Security and Communication Networks

Security Threats to Artificial Intelligence-Driven Wireless Communication Systems


Publishing date
01 Sep 2020
Status
Closed
Submission deadline
08 May 2020

Lead Editor

1Tianjin University, Tianjin, China

2Nanjing University of Information Science and Technology, Nanjing, China

3University of Surrey, Guildford, UK

4Michigan State University, Michigan, USA

5University of Liverpool, Liverpool, UK

This issue is now closed for submissions.

Security Threats to Artificial Intelligence-Driven Wireless Communication Systems

This issue is now closed for submissions.

Description

Due to the openness of wireless channels, wireless communication systems are extremely vulnerable to attacks, counterfeiting and eavesdropping. With the widespread adoption of artificial intelligence (AI) technologies in fifth generation (5G) and beyond fifth generation (B5G) networks, AI-based attacks have emerged as new threats to wireless communication systems. Deep learning-based end-to-end communication systems are extremely susceptible to physical adversarial attacks which can cause a serious reduction in the accuracy of signal classification or radio modulation recognition. Intelligent threats can utilize AI to attack future networks, related services and applications that use deep learning algorithms where small disturbances can be easily designed and generated by attackers. However, researchers still need to consider how best to protect 5G and B5G networks from AI-related attacks. Furthermore, defense strategies of adversarial attacks for future communication systems are still underdeveloped and inefficient.

This Special Issue welcomes novel theoretical contributions, practical research and review articles that analyze the security threats, challenges, and mechanisms inherent in AI-driven wireless communication systems. Research that highlights potential defense approaches and strategies to combat intelligent attacks on such systems are particularly encouraged.

Potential topics include but are not limited to the following:

  • Architectures, simulators, scenarios, and applications tuned to security and privacy issues for AI-driven wireless communication systems
  • Adversarial attacks on AI-based signal classification or radio modulation recognition
  • White-box or black-box-based attacks on signal/modulation classifiers
  • Effective attacks detection and prediction based on deep learning techniques, e.g. autoencoder (AE), deep neural network (DNN), generative adversarial network (GAN) and deep reinforcement learning (DRL)
  • Defense mechanisms and theories of adversarial attacks against end-to-end communication systems
  • Adversarial modelling or adversarial deep learning for future wireless networks
  • Security threats to 5G and B5G-based applications, services and IoT devices
  • Defense strategies and solutions for AI-related attacks on wireless communication systems
  • Robust algorithms to protect against AI-related attacks on wireless communication systems

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 8872140
  • - Research Article

Hardware Sharing for Channel Interleavers in 5G NR Standard

Xiaokang Xiong | Yuhang Dai | ... | Dake Liu
  • Special Issue
  • - Volume 2020
  • - Article ID 8876317
  • - Research Article

A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA

Jinhua Fu | Sihai Qiao | ... | Chao Yuan
  • Special Issue
  • - Volume 2020
  • - Article ID 8824163
  • - Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Zhiyong Wang | Shengwei Xu | ... | Dawei Sun
  • Special Issue
  • - Volume 2020
  • - Article ID 8890306
  • - Research Article

DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System

Pengfei Sun | Pengju Liu | ... | Jinpeng Chen
  • Special Issue
  • - Volume 2020
  • - Article ID 8872923
  • - Review Article

Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey

Yirui Wu | Dabao Wei | Jun Feng
  • Special Issue
  • - Volume 2020
  • - Article ID 3932584
  • - Research Article

The Defense of Adversarial Example with Conditional Generative Adversarial Networks

Fangchao Yu | Li Wang | ... | Youwen Zhang
  • Special Issue
  • - Volume 2020
  • - Article ID 8876056
  • - Research Article

Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model

Wangli Hao | Ruixian Zhang | ... | Wuping Zhang
  • Special Issue
  • - Volume 2020
  • - Article ID 2132138
  • - Research Article

Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques

Huaijun Wang | Jing Zhao | ... | Shancang Li
  • Special Issue
  • - Volume 2020
  • - Article ID 6371814
  • - Research Article

Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots

Yong-tao Liu | Rui-zhi Sun | ... | Guo-qing Shi
  • Special Issue
  • - Volume 2020
  • - Article ID 5218612
  • - Research Article

Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow

Bo Liu | Qilin Wu | ... | Qian Cao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.