品网站在线观看 | 一区二区影院| 二级特黄绝大片免费视频大片| 呦女亚洲一区精品| 久久这里只有精品免费| 国产色婷婷| 亚洲精品无码av中文字幕| 国产成人免费视频精品一区二区| 亚洲综合色在线| a色毛片免费视频| 欧美亚洲中文精品三区| 国产成人亚洲精品无码电影| 夜精品a一区二区三区| 国产第三区| 亚洲成人黄色在线观看| 中文字幕有乳无码| 欧美人在线一区二区三区| 国产欧美一区二区三区视频在线观看| 亚洲成a∧人片在线观看无码| 国产极品嫩模在线观看91| 婷婷亚洲视频| 黄色a一级视频| 伊人成人在线视频| 国产成人亚洲综合A∨在线播放| 成年人免费国产视频| 人妻一本久道久久综合久久鬼色| 国产jizz| 毛片免费高清免费|