Picture for Eryk Dutkiewicz

Eryk Dutkiewicz

Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI

Add code
Apr 07, 2025
Viaarxiv icon

"Security for Everyone" in Finite Blocklength IRS-aided Systems With Perfect and Imperfect CSI

Add code
Apr 07, 2025
Viaarxiv icon

Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data

Add code
Jan 14, 2025
Viaarxiv icon

Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems

Add code
Mar 22, 2024
Viaarxiv icon

Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection

Add code
Mar 22, 2024
Viaarxiv icon

Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

Add code
Dec 12, 2023
Figure 1 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 2 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 3 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 4 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Viaarxiv icon

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Add code
Dec 05, 2023
Viaarxiv icon

Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning

Add code
Feb 27, 2023
Figure 1 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 2 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 3 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 4 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Viaarxiv icon

Toward BCI-enabled Metaverse: A Joint Radio and Computing Resource Allocation Approach

Add code
Dec 17, 2022
Viaarxiv icon

Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing

Add code
Nov 14, 2022
Figure 1 for Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing
Figure 2 for Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing
Figure 3 for Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing
Figure 4 for Optimal Privacy Preserving in Wireless Federated Learning System over Mobile Edge Computing
Viaarxiv icon