
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G
Xiaozhen Lu, Liang Xiao, Pengmin Li, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 425-466
Closed Access | Times Cited: 50
Xiaozhen Lu, Liang Xiao, Pengmin Li, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 425-466
Closed Access | Times Cited: 50
Showing 1-25 of 50 citing articles:
Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead
Pingyue Yue, Jianping An, Jiankang Zhang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1604-1652
Open Access | Times Cited: 56
Pingyue Yue, Jianping An, Jiankang Zhang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1604-1652
Open Access | Times Cited: 56
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities
Shunliang Zhang, Dali Zhu, Yinlong Liu
Computer Networks (2024) Vol. 242, pp. 110255-110255
Closed Access | Times Cited: 17
Shunliang Zhang, Dali Zhu, Yinlong Liu
Computer Networks (2024) Vol. 242, pp. 110255-110255
Closed Access | Times Cited: 17
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 22
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 22
Rethinking Membership Inference Attacks Against Transfer Learning
Cong Wu, Jing Chen, Qianru Fang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6441-6454
Closed Access | Times Cited: 14
Cong Wu, Jing Chen, Qianru Fang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6441-6454
Closed Access | Times Cited: 14
Terahertz Meets AI: The State of the Art
Arshad Farhad, Jae-Young Pyun
Sensors (2023) Vol. 23, Iss. 11, pp. 5034-5034
Open Access | Times Cited: 21
Arshad Farhad, Jae-Young Pyun
Sensors (2023) Vol. 23, Iss. 11, pp. 5034-5034
Open Access | Times Cited: 21
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications
Thomas Hickling, Abdelhafid Zenati, Nabil Aouf, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-35
Open Access | Times Cited: 19
Thomas Hickling, Abdelhafid Zenati, Nabil Aouf, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-35
Open Access | Times Cited: 19
A Survey on Satellite Communication System Security
Minjae Kang, Sungbin Park, Yeonjoon Lee
Sensors (2024) Vol. 24, Iss. 9, pp. 2897-2897
Open Access | Times Cited: 7
Minjae Kang, Sungbin Park, Yeonjoon Lee
Sensors (2024) Vol. 24, Iss. 9, pp. 2897-2897
Open Access | Times Cited: 7
Data Privacy and Security in Autonomous Connected Vehicles in Smart City Environment
Tanweer Alam
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 95-95
Open Access | Times Cited: 7
Tanweer Alam
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 95-95
Open Access | Times Cited: 7
SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning
Yuanjun Xia, Yining Liu, Shi Dong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18351-18365
Closed Access | Times Cited: 6
Yuanjun Xia, Yining Liu, Shi Dong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18351-18365
Closed Access | Times Cited: 6
User data privacy protection model based on federated reinforcement learning optimization method
Yuxuan Weng
Journal of Cyber Security Technology (2025), pp. 1-22
Closed Access
Yuxuan Weng
Journal of Cyber Security Technology (2025), pp. 1-22
Closed Access
Physical layer security techniques for grant-free massive Machine-Type Communications in 5G and beyond: A survey, challenges, and future directions
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh, et al.
Computer Networks (2025), pp. 111268-111268
Closed Access
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh, et al.
Computer Networks (2025), pp. 111268-111268
Closed Access
A Survey on Physical Layer Security for 5G/6G Communications over Different Fading Channels: Approaches, Challenges, and Future Directions
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Comprehensive analysis on 5G and 6G wireless network security and privacy
K. Rajesh, P. Vetrivelan
Telecommunication Systems (2025) Vol. 88, Iss. 2
Closed Access
K. Rajesh, P. Vetrivelan
Telecommunication Systems (2025) Vol. 88, Iss. 2
Closed Access
Covert and Secure Communications in NOMA Networks With Internal Eavesdropping
Qiang Li, Dongyang Xu, Keivan Navaie, et al.
IEEE Wireless Communications Letters (2023) Vol. 12, Iss. 12, pp. 2178-2182
Open Access | Times Cited: 9
Qiang Li, Dongyang Xu, Keivan Navaie, et al.
IEEE Wireless Communications Letters (2023) Vol. 12, Iss. 12, pp. 2178-2182
Open Access | Times Cited: 9
NOMA Aided Secure Transmission for IRS-ISAC
Dongdong Li, Zhutian Yang, Nan Zhao, et al.
IEEE Transactions on Wireless Communications (2024) Vol. 23, Iss. 9, pp. 10911-10925
Closed Access | Times Cited: 3
Dongdong Li, Zhutian Yang, Nan Zhao, et al.
IEEE Transactions on Wireless Communications (2024) Vol. 23, Iss. 9, pp. 10911-10925
Closed Access | Times Cited: 3
From 5G to 6G Networks, a Survey on AI-Based Jamming and Interference Detection and Mitigation
Poonam Lohan, Burak Kantarcı, Mohamed Amine Ferrag, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3920-3974
Open Access | Times Cited: 3
Poonam Lohan, Burak Kantarcı, Mohamed Amine Ferrag, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3920-3974
Open Access | Times Cited: 3
A New Virtual Network Topology-Based Digital Twin for Spatial-Temporal Load-Balanced User Association in 6G HetNets
Pengyi Jia, Xianbin Wang
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 10, pp. 3080-3094
Closed Access | Times Cited: 8
Pengyi Jia, Xianbin Wang
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 10, pp. 3080-3094
Closed Access | Times Cited: 8
Seamless Connectivity: The Power of Integrating Power Line and Wireless Communications
Moisés V. Ribeiro, Mateus de L. Filomeno, Ândrei Camponogara, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 1-40
Closed Access | Times Cited: 6
Moisés V. Ribeiro, Mateus de L. Filomeno, Ândrei Camponogara, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 1-40
Closed Access | Times Cited: 6
Channel Prediction-Based Security Authentication for Artificial Intelligence of Things
Xiaoying Qiu, Jinwei Yu, Wen-Ying Zhuang, et al.
Sensors (2023) Vol. 23, Iss. 15, pp. 6711-6711
Open Access | Times Cited: 5
Xiaoying Qiu, Jinwei Yu, Wen-Ying Zhuang, et al.
Sensors (2023) Vol. 23, Iss. 15, pp. 6711-6711
Open Access | Times Cited: 5
An Architecture for AoI and Cache Hybrid Multicast/Unicast/D2D With Cell-Free Massive MIMO Systems
Meng Zhou, Jinwen Li, Jiantao Yuan, et al.
IEEE Access (2023) Vol. 11, pp. 43080-43088
Open Access | Times Cited: 4
Meng Zhou, Jinwen Li, Jiantao Yuan, et al.
IEEE Access (2023) Vol. 11, pp. 43080-43088
Open Access | Times Cited: 4
Adversarial Machine Learning for Image-Based Radio Frequency Fingerprinting: Attacks and Defenses
Lorenzo Papangelo, Maurizio Pistilli, Savio Sciancalepore, et al.
IEEE Communications Magazine (2024) Vol. 62, Iss. 11, pp. 108-113
Closed Access | Times Cited: 1
Lorenzo Papangelo, Maurizio Pistilli, Savio Sciancalepore, et al.
IEEE Communications Magazine (2024) Vol. 62, Iss. 11, pp. 108-113
Closed Access | Times Cited: 1
Dynamic Jamming Power Allocation With Incomplete Sensing Information: Improving by GAN and Opponent Modeling
Xiang Peng, Hua Xu, Zisen Qi, et al.
IEEE Communications Letters (2024) Vol. 28, Iss. 5, pp. 1077-1081
Closed Access | Times Cited: 1
Xiang Peng, Hua Xu, Zisen Qi, et al.
IEEE Communications Letters (2024) Vol. 28, Iss. 5, pp. 1077-1081
Closed Access | Times Cited: 1
A DWT based PHY Key Generation Scheme for the Cross-layer Security in IoT Networks
Fangfang Liu, Yueyi Liu, Wei An, et al.
IEEE Communications Letters (2024) Vol. 28, Iss. 6, pp. 1258-1262
Closed Access | Times Cited: 1
Fangfang Liu, Yueyi Liu, Wei An, et al.
IEEE Communications Letters (2024) Vol. 28, Iss. 6, pp. 1258-1262
Closed Access | Times Cited: 1
Against Jamming Attack in Wireless Communication Networks: A Reinforcement Learning Approach
Ma Ding, Yang Wang, Sai Wu
Electronics (2024) Vol. 13, Iss. 7, pp. 1209-1209
Open Access | Times Cited: 1
Ma Ding, Yang Wang, Sai Wu
Electronics (2024) Vol. 13, Iss. 7, pp. 1209-1209
Open Access | Times Cited: 1
Hybrid intelligent reflective surfaces and relay assisted secure transmission scheme with power allocation
Yan Shi, Dongqing Zhao, Yue Wu
ETRI Journal (2024)
Open Access | Times Cited: 1
Yan Shi, Dongqing Zhao, Yue Wu
ETRI Journal (2024)
Open Access | Times Cited: 1