Picture for Eryk Dutkiewicz

Eryk Dutkiewicz

Deep Learning-Driven Friendly Jamming for Secure Multicarrier ISAC Under Channel Uncertainty

Add code
Mar 05, 2026
Viaarxiv icon

"Security for Everyone" in Finite Blocklength IRS-aided Systems With Perfect and Imperfect CSI

Add code
Apr 07, 2025
Viaarxiv icon

Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI

Add code
Apr 07, 2025
Figure 1 for Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI
Figure 2 for Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI
Figure 3 for Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI
Figure 4 for Secure Communications for All Users in Low-Resolution IRS-aided Systems Under Imperfect and Unknown CSI
Viaarxiv icon

Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data

Add code
Jan 14, 2025
Figure 1 for Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data
Figure 2 for Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data
Figure 3 for Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data
Figure 4 for Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data
Viaarxiv icon

Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems

Add code
Mar 22, 2024
Viaarxiv icon

Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection

Add code
Mar 22, 2024
Figure 1 for Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Figure 2 for Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Figure 3 for Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Figure 4 for Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Viaarxiv icon

Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

Add code
Dec 12, 2023
Figure 1 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 2 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 3 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Figure 4 for Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Viaarxiv icon

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Add code
Dec 05, 2023
Viaarxiv icon

Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning

Add code
Feb 27, 2023
Figure 1 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 2 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 3 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Figure 4 for Dynamic Resource Allocation for Metaverse Applications with Deep Reinforcement Learning
Viaarxiv icon

Toward BCI-enabled Metaverse: A Joint Radio and Computing Resource Allocation Approach

Add code
Dec 17, 2022
Viaarxiv icon