[1] |
WANG J , CAO C M , WANG J P ,et al. Optimal task allocation and coding design for secure edge computing with heterogeneous edge devices[J]. IEEE Transactions on Cloud Computing, 2022,10(4): 2817-2833.
|
[2] |
龙隆, 刘子辰, 陆在旺 ,等. 移动边缘网络下服务缓存与资源分配联合优化策略[J]. 通信学报, 2023,44(1): 64-74.
|
|
LONG L , LIU Z C , LU Z W ,et al. Joint optimization strategy of service cache and resource allocation in mobile edge network[J]. Journal on Communications, 2023,44(1): 64-74.
|
[3] |
MAO B M , LIU JJ , WU YY ,et al. Security and privacy on 6G network edge:a survey[J]. IEEE Communications Surveys&Tutorials, 2023,25(2): 1095-1127.
|
[4] |
余雪勇, 邱礼翔, 宋家宁 ,等. 无人机辅助边缘计算中安全通信与能效优化策略[J]. 通信学报, 2023,44(3): 45-54.
|
|
YU X Y , QIU L X , SONG J N ,et al. Security communication and energy efficiency optimization strategy in UAV-aided edge computing[J]. Journal on Communications, 2023,44(3): 45-54.
|
[5] |
CSISZAR I , KORNER J . Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978,24(3): 339-348.
|
[6] |
TUGNAIT J K . Self-contamination for detection of pilot contamination attack in multiple antenna systems[J]. IEEE Wireless Communications Letters, 2015,4(5): 525-528.
|
[7] |
ZHANG W L , LIN H , ZHANG R N . Detection of pilot contamination attack based on uncoordinated frequency shifts[J]. IEEE Transactions on Communications, 2018,66(6): 2658-2670.
|
[8] |
XU W Y , YUAN C , XU S B ,et al. On pilot spoofing attack in massive MIMO systems:detection and countermeasure[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 1396-1409.
|
[9] |
LIU X M , LI B , CHEN H B ,et al. Detecting pilot spoofing attack in MISO systems with trusted user[J]. IEEE Communications Letters, 2019,23(2): 314-317.
|
[10] |
WU Q Q , ZHANG R . Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming[J]. IEEE Transactions on Wireless Communications, 2019,18(11): 5394-5409.
|
[11] |
ELHOUSHY S , IBRAHIM M , HAMOUDA W . Exploiting RIS for limiting information leakage to active eavesdropper in cell-free massive MIMO[J]. IEEE Wireless Communications Letters, 2022,11(3): 443-447.
|
[12] |
AKBAR N , YAN S H , KHATTAK A M ,et al. On the pilot contamination attack in multi-cell multiuser massive MIMO networks[J]. IEEE Transactions on Communications, 2020,68(4): 2264-2276.
|
[13] |
XIONG Q , LIANG Y C , LI K H ,et al. An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems[J]. IEEE Transactions on Information Forensics and Security, 2015,10(5): 932-940.
|
[14] |
XU S B , XU W Y , PAN C H ,et al. Detection of jamming attack in non-coherent massive SIMO systems[J]. IEEE Transactions on Information Forensics and Security, 2019,14(9): 2387-2399.
|
[15] |
GAO N , QIN Z J , JING X J . Pilot contamination attack detection and defense strategy in wireless communications[J]. IEEE Signal Processing Letters, 2019,26(6): 938-942.
|
[16] |
AHMED A , ZIA M , HAQ I U ,et al. Detection of pilot contamination attack for frequency selective channels[J]. IEEE Access, 2020,8: 123966-123978.
|
[17] |
WANG N , LI W W , ALIPOUR-FANID A , ,et al. Pilot contamination attack detection for 5G mmWave grant-free IoT networks[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 658-670.
|
[18] |
XIONG Q , LIANG Y C , LI K H ,et al. Secure transmission against pilot spoofing attack:a two-way training-based scheme[J]. IEEE Transactions on Information Forensics and Security, 2016,11(5): 1017-1026.
|
[19] |
TYLAVSKY D J , SOHIE G R L . Generalization of the matrix inversion lemma[J]. Proceedings of the IEEE, 1986,74(7): 1050-1052.
|
[20] |
LIANG Y C , ZENG Y H , PEH E C Y ,et al. Sensing-throughput tradeoff for cognitive radio networks[J]. IEEE Transactions on Wireless Communications, 2008,7(4): 1326-1337.
|