This book comprehensively discusses the development, application and challenges of network slicing technology in wireless communications. Starting with the basic concept and …
This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that …
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the …
This book focuses on the propagation characterization and channel modeling of Unmanned Aerial Vehicle (UAV) communications. Currently, there are no books that cover this specific …
This book delves deep into the world of low-power Internet of Things (IoT) node positioning, in an era where IoT is revolutionizing connectivity and communication. It focuses on …
As the main trend and key enabling technology for next-generation wireless networks (i.e., 6G), integrated sensing and communication (ISAC) can effectively improve spectrum …
This book thoroughly examines the design of full-duplex medium access control (MAC) protocols in wireless networks. It is organized into three main sections: (a) Fundamentals and …