How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning

Yi Shi, Yalin E. Sagduyu, Tugba Erpek, M. Cenk Gursoy

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Fingerprint

Dive into the research topics of 'How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning'. Together they form a unique fingerprint.

Keyphrases

Computer Science

Engineering