Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches.
Yijie LuoYang YangSixuan AnZhibin FengPublished in: MLICOM (2020)
Keyphrases
- machine learning approaches
- game theoretic perspective
- machine learning methods
- machine learning algorithms
- group communication
- machine learning
- machine learning models
- data mining methods
- pose estimation
- key management
- authentication scheme
- lightweight
- communication systems
- image registration
- databases
- access control
- security issues
- security analysis
- key distribution
- preprocessing
- neural network