http://10.10.120.238:8080/xmlui/handle/123456789/324
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thapar S. | en_US |
dc.contributor.author | Prasad G. | en_US |
dc.contributor.author | Mishra D. | en_US |
dc.contributor.author | Saini R. | en_US |
dc.date.accessioned | 2023-11-30T08:20:09Z | - |
dc.date.available | 2023-11-30T08:20:09Z | - |
dc.date.issued | 2022 | - |
dc.identifier.isbn | 978-1665454681 | - |
dc.identifier.issn | 1550-2252 | - |
dc.identifier.other | EID(2-s2.0-85147012200) | - |
dc.identifier.uri | https://dx.doi.org/10.1109/VTC2022-Fall57202.2022.10013076 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/324 | - |
dc.description.abstract | To develop a cyber-physical artificial intelligence enabled wireless network, it is essential to support unprecedented high throughput and efficient spectrum utilization in a practically unknown channel. In this regard, we need to investigate the design aspects of the network exploiting deep learning-based non-orthogonal multiple access (NOMA) for a model-free environment. In this work, a model-free deep learning algorithm based on deep deterministic policy gradient is proposed that provides a continuous course of actions under the optimal policy for an untrusted NOMA network. Utilizing the concept of physical layer security, we focus on maximizing the sum secrecy rate of the system in terms of decoding order and transmitting power allocation to users under the limited energy constraint at the base station. Via extensive simulations, while training, we measure the performance of the deep learning algorithm in terms of cumulative sum secrecy rate, convergence rate and stability. Also, after the training, we obtain various insights on the performance of the obtained optimal policy by varying the independent system parameters and compare the algorithm against a benchmark that provides the improvement of nearly 55% in the noisy channel. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Vehicular Technology Conference | en_US |
dc.title | Optimal AI-Enabled Secured NOMA Among Untrusted Users | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.